Cover art for Official (Isc)2 Guide to the CISSP Cbk
Published
Apple Academic Press, October 2014
ISBN
9781482262759
Format
Hardcover, 1304 pages
Dimensions
25.4cm × 17.8cm

Official (Isc)2 Guide to the CISSP Cbk Fourth Edition 4th edition

Not in stock
Fast $7.95 flat-rate shipping!
Only pay $7.95 per order within Australia, including end-to-end parcel tracking.
100% encrypted and secure
We adhere to industry best practice and never store credit card details.
Talk to real people
Contact us seven days a week – our staff are here to help.

As a result of a rigorous, methodical process that (ISC)(2) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)(2) conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today's practicing information security professionals.

Refreshed technical content has been added to the official (ISC)(2) CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization's information security program within an ever-changing security landscape.

The domain names have been updated as follows:

CISSP Domains, Effective April 15, 2015

Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity)

Asset Security (Protecting Security of Assets)

Security Engineering (Engineering and Management of Security)

Communications and Network Security (Designing and Protecting Network Security)

Identity and Access Management (Controlling Access and Managing Identity)

Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)

Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery)

Software Development Security (Understanding, Applying, and Enforcing Software Security)

Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization's comprehensive education strategy and certifying body best practices, (ISC)(2) training materials do not teach directly to its credential examinations. Rather, (ISC)(2) Education is focused on teaching the core competencies relevant to the roles and responsibilities of today's practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals.

Related books