Certified Information Systems security professional: CISSP
The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you&...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Packt Publishing
2024
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781835880784/?ar |
Zusammenfassung: | The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) |
Umfang: | 1 Online-Ressource (1 video file (39 hr., 53 min.)) sound, color. |
ISBN: | 9781835880784 1835880789 |
Internformat
MARC
LEADER | 00000ngm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-100859607 | ||
003 | DE-627-1 | ||
005 | 20240227122213.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240227s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835880784 |c electronic video |9 978-1-83588-078-4 | ||
020 | |a 1835880789 |c electronic video |9 1-83588-078-9 | ||
035 | |a (DE-627-1)100859607 | ||
035 | |a (DE-599)KEP100859607 | ||
035 | |a (ORHE)9781835880784 | ||
035 | |a (DE-627-1)100859607 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8076 |2 23/eng/20240131 | |
245 | 0 | 0 | |a Certified Information Systems security professional |b CISSP |
246 | 3 | 3 | |a CISSP |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Packt Publishing |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (39 hr., 53 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) | ||
520 | |a The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. | ||
650 | 0 | |a Computer security |v Study guides |x Examinations | |
650 | 0 | |a Electronic data processing personnel |v Study guides |x Certification |x Examinations | |
650 | 4 | |a Sécurité informatique ; Examens ; Guides de l'étudiant | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Gordon, Adam |e MitwirkendeR |4 ctb | |
700 | 1 | |a Lowrie, Daniel |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning, |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835880784/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-100859607 |
---|---|
_version_ | 1831287148849922048 |
adam_text | |
any_adam_object | |
author2 | Gordon, Adam Lowrie, Daniel |
author2_role | ctb ctb |
author2_variant | a g ag d l dl |
author_corporate | ACI Learning |
author_corporate_role | ctb |
author_facet | Gordon, Adam Lowrie, Daniel ACI Learning |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)100859607 (DE-599)KEP100859607 (ORHE)9781835880784 |
dewey-full | 005.8076 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8076 |
dewey-search | 005.8076 |
dewey-sort | 15.8076 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04588ngm a22005292c 4500</leader><controlfield tag="001">ZDB-30-ORH-100859607</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240227122213.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240227s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835880784</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-078-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1835880789</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-078-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP100859607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835880784</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)100859607</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8076</subfield><subfield code="2">23/eng/20240131</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Certified Information Systems security professional</subfield><subfield code="b">CISSP</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">CISSP</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (39 hr., 53 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed January 31, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Study guides</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel</subfield><subfield code="v">Study guides</subfield><subfield code="x">Certification</subfield><subfield code="x">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Examens ; Guides de l'étudiant</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gordon, Adam</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lowrie, Daniel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning,</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835880784/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-100859607 |
illustrated | Not Illustrated |
indexdate | 2025-05-05T13:25:19Z |
institution | BVB |
isbn | 9781835880784 1835880789 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (39 hr., 53 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing |
record_format | marc |
spelling | Certified Information Systems security professional CISSP CISSP [First edition]. [Place of publication not identified] Packt Publishing 2024 1 Online-Ressource (1 video file (39 hr., 53 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed January 31, 2024) The Certified Information Systems Security Professional (CISSP) certification is recognized globally as a hallmark of excellence in the IT security domain. In this course, you will embark on a detailed exploration of various critical security domains. Starting with Security and Risk Management, you'll grasp essential concepts like the ISC2 Code of Ethics, the importance of Confidentiality, Integrity, and Availability (CIA), and the intricacies of security governance and compliance. Asset Security is another key focus, where you'll learn about information classification, asset handling, and data security controls. The course also dives deep into Security Architecture and Engineering, offering insights into secure design principles and cryptographic solutions. As the course progresses, you'll explore Communication and Network Security, understanding the nuances of network protocols and secure communications. Identity and Access Management (IAM) will teach you how to effectively control access to information systems, while Security Assessment and Testing will equip you with skills in security auditing and testing methodologies. By the end of this course, you will be well-prepared to tackle the CISSP exam, setting you on a path to become a recognized expert in the field of IT security. What you will learn Understand the core principles of Security and Risk Management Explore advanced Security Architecture and Engineering concepts Build effective strategies for Asset Security and management Implement robust Communication and Network Security protocols Master Identity and Access Management (IAM) processes Learn to conduct thorough Security Assessments and Testing Audience This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to become a CISSP. A basic understanding of IT security concepts is recommended. About the Authors ACI Learning: ACI Learning trains leaders in Cybersecurity, Audit, and Information Technology. Whether starting an IT career, mastering a profession, or developing a team, they provide essential support at every step. Adam Gordon: Adam Gordon has 30+ years as an IT instructor in the private and public sectors. He holds more than 160 IT certifications. He has trained thousands of IT pros over the course of his career. He has over 160 professional and IT certifications. Daniel Lowrie: After working professionally as a systems administrator and as a network administrator, Daniel switched to IT education. His certifications include CompTIA A+, Network+, Linux+, CySA+, and PenTest+; CEH; MCSA; CFR; eJPT. Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Gordon, Adam MitwirkendeR ctb Lowrie, Daniel MitwirkendeR ctb ACI Learning, MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Certified Information Systems security professional CISSP Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Certified Information Systems security professional CISSP |
title_alt | CISSP |
title_auth | Certified Information Systems security professional CISSP |
title_exact_search | Certified Information Systems security professional CISSP |
title_full | Certified Information Systems security professional CISSP |
title_fullStr | Certified Information Systems security professional CISSP |
title_full_unstemmed | Certified Information Systems security professional CISSP |
title_short | Certified Information Systems security professional |
title_sort | certified information systems security professional cissp |
title_sub | CISSP |
topic | Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Computer security Study guides Examinations Electronic data processing personnel Study guides Certification Examinations Sécurité informatique ; Examens ; Guides de l'étudiant Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT gordonadam certifiedinformationsystemssecurityprofessionalcissp AT lowriedaniel certifiedinformationsystemssecurityprofessionalcissp AT acilearning certifiedinformationsystemssecurityprofessionalcissp AT packtpublishing certifiedinformationsystemssecurityprofessionalcissp AT gordonadam cissp AT lowriedaniel cissp AT acilearning cissp AT packtpublishing cissp |