CCSP for Dummies with Online Practice

Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Deane, Arthur J. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Hoboken John Wiley & Sons 2021
Schriftenreihe:... für Dummies
Learning made easy
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design.
Beschreibung:xiv, 350 Seiten
Illustrationen
ISBN:9781119648376
978-1-119-64837-6