CCSP for Dummies with Online Practice
Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Hoboken
John Wiley & Sons
2021
|
Schriftenreihe: | ... für Dummies
Learning made easy |
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design. |
---|---|
Beschreibung: | xiv, 350 Seiten Illustrationen |
ISBN: | 9781119648376 978-1-119-64837-6 |