𝔖 Scriptorium
✦   LIBER   ✦

📁

CC Certified in Cybersecurity Study Guide (Sybex Study Guide)

✍ Scribed by Mike Chapple


Publisher
Sybex
Year
2024
Tongue
English
Leaves
259
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Prepare for the ISC2 Certified in Cybersecurity exam, as well as a new career in cybersecurity, with this effective study guide. Complete with full color illustrations!

In Certified in Cybersecurity Study Guide, veteran IT and cybersecurity educator Mike Chapple delivers a one-stop resource for anyone planning to pursue the ISC2 Certified in Cybersecurity credential, as well as those getting ready to take on a challenging and rewarding new career in cybersecurity. The author walks you through the info you’ll need to succeed on both the exam and in your first day at a cybersecurity-focused job, using full-color illustrations to highlight and emphasize the concepts discussed inside.

Complete with an online practice test, this book comprehensively covers every competency and domain tested by the new exam, including security principles, business continuity, disaster recovery, incident response, access control concepts, network security, and security operations. You’ll also find

Efficient and lean content, ensuring you get up-to-speed as quickly as possible

Bite-sized chapters that break down essential topics into manageable and accessible lessons

Complimentary online access to Sybex’ celebrated online learning environment, which comes with practice questions, a complete glossary of common industry terminology, and more

A clear and effective pathway to the Certified in Cybersecurity credential, as well as a fresh career in cybersecurity, the Certified in Cybersecurity Study Guide offers the foundational knowledge, skills, and abilities you need to get started in an exciting and rewarding career.

✦ Table of Contents


Cover
Title Page
Copyright Page
Acknowledgments
About the Author
About the Technical Editor
Contents at a Glance
Contents
Introduction
CC Certification
Taking the CC Exam
Computer-Based Testing Environment
Exam Retake Policy
Recertification Requirements
Using the Online Practice Test
How to Contact the Publisher
Part I Domain 1: Security Principles
Chapter 1 Confidentiality, Integrity, Availability, and Non-repudiation: Objective 1.1 Understand the Security Concepts of Information Assurance
The CIA Triad
Confidentiality
Integrity
Availability
Non-repudiation
Chapter 2 Authentication and Authorization: Objective 1.1 Understand the Security Concepts of Information Assurance
Access Control Process
Identification
Authentication
Authorization
Accounting
Digital Access Control
Password Policies
Password Length
Password Complexity
Password Expiration
Password History
Password Resets
Password Reuse
Password Managers
Authentication Factors
Something You Know
Something You Are
Something You Have
Multi-factor Authentication
Chapter 3 Privacy: Objective 1.1 Understand the Security Concepts of Information Assurance
Privacy
Types of Private Information
Expectation of Privacy
Privacy Management Framework
Management
Agreement, Notice, and Communication
Collection and Creation
Use, Retention, and Disposal
Access
Disclosure to Third Parties
Security for Privacy
Data Integrity and Quality
Monitoring and Enforcement
Chapter 4 Risk Management: Objective 1.2 Understand the Risk Management Process
Risk Types
Internal and External Risks
Multiparty Risks
Specific Risks
Risk Identification and Assessment
The Language of Risk
Ranking Risks
Risk Treatment Strategies
Risk Avoidance
Risk Transference
Risk Mitigation
Risk Acceptance
Risk Profile and Tolerance
Chapter 5 Security Controls: Objective 1.3 Understand Security Controls
What Are Security Controls?
Categorizing Security Controls
Purpose Categories
Mechanism of Action Categories
Chapter 6 Ethics: Objective 1.4 Understand ISC2 Code of Ethics
Corporate Ethics Codes
ISC2 Code of Ethics
Canon 1
Canon 2
Canon 3
Canon 4
Ethics Complaint Procedure
Chapter 7 Security Governance Processes: Objective 1.5 Understand Governance Processes
Security Policies and Procedures
Security Policies
Security Standards
Security Guidelines
Security Procedures
Laws and Regulations
Part II Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) Concepts
Chapter 8 Business Continuity: Objective 2.1 Understand Business Continuity (BC)
Business Continuity Planning
BCP Scope Definition
Business Impact Analysis
Business Continuity Controls
Single Point of Failure Analysis
Other Continuity Risks
High Availability and Fault Tolerance
High Availability
Fault Tolerance
Storage
Networking Components
Redundancy Through Diversity
Chapter 9 Disaster Recovery: Objective 2.2 Understand Disaster Recovery (DR)
Disaster Recovery Planning
Types of Disasters
Initial Response
Assessment
Disaster Recovery Metrics
Training and Awareness
Backups
Backup Media
Backup Types
Disaster Recovery Sites
Hot Sites
Cold Sites
Warm Sites
Offsite Storage
Alternate Business Processes
Testing Disaster Recovery Plans
Read-Throughs
Walk-Throughs
Simulations
Parallel Tests
Full Interruption Tests
Chapter 10 Incident Response: Objective 2.3 Understand Incident Response
Creating an Incident Response Program
Building an Incident Response Team
Team Composition
Training and Testing
Incident Communications Plan
Internal Communications
External Communications
Secure Communications
Incident Identification and Response
Security Data Sources
Correlating Security Information
Receiving Incident Reports
Responding to Incidents
Part III Domain 3: Access Controls Concepts
Chapter 11 Physical Access Controls: Objective 3.1 Understand Physical Access Controls
Physical Facilities
Data Centers
Server Rooms
Media Storage Facilities
Evidence Storage Rooms
Wiring Closets
Designing for Security
Visitor Management
Physical Security Personnel
Security Personnel
Security Protocols
Chapter 12 Logical Access Controls: Objective 3.2 Understand Logical Access Controls
Authorization
Least Privilege
Segregation of Duties
Authorization Models
Account Types
User Accounts
Administrator Accounts
Guest Accounts
Shared/Generic Accounts
Service Accounts
Non-repudiation
Part IV Domain 4: Network Security
Chapter 13 Computer Networking: Objective 4.1 Understand Computer Networking
Network Types
TCP/IP Networking
Internet Protocol
Transmission Control Protocol
User Datagram Protocol
Internet Control Message Protocol
OSI Model
IP Addressing
Identifying Valid IPv4 Addresses
Domain Name System
Network Ports and Applications
Securing Wi-Fi Networks
Disable SSID Broadcasting
Change Default Passwords
Authenticate Wi-Fi Users
Wireless Encryption
Chapter 14 Network Threats and Attacks: Objective 4.2 Understand Network Threats and Attacks
Malware
Viruses
Worms
Trojan Horses
Eavesdropping Attacks
On-Path Attacks
Denial-of-Service Attacks
Side-Channel Attacks
Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks
Antivirus Software
Intrusion Detection and Prevention
Intrusion Detection
Intrusion Prevention
Environments Monitored
Classification Errors
Detection Techniques
Firewalls
Vulnerability Scanning
Network Vulnerability Scanning
Application Scanning
Web Application Scanning
Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure
Data Center Protection
Air Temperature
Humidity
Fire
Network Security Zones
Switches, WAPs, and Routers
Switches
WAPs
Routers
Network Segmentation
Virtual Private Networks
Network Access Control
Role-Based Access Control
Posture Checking
Internet of Things
IoT Security
Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure
Cloud Computing
Drivers for Cloud Computing
Cloud Deployment Models
Private Cloud
Public Cloud
Hybrid Cloud
Community Cloud
Cloud Service Categories
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Desktop as a Service (DaaS)
Security and the Shared Responsibility Model
Automation and Orchestration
Vendor Relationships
Managed Service Providers
Vendor Agreements
Part V Domain 5: Security Operations
Chapter 18 Encryption: Objective 5.1 Understand Data Security
Cryptography
Encrypting Data
Decrypting Data
Encryption Algorithms
Symmetric Encryption
Asymmetric Encryption
Uses of Encryption
Data at Rest
Data in Transit
Hash Functions
MD5
SHA
Chapter 19 Data Handling: Objective 5.1 Understand Data Security
Data Life Cycle
Create
Store
Use
Share
Archive
Destroy
Data Classification
Classification Schemes
Labeling
Chapter 20 Logging and Monitoring: Objective 5.1 Understand Data Security
Logging
Log Monitoring
Chapter 21 Configuration Management: Objective 5.2 Understand System Hardening
Configuration Management
Baselines
Version Control
Configuration Vulnerabilities
Default Configurations
Weak Security Settings
Cryptographic Weaknesses
Patch and Update Management
Account Management
Chapter 22 Best Practice Security Policies: Objective 5.3 Understand Best Practice Security Policies
Acceptable Use Policy
Data Handling Policy
Password Policy
Bring Your Own Device Policy
Privacy Policy
Change Management Policy
Chapter 23 Security Awareness Training: Objective 5.4 Understand Security Awareness Training
Social Engineering
Authority and Trust
Intimidation
Consensus and Social Proof
Scarcity
Urgency
Familiarity and Liking
Security Education
Index
EULA


📜 SIMILAR VOLUMES


IAPP CIPP / US Certified Information Pri
✍ Mike Chapple, Joe Shelley 📂 Library 📅 2021 🏛 Sybex 🌐 English

<p><span>Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP exam for 2023-2024!</span></p><p><span>Information privacy has become a critical and central con

Official Google Cloud Certified Professi
✍ Mona Mona, Pratap Ramamurthy 📂 Library 📅 2023 🏛 Wiley 🌐 English

<p><span>Expert, guidance for the Google Cloud Machine Learning certification exam</span></p><p><span>In </span><span>Google Cloud Certified Professional Machine Learning Study Guide</span><span>, a team of accomplished artificial intelligence (AI) and machine learning (ML) specialists delivers an e

CWNA Certified Wireless Network Administ
✍ David D. Coleman, David A. Westcott 📂 Library 📅 2021 🏛 Sybex 🌐 English

<p><span>The </span><span>#1 selling Wi-Fi networking reference guide in the world</span><span> </span></p><p><span>The </span><span>CWNA: Certified Wireless Network Administrator Study Guide</span><span> is the ultimate preparation resource for the CWNA exam. Fully updated to align with the latest

CWNA Certified Wireless Network Administ
✍ David D. Coleman, David A. Westcott 📂 Library 📅 2021 🏛 Sybex 🌐 English

<p><span>The </span><span>#1 selling Wi-Fi networking reference guide in the world</span><span> </span></p><p><span>The </span><span>CWNA: Certified Wireless Network Administrator Study Guide</span><span> is the ultimate preparation resource for the CWNA exam. Fully updated to align with the latest

ISC2 CISSP Certified Information Systems
✍ Mike Chapple, James Michael Stewart, Darril Gibson 📂 Library 📅 2024 🏛 Sybex 🌐 English

<p><span>CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge</span></p><p><span>ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition</span><span> has been completely updated based on the latest 2024 CISSP Detailed Content Outline. Thi

ISC2 CISSP Certified Information Systems
✍ Mike Chapple, James Michael Stewart, Darril Gibson 📂 Library 📅 2024 🏛 Sybex 🌐 English

<p><span>CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge</span></p><p><span>ISC2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 10th Edition</span><span> has been completely updated based on the latest 2024 CISSP Detailed Content Outline. Thi