Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Acknowledgments About the Author About the Technical Editor Introduction
About This Book What Is an SSCP? Using This Book Major Changes in This Edition Objective Map Earning Your Certification Congratulations! You're Now an SSCP. Now What? Let's Get Started! Assessment  Test Answers to Assessment  Test
PART I: Getting Started as an SSCP
Chapter 1: The Business Case for Decision Assurance and Information Security
Information: The Lifeblood of Business Policy, Procedure, and Process: How Business Gets Business Done Who Runs the Business? Summary Exam Essentials Review Questions
Chapter 2: Information Security Fundamentals
The Common Needs for Privacy, Confidentiality, Integrity, and Availability Training and Educating Everybody SSCPs and Professional Ethics Summary Exam Essentials Review Questions
PART II: Integrated Risk Management and Mitigation
Chapter 3: Integrated Information Risk Management
It’s a Dangerous World The Four Faces of Risk Getting Integrated and Proactive with Information Defense Risk Management: Concepts and Frameworks Risk Assessment Four Choices for Limiting or Containing Damage Summary Exam Essentials Review Questions
Chapter 4: Operationalizing Risk Mitigation
From Tactical Planning to Information Security Operations Operationalizing Risk Mitigation: Step by Step The Ongoing Job of Keeping Your Baseline Secure Ongoing, Continuous Monitoring Reporting to and Engaging with Management Summary Exam Essentials Review Questions
PART III: The Technologies of Information Security
Chapter 5: Communications and Network Security
Trusting Our Communications in a Converged World Internet Systems Concepts Two Protocol Stacks, One Internet Wireless Network Technologies IP Addresses, DHCP, and Subnets IPv4 vs. IPv6: Important Differences and Options CIANA Layer by Layer Securing Networks as Systems Summary Exam Essentials Review Questions
Chapter 6: Identity and Access Control
Identity and Access: Two Sides of the Same CIANA+PS Coin Identity Management Concepts Access Control Concepts Network Access Control Implementing and Scaling IAM User and Entity Behavior Analytics (UEBA) Zero Trust Architectures Summary Exam Essentials Review Questions
Chapter 7: Cryptography
Cryptography: What and Why Building Blocks of Digital Cryptographic Systems Keys and Key Management Modern Cryptography: Beyond the “Secret Decoder Ring” “Why Isn't All of This Stuff Secret?” Cryptography and CIANA+PS Public Key Infrastructures Applying Cryptography to Meet Different Needs Managing Cryptographic Assets and Systems Measures of Merit for Cryptographic Solutions Attacks and Countermeasures PKI and Trust: A Recap On the Near Horizon Summary Exam Essentials Review Questions
Chapter 8: Hardware and Systems Security
Infrastructure Security Is Baseline Management Securing the Physical Context Infrastructures 101 and Threat Modeling Endpoint Security Malware: Exploiting the Infrastructure's Vulnerabilities Privacy and Secure Browsing “The Sin of Aggregation” Updating the Threat Model Managing Your Systems' Security Summary Exam Essentials Review Questions
Chapter 9: Applications, Data, and Cloud Security
It's a Data-Driven World…At the Endpoint Software as Appliances Applications Lifecycles and Security CIANA+PS and Applications Software Requirements Application Vulnerabilities “Shadow IT:” The Dilemma of the User as Builder Information Quality and Information Assurance Protecting Data in Motion, in Use, and at Rest Into the Clouds: Endpoint App and Data Security Considerations Legal and Regulatory Issues Countermeasures: Keeping Your Apps and Data Safe and Secure Summary Exam Essentials Review Questions
PART IV: People Power: What Makes or Breaks Information Security
Chapter 10: Incident Response and Recovery
Defeating the Kill Chain One Skirmish at a Time Harsh Realities of Real Incidents Incident Response Framework Preparation Detection and Analysis Containment and Eradication Recovery: Getting Back to Business Post-Incident Activities Summary Exam Essentials Review Questions Note
Chapter 11: Business Continuity via Information Security and People Power
What Is a Disaster? Surviving to Operate: Plan for It! Timelines for BC/DR Planning and Action Options for Recovery Cloud-Based “Do-Over” Buttons for Continuity, Security, and Resilience People Power for BC/DR Security Assessment: For BC/DR and Compliance Converged Communications: Keeping Them Secure During BC/DR Actions Summary Exam Essentials Review Questions
Chapter 12: Cross-Domain Challenges
Operationalizing Security Across the Immediate and Longer Term Supply Chains, Security, and the SSCP Other Dangers on the Web and Net On Our Way to the Future Enduring Lessons Your Next Steps At the Close Exam Essentials Review Questions
Appendix: Answers to Review Questions
Chapter 1: The Business Case for Decision Assurance and Information Security Chapter 2: Information Security Fundamentals Chapter 3: Integrated Information Risk Management Chapter 4: Operationalizing Risk Mitigation Chapter 5: Communications and Network Security Chapter 6: Identity and Access Control Chapter 7: Cryptography Chapter 8: Hardware and Systems Security Chapter 9: Applications, Data, and Cloud Security Chapter 10: Incident Response and Recovery Chapter 11: Business Continuity via Information Security and People Power Chapter 12: Cross-Domain Challenges
Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion