Scroll to top button

PS-CISSP-complete : Pearson CISSP Cert Guide with Labs

PS-CISSP-complete
Pearson CISSP Cert Guide with Labs
ISBN : 978-1-61691-967-2

Gain hands-on expertise in (ISC)2 CISSP certification exam by Pearson CISSP Cert Guide course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CISSP certification is vendor-neutral credential designed for IT security practitioners to validate their technical and managerial skills, credibility and, experience. CISSP exam is designed to engineer, implement, and manage the overall information security program to protect organizations from growing sophisticated attacks.

 

Here's what you will get

The Certified Information Systems Security Professional exam is a standalone certification from ISC2 with the exam code CISSP. The certification is targeted at professionals who want to develop policies and procedures in information security. The exam covers critical topics in security, including cloud computing, mobile security, application development security, risk management and more.

Lessons
9+
Quizzes
123+
Flashcards
932+
Glossary of terms
932+
Pre-assessment Questions
255+
Full Length Tests
2+
Post-Assessment Questions
250+
Performance based lab
104+
Video tutorials
29+
Minutes
36+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
7+
Hours
03:03+
Exam FAQs
What is the exam registration fee? USD 599
How many questions are asked in the exam? The exam contains 250 questions.
What is the passing score? 700

(on a scale of 0-1000)

What is the exam's retake policy?

Test takers who do not pass the exam the first time will be able to retest after 30 days.  Test takers that fail a second time will need to wait 90 days prior to sitting for the exam again.  In the unfortunate event that a candidate fails a third time, the next available time to sit for the exam will be 180 days after the most recent exam attempt.  Candidates are eligible to sit for (ISC)exams a maximum of 3 times within a calendar year.

What are the career opportunities after passing this exam?

  • Security Consultant
  • Security Manager
  • Security Auditor
  • Security Architect
  • Security Analyst
  • Security Systems Engineer
  • Director of Security
  • Network Architect
  • Chief Information Security Officer
  • IT Director/Manager

Here's what you will learn

  • The Goals of the CISSP Certification
  • The Value of the CISSP Certification
  • The Common Body of Knowledge
  • Steps to Becoming a CISSP
  • Security Terms
  • Security Governance Principles
  • Compliance
  • Legal and Regulatory Issues
  • Professional Ethics
  • Security Documentation
  • Business Continuity
  • Personnel Security Policies
  • Risk Management Concepts
  • Threat Modeling
  • Security Risks in Acquisitions
  • Security Education, Training, and Awareness
  • Review All Key Topics
  • Asset Security Concepts
  • Classify Information and Assets
  • Asset Ownership
  • Asset Management
  • Asset Privacy
  • Data Retention
  • Data Security and Controls
  • Asset Handling Requirements
  • Review All Key Topics
  • Engineering Using Secure Design Principles
  • Security Model Concepts
  • System Security Evaluation Models
  • Security Capabilities of Information Systems
  • Certification and Accreditation
  • Security Architecture Maintenance
  • Vulnerabilities of Security Architectures, Designs, and Solution Elements
  • Vulnerabilities in Web-Based Systems
  • Vulnerabilities in Mobile Systems
  • Vulnerabilities in Embedded Devices and Cyber-Physical Systems
  • Cryptography
  • Cryptographic Types
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Public Key Infrastructure
  • Key Management Practices
  • Digital Signatures
  • Digital Rights Management (DRM)
  • Message Integrity
  • Cryptanalytic Attacks
  • Geographical Threats
  • Site and Facility Design
  • Building and Internal Security
  • Environmental Security
  • Equipment Security
  • Review All Key Topics
  • Secure Network Design Principles
  • IP Networking
  • IPv4
  • Protocols and Services
  • Converged Protocols
  • Wireless Networks
  • Communications Cryptography
  • Secure Network Components
  • Secure Communication Channels
  • Network Attacks
  • Review All Key Topics
  • Access Control Process
  • Physical and Logical Access to Assets
  • Identification and Authentication Concepts
  • Identification and Authentication Implementation
  • Identity as a Service (IDaaS) Implementation
  • Third-Party Identity Services Implementation
  • Authorization Mechanisms
  • Access Control Threats
  • Prevent or Mitigate Access Control Threats
  • Review All Key Topics
  • Assessment and Testing Strategies
  • Security Control Testing
  • Collect Security Process Data
  • Analyze and Report Test Outputs
  • Internal and Third-Party Audits
  • Review All Key Topics
  • Investigations
  • Investigation Types
  • Logging and Monitoring Activities
  • Resource Provisioning
  • Security Operations Concepts
  • Resource Protection
  • Incident Management
  • Preventive Measures
  • Patch Management
  • Change Management Processes
  • Recovery Strategies
  • Disaster Recovery
  • Testing Recovery Plans
  • Business Continuity Planning and Exercises
  • Physical Security
  • Personnel Privacy and Safety
  • Review All Key Topics
  • Software Development Concepts
  • Security in the System and Software Development Life Cycle
  • Security Controls in Development
  • Assess Software Security Effectiveness
  • Security Impact of Acquired Software
  • Review All Key Topics

Hands on Activities (Labs)

  • Understanding defense in depth layers
  • Identifying types of computer crimes
  • Identifying intellectual property law
  • Implementing physical security
  • Identifying access control types
  • Identifying terms associated with risks
  • Understanding security concept cycle
  • Understanding quality model
  • Identifying keys in a database
  • Understanding Information Life Cycle
  • Identifying RAID levels
  • Identifying RAID level characteristics
  • Understanding measures of risk calculation
  • Installing SDRAM and DDR memory modules
  • Identifying types of memory
  • Identifying Information models
  • Identifying TCSEC categories
  • Identifying service associated with cloud computing
  • Locking an iPhone with a password
  • Understanding hybrid encryption
  • Installing a subordinate Certification Authority
  • Backing up an encryption certificate and key
  • Identifying sequence of sender's process in digital signature system
  • Checking the integrity of messages through MAC values
  • Viewing password hashes
  • Understanding hash function process
  • Identifying types of system attack
  • Identifying man-made threats
  • Identifying fire extinguisher classes
  • Identifying types of outages
  • Creating and configuring a network
  • Identifying steps in the encapsulation/decapsulation process
  • Identifying TCP/IP protocol layers
  • Identifying OSI layer functions
  • Identifying OSI layers
  • Identifying connectionless communication
  • Configuring IPv4 address
  • Understanding NAT
  • Identifying LAN sub technologies
  • Identifying transmission types
  • Spotting the intranet network
  • Identifying private IP address classes
  • Identifying application layer protocols
  • Obtaining IP address information from a DHCP server
  • Configuring Windows 7 wireless settings
  • Configuring SSID
  • Identifying WLAN standards
  • Configuring NPS network policy
  • Turning on Windows 7 firewall logs
  • Working with a host-based IDS
  • Connecting systems to the Internet through a firewall router
  • Identifying components of a coaxial cable
  • Identifying steps in CSMA technology
  • Identifying abbreviations for various Internet layer protocols
  • Identifying a network topology
  • Identifying a network device
  • Identifying network infrastructure devices
  • Identifying types of cable
  • Understanding twisted pair categories
  • Creating a virtual PC machine
  • Creating a remote access VPN connection
  • Connecting to a server using Remote Desktop Connection
  • Creating a dial-up connection
  • Configuring NPS to provide RADIUS authentication
  • Identifying authentication protocols
  • Identifying attacks
  • Understanding ICMP attacks
  • Understanding biometric enrollment and authentication process
  • Configuring smart card authentication
  • Configuring account time limits
  • Turning off the guest account
  • Configuring Kerberos Policy settings
  • Creating a password for account
  • Configuring password policies
  • Configuring audit policies
  • Identifying components of the Kerberos authentication protocol
  • Identifying drawbacks of Kerberos authentication
  • Identifying authorization mechanisms
  • Identifying access control models
  • Identifying passwords threats
  • Identifying types of malwares
  • Filtering entries in Event Viewer
  • Understanding steps of penetration testing
  • Viewing different event details
  • Understanding forensic investigation process
  • Identifying steps in incident response management
  • Installing the AVG antivirus and scanning a drive
  • Disabling a service
  • Understanding sandboxing
  • Identifying security reviews
  • Identifying steps in patch management life cycle
  • Identifying processing sites in disaster recovery plan
  • Identifying various alternate site
  • Identifying disaster recovery plan tests
  • Identifying phases in BCP process
  • Understanding object-oriented programming terms
  • Identifying protection mechanisms
  • Identifying primary phases of SDLC
  • Identifying stages in a waterfall lifecycle model
  • Identifying phases of SDLC
  • Identifying CMMI maturity levels
  • Identifying types of viruses
  • Understanding application attacks
  • Identifying types of malware

Copyright © 2002-2017 uCertify / All Rights Reserved.