Table of Contents (CISSP 2012 Edition)

Similar documents
CompTIA Security+ (Exam SY0-401)

Security+ SY0-501 Study Guide Table of Contents

Certified Information Systems Auditor (CISA)

CCISO Blueprint v1. EC-Council

Syllabus: The syllabus is broadly structured as follows:

Software Development & Education Center Security+ Certification

University of Pittsburgh Security Assessment Questionnaire (v1.7)

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

E-guide Getting your CISSP Certification

Certified Information Security Manager (CISM) Course Overview

Securing Information Systems

CompTIA Security+ Certification

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Certification Exam Outline Effective Date: November 2018

Certified Cyber Security Analyst VS-1160

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Information Technology General Control Review

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

Altius IT Policy Collection Compliance and Standards Matrix

Position Description IT Auditor

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Altius IT Policy Collection Compliance and Standards Matrix

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Certified Cyber Security Specialist

Information Security in Corporation

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Nebraska CERT Conference

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

CompTIA Security+ Study Guide (SY0-501)

Certified Ethical Hacker (CEH)

NETWORK THREATS DEMAN

Ethical Hacking and Prevention

Changing face of endpoint security

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

ECDL / ICDL IT Security. Syllabus Version 2.0

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Healthcare Security Success Story

Security Diagnostics for IAM

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CIH

Securing Information Systems

Securing Information Systems

POST GRADUATE DIPLOMA IN CYBER SECURITY (PGDCS)

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Risk Management in Electronic Banking: Concepts and Best Practices

CTS2134 Introduction to Networking. Module 08: Network Security

Cybersecurity Auditing in an Unsecure World

CompTIA Security+(2008 Edition) Exam

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Chapter 4. Network Security. Part I

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Advanced Diploma on Information Security

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-002)

Access Controls. CISSP Guide to Security Essentials Chapter 2

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cybersecurity Foundations

802.1x Port Based Authentication

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

Course 831 Certified Ethical Hacker v9

Strategic Infrastructure Security

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

A policy that the user agrees to follow before being allowed to access a network.

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Course Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:

Introduction and Overview. Why CSCI 454/554?

Objectives of the Security Policy Project for the University of Cyprus

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Layered Access Control-Six Defenses That Work. Joel M Snyder Senior Partner Opus One, Inc.

Ethical Hacker Foundation and Security Analysts Course Semester 2

CISSP - Certified Information Systems Security Professional

CHAPTER 8 SECURING INFORMATION SYSTEMS

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Course Outline. CISSP - Certified Information Systems Security Professional

Security Assessment Checklist

Establishing a Common Controls Framework

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

SECURITY & PRIVACY DOCUMENTATION

The Common Controls Framework BY ADOBE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

QuickBooks Online Security White Paper July 2017

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Security Issues and Best Practices for Water Facilities

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

CND Exam Blueprint v2.0

Curso: Ethical Hacking and Countermeasures

Table of Contents. Preface xiii PART I: IT GOVERNANCE CONCEPTS. Chapter 1: Importance of IT Governance for All Enterprises 3

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Transcription:

Table of Contents (CISSP 2012 Edition) CONTENT UPDATES... 6 ABOUT THIS BOOK... 7 NETWORK INFRASTRUCTURE, PROTOCOLS AND TECHNOLOGIES... 8 OPEN SYSTEM INTERCONNECT... 8 LAN NETWORKING...10 ROUTING AND SWITCHING...13 IP ADDRESSING...14 WIRELESS BASED LOCAL AREA NETWORKING...16 RFID...20 WAN NETWORKING AND ACCESS AGGREGATION...20 VOIP...23 CLOUD COMPUTING...23 ERP...25 SERVICE PACKS AND PATCHES...27 CAS AND OTHER SSO MECHANISMS...28 INFOCARD AND OPENID...28 OTP AND KYPS...29 DACS...29 SAML AND WS-SECURITY...30 OVAL...30 OPSEC...31 SPECIAL CONSIDERATIONS...31 WINDOWS, LINUX, NETWARE AND IPV4...36 WINDOWS NETWORKING...36 WINDOWS BASED WEB SERVICE...37 LINUX NETWORKING...38 NETWARE NETWORKING...39 TCP/IP SPECIFIC SECURITY RISKS...42 COMPUTER AND NETWORK SECURITY...50 SECURITY PLANNING...50 EQUIPMENTS AND DEVICES...51 1

POINTS OF FAILURE...53 MALWARE...54 VIRUSES AND WORMS...54 SPYWARE...55 TROJAN HORSE...55 KEYSTROKE LOGGER...56 SOFTWARE FLAWS...56 SNIFFING, EAVESDROPPING AND FOOTPRINTING...57 DOS AND DDOS...59 SOCIAL ENGINEERING...59 IDENTITY THEFT...60 BACKDOORS AND ROOTKITS...61 OTHER VULNERABILITIES...62 P3P...63 DATABASE SPECIFIC RISKS...63 CONCEALING HARD DISK DATA...65 CRYPTOGRAPHY...70 OVERVIEW...70 DES...70 IPSEC AND SSL...70 SYMMETRIC AND ASYMMETRIC ALGORITHMS...71 DIGITAL SIGNATURE...72 HASH FUNCTION...72 PGP...73 DISK BASED ENCRYPTION...73 EES...73 OPENSSL...74 OCSP AND CRL...75 SECURITY STRATEGIES...77 INFORMATION SECURITY BASELINES...77 POLICIES AND CONTROLS...77 INTERNAL PREVENTIVE CONTROLS VERSUS COMPENSATING CONTROLS...83 ORANGE BOOK...84 INTERNET SECURITY...85 FIREWALL SECURITY...86 VIRUS SECURITY...87 WEB SERVER SECURITY...87 NAME RESOLUTION SECURITY...88 MAIL SERVER SECURITY...88 2

RAS SERVER SECURITY...89 PROXY SERVER SECURITY...89 AUTHENTICATION SERVER SECURITY...90 IM SECURITY...90 INCIDENT RESPONSE...91 COVERT CHANNEL ANALYSIS...92 CHANGE CONTROL...93 PLANNING AND SCOPING OF THE ASSESSMENT OF RISK...95 METHODOLOGIES FOR PROPER ASSESSMENT OF RISK...96 INCIDENT MONITORING...98 CSIRT...99 OWNERSHIP & RESPONSIBILITY...102 ACCOUNTS AND PASSWORD MANAGEMENT...103 SECURITY AWARENESS TRAINING...105 CONTINUITY AND DISASTER RECOVERY...110 CONTINGENCY VS CONTINUITY...110 DRP AND COOP...111 BUSINESS IMPACT ANALYSIS...112 BCP VS BCP (PLANNING VS PLAN)...114 BCM, BCMT AND BCSC...114 BCP AT THE DEPARTMENTAL LEVEL...115 HAZARDOUS COMMUNICATION...115 SITE ARRANGEMENT...116 PREFABRICATED BUILDING AND TERTIARY LOCATION...117 AN ACTIVE/ACTIVE MODEL TO RESOURCE REDUNDANCY...118 REPLICATION, MIRRORING AND VAULTING...118 SERVICE AGREEMENT...118 DATA SYNCHRONIZATION CONCERN...121 REMOTE ACCESS CONCERN...122 SITE SECURITY...122 SECURITY THEORIES AND ACCESS CONTROL MODELS...125 DEFAULT DENY AND DEFAULT PERMIT...125 TRUSTED SYSTEM VS UNTRUSTED SYSTEM...126 THE COMPUTER SYSTEM ITSELF AS LARGELY AN UNTRUSTED SYSTEM...126 DEFENSE IN DEPTH...127 MODELS...128 ACLS VERSUS CAPABILITIES...129 THE AAA CONCEPT...131 RECOMMENDED ACCESS CONTROL MEASURES...134 3

PHYSICAL SECURITY FOR COMPUTER EQUIPMENTS...140 GENERAL GUIDELINES...140 PHYSICAL SITE PREPARATION AND MANAGEMENT...142 FIRE PROTECTION...143 MAINTENANCE AND TESTING...144 EQUIPMENT AND MEDIA MANAGEMENT...145 STANDARDS AND GUIDELINES...148 THE ISC2 CODE OF ETHICS...148 THE SARBANES OXLEY ACT AND THE COSO FRAMEWORK...149 SOGP...150 COMMON CRITERIA (CC)...150 HIPAA...151 OECD GUIDELINES...153 CEI S COMMANDMENTS OF ETHICS...155 COBIT...157 ISO STANDARDS...158 VAL IT...159 ITAF...159 FISMA...160 OTHER STANDARDS...160 ADVANCED SECURITY TOPICS...163 ENDPOINT SECURITY...163 SOFTWARE AS A SERVICE SECURITY...164 VIRTUALIZATION SECURITY...165 STORAGE SECURITY...165 NAME RESOLUTION SECURITY...166 INFORMATION SECURITY PLANNING, MANAGEMENT AND GOVERNANCE...169 IT STRATEGIC PLANNING...169 SWOT ANALYSIS...170 IT OPERATIONS MANAGEMENT...171 INFORMATION MANAGEMENT POLICY...172 ENTERPRISE SECURITY...173 ORGANIZATIONAL STRUCTURE AND SUPPORT...174 SENIOR MANAGEMENT SUPPORT...175 4

INFORMATION SECURITY PROGRAM AND POLICY DEVELOPMENT FROM A STRATEGIC PERSPECTIVE...176 IS GOVERNANCE...179 HR AND SECURITY...181 CONCERNS ON M & A...181 CHANGE MANAGEMENT...182 CHANGE MANAGEMENT VS CHANGE CONTROL...185 CONFIGURATION MANAGEMENT...186 PREPARING FOR EMERGENCY RESPONSE...188 RESPONDING TO INCIDENTS AND MANAGING RECOVERY...189 RISK MANAGEMENT...193 THE INFOSEC ASSESSMENT METHODOLOGY (IAM)...195 LOSS CALCULATIONS...196 SECURITY SYSTEM DESIGN...200 GENERAL GUIDELINES...200 DEVELOPMENT MODELS AND FRAMEWORKS...201 SOFTWARE TESTING...205 THE RELEVANT BUSINESS AND LEGAL DISCIPLINES...212 BUSINESS PROCESS REENGINEERING...212 BALANCED SCORECARD...213 OUTSOURCING...214 QUOTATIONS AND TENDERS...215 RFP...216 LOI...216 RFEI...217 RFSQ...218 SOURCE SELECTION PLAN...219 VENDORS OF RECORD...220 SERVICE LEVEL AGREEMENT, DISCLAIMER AND THE WARRANTY/LIABILITY TERMS...220 INVESTIGATION...224 COMPUTER FORENSICS...227 5