pearson-cissp : Pearson CISSP Cert Guide

Pearson CISSP Cert Guide
ISBN : 978-1-61691-788-3
Gain hands-on expertise in (ISC)² CISSP certification exam with Pearson CISSP Cert Guide. The course focuses on the objectives covered in (ISC)² CISSP exam and helps in engineering, implementing and managing overall information security program to protect organizations from growing sophisticated attacks. The (ISC)²'s CISSP certification is an industry recognized credential and is designed to certify the competency of IT professionals to design, engineer, implement, and manage the overall information security program of an organization.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Flashcards Quizzes Glossary

Each lesson comes with Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Flashcards help master the key concepts. Glossary defines the key terms.

Glossary of terms
Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.


Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.

Exam Information

The Certified Information Systems Security Professional exam is a standalone certification from ISC2 with the exam code CISSP. The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management and more.

Career Prospects
  • Security Auditor
  • Security Analyst
  • Security Architect
  • Security Manager
  • Network Architect
  • Director of Security
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer
Exam FAQs
What are the prerequisites for this exam?
Candidate must have a minimum of five years cumulative paid full-time work experience in two or more of the 10 CISSP domains.
What is the exam registration fee?
USD 599
Where do I take the exam?
What is the format of the exam?
Hotspot, Drag and drop, and Multiple choice.
How many questions are asked in the exam?
The exam contains 250 questions.
What is the duration of the exam?
360 minutes
What is the passing score?

(on a scale of 0-1000)

What is the exam's retake policy?
Test takers who do not pass the examination the first time will be able to retest after 30 days. Test takers who fail second time will need to wait 90 days prior to sitting for the examination again. In the unfortunate event that a candidate fails a third time, the next available time to sit for the examination will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)² examinations a maximum of 3 times within a calendar year.
Where can I find more information about this exam?
To know more about the PS-CISSP, click here.

Table of Content

Here's What you will Learn

Lesson 1: Introduction

  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP

Lesson 2: Security and Risk Management

  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies
  • Risk Management Concepts
  • Threat Modeling
  • Security Risks in Acquisitions
  • Security Education, Training, and Awareness
  • Review All Key Topics

Lesson 3: Asset Security

  • Asset Security Concepts
  • Classify Information and Assets
  • Asset Ownership
  • Asset Management
  • Asset Privacy
  • Data Retention
  • Data Security and Controls
  • Asset Handling Requirements
  • Review All Key Topics

Lesson 4: Security Engineering

  • Engineering Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Security Capabilities of Information Systems
  • Certification and Accreditation
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Digital Signatures
  • Digital Rights Management (DRM)
  • Message Integrity
  • Cryptanalytic Attacks
  • Geographical Threats
  • Site and Facility Design
  • Building and Internal Security
  • Environmental Security
  • Equipment Security
  • Review All Key Topics

Lesson 5: Communication and Network Security

  • Secure Network Design Principles
  • IP Networking
  • IPv4
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics

Lesson 6: Identity and Access Management

  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Implementation
  • Authorization Mechanisms
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics

Lesson 7: Security Assessment and Testing

  • Assessment and Testing Strategies
  • Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Internal and Third-Party Audits
  • Review All Key Topics

Lesson 8: Security Operations

  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Preventive Measures
  • Patch Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Privacy and Safety
  • Review All Key Topics

Lesson 9: Software Development Security

  • Software Development Concepts
  • Security in the System and Software Development Life Cycle
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Review All Key Topics

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved