Over 10 mio. titler Fri fragt ved køb over 499,- Hurtig levering 30 dages retur

CISSP Exam Study Guide

- NIST Framework, Digital Forensics & Cybersecurity Governance

  • Format
  • E-bog, ePub
  • Engelsk
  • 490 sider
Er ikke web-tilgængelig
E-bogen er DRM-beskyttet og kræver et særligt læseprogram

Normalpris

kr. 99,95

Medlemspris

kr. 84,95
Som medlem af Saxo Premium 20 timer køber du til medlemspris, får fri fragt og 20 timers streaming/md. i Saxo-appen. De første 7 dage er gratis for nye medlemmer, derefter koster det 99,-/md. og kan altid opsiges. Løbende medlemskab, der forudsætter betaling med kreditkort. Fortrydelsesret i medfør af Forbrugeraftaleloven. Mindstepris 0 kr. Læs mere

Beskrivelse

If you want to become a Cybersecurity Professional, this book is for you! If you are studying for CompTIA Security+ or CISSP, this book will help you pass your exam. Whether you want to become an Infrastructure Engineer, IT Security Analyst or any other Cybersecurity Professional, this book will certainly help you get there! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover:Secure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Secure Mobile SolutionsGeo-tagging & Context-Aware AuthenticationHow to Apply Cybersecurity Solutions to the CloudHow to Implement Identity and Account Management ControlsHow to Implement Authentication and Authorization SolutionsHow to Implement Public Key InfrastructureFile Manipulation & Packet CapturesForensics & Exploitation FrameworksData Sanitization ToolsHow to Apply Policies, Processes and Procedures for Incident ResponseDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleDisaster Recovery & Business ContinuityHow to Implement Data Sources to Support an InvestigationRetention Auditing, Compliance & MetadataHow to Implement Mitigation Techniques to Secure an EnvironmentMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsChain of Custody & Legal HoldFirst Responder Best PracticesNetwork Traffic and LogsScreenshots & WitnessesPreservation of EvidenceData IntegrityJurisdictional Issues & Data Breach Notification LawsThreat Types & Access ControlApplicable Regulations, Standards, & FrameworksBenchmarks & Secure Configuration GuidesHow to Implement Policies for Organizational SecurityMonitoring & BalancingAwareness & Skills TrainingTechnology & Vendor DiversityChange Management & Asset ManagementRisk Management Process and ConceptsRisk Register, Risk Matrix, and Heat MapRegulatory ExamplesQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation Lifecycle BUY THIS BOOK NOW AND GET STARTED TODAY!

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal490
  • Udgivelsesdato05-01-2023
  • ISBN139781839381751
  • Forlag Pastor Publishing Ltd
  • FormatePub

Anmeldelser

Vær den første!

Log ind for at skrive en anmeldelse.

Findes i disse kategorier...