CCSP with online practice for dummies:

Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Deane, Arthur J. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hoboken, NJ John Wiley & Sons, Inc. [2021]
Schriftenreihe:for dummies
learning made easy
Schlagworte:
Online-Zugang:FHN01
Lizenzpflichtig
Zusammenfassung:Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design
Beschreibung:Description based on publisher supplied metadata and other sources
Beschreibung:1 Online-Ressource (xiv, 350 Seiten)
ISBN:9781119648369

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!