pearson-cissp : Pearson CISSP Cert Guide

ps-cissp ps-cissp
Pearson CISSP Cert Guide
ISBN : 9781616917883
Rating :
Gain hands-on expertise in ISC2 CISSP certification exam with Pearson CISSP Cert Guide. The course focuses on the objectives covered in ISC2 CISSP exam and helps in engineering, implementing and managing overall information security program to protect organizations from growing sophisticated attacks. The ISC2's CISSP certification is an industry recognized credential and is designed to certify the competency of IT professionals to design, engineer, implement, and manage the overall information security program of an organization.

Here's what you will get

The Certified Information Systems Security Professional exam is a standalone certification from ISC2 with the exam code CISSP. The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management, and lot more.

Glossary of terms
Test prep
Pre-assessment Questions
Full Length Tests
Post-Assessment Questions

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Exam FAQs
What are the prerequisites for this exam?

ISC2 has the following pre-requisites:

  • At least five years of cumulative, paid, full-time work experience.
  • In two or more of the eight domains of the (ISC2) CISSP Common Body of Knowledge (CBK).
What is the exam registration fee? USD 599
Where do I take the exam? Pearson VUE
How many questions are asked in the exam? The exam contains 250 questions.
What is the duration of the exam? 360 minutes
What is the passing score? 700

(on a scale of 0-1000)

What is the exam's retake policy? Test takers who do not pass the examination the first time will be able to retest after 30 days. Test takers who fail second time will need to wait 90 days prior to sitting for the examination again. In the unfortunate event that a candidate fails a third time, the next available time to sit for the examination will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC2) examinations a maximum of 3 times within a calendar year.
Where can I find more information about this exam? To know more about the PS-CISSP, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Auditor
  • Security Analyst
  • Security Architect
  • Security Manager
  • Network Architect
  • Director of Security
  • Director of Security
  • Security Consultant
  • IT Director/Manager
  • Security Systems Engineer
  • Chief Information Security Officer

Here's what you will learn

  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP
  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies
  • Risk Management Concepts
  • Threat Modeling
  • Security Risks in Acquisitions
  • Security Education, Training, and Awareness
  • Review All Key Topics
  • Asset Security Concepts
  • Classify Information and Assets
  • Asset Ownership
  • Asset Management
  • Asset Privacy
  • Data Retention
  • Data Security and Controls
  • Asset Handling Requirements
  • Review All Key Topics
  • Engineering Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Security Capabilities of Information Systems
  • Certification and Accreditation
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Digital Signatures
  • Digital Rights Management (DRM)
  • Message Integrity
  • Cryptanalytic Attacks
  • Geographical Threats
  • Site and Facility Design
  • Building and Internal Security
  • Environmental Security
  • Equipment Security
  • Review All Key Topics
  • Secure Network Design Principles
  • IP Networking
  • IPv4
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics
  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Implementation
  • Authorization Mechanisms
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics
  • Assessment and Testing Strategies
  • Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Internal and Third-Party Audits
  • Review All Key Topics
  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Preventive Measures
  • Patch Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Privacy and Safety
  • Review All Key Topics
  • Software Development Concepts
  • Security in the System and Software Development Life Cycle
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Review All Key Topics