Security Governance Through Principles and Policies -- Personnel Security and Risk Management Concepts -- Business Continuity Planning -- Laws, Regulations, and Compliance -- Protecting Security of Assets -- Cryptography and Symmetric Key Algorithms -- PKI and Cryptographic Applications -- Principles of Security Models, Design, and Capabilities -- Security Vulnerabilities, Threats, and Countermeasures -- Physical Security Requirements -- Secure Network Architecture and Securing Network Components -- Secure Communications and Network Attacks -- Managing Identity and Authentication -- Controlling and Monitoring Access -- Security Assessment and Testing -- Managing Security Operations -- Preventing and Responding to Incidents -- Disaster Recovery Planning -- Incidents and Ethics -- Software Development Security -- Malicious Code and Application Attacks -- Appendix A. Answers to Review Questions -- Appendix B. Answers to Written Labs -- Appendix C. About the Additional Study Tools.
Certified information systems secdurity professional study guide; (ISC) official study guide; (ISC) certified information systems security professional official study guide