UNLOCK CISSP
Free!
Minimum price
$29.00
Suggested price

UNLOCK CISSP

Essential Notes for Exam Day Success

About the Book

This book is a comprehensive guide specifically designed for individuals preparing for the CISSP exam. It offers concentrated notes and key information for revision, making it an ideal resource after completing the main reading material. By providing a concise summary of essential topics, the book aims to save valuable time, especially during the critical last-minute study phase, possibly a week before the exam.

  • Share this book

  • Categories

    • Computer Security
    • Cryptography
    • Computers and Programming
    • Testing
  • Feedback

    Email the Author(s)

About the Author

Anoop A Shetty
Anoop A. Shetty

The author is a seasoned Cybersecurity and DFIR Professional. He currently serves as a Law Enforcement Officer. Author holds a Master's degree in Cyber Security from Leeds Beckett University, UK. He also holds various industry certifications including CISSP and CHFI. When he's not working, Anoop enjoys long-distance running, trail running and photography.

Table of Contents

    • SECURITY ARCHITECTURE AND ENGINEERING
      • Secure Design Principles
      • Ring Protection Model
      • Processors
      • Memory
      • Firmware
      • Security Models
      • Security Capabilities of Information Systems
      • Security Evaluation Frameworks
      • Vulnerabilities of Security Architectures and Designs
      • Mobile Device
      • Information System Lifecycle
    • CRYPTOGRAPHY
      • Cryptographic Life Cycle
      • Types of Modern Cryptography
      • Symmetric Key Cryptography
      • Asymmetric Key Cryptography
      • Digital Signatures
      • Hash-Based Message Authentication Code (HMAC)
      • Hashing
      • Public Key Infrastructure (PKI)
      • Applications of Cryptography
      • Key Clustering
      • Quantum Cryptography
      • Cryptanalytic and Cryptographic Attacks
    • NETWORK SECURITY
      • OSI Model
      • TCP/IP Model (DARPA Model/DOD Model)
      • Converged Protocols
      • Network Address Translation (NAT)
      • Types of Cables
      • Network Topologies
      • Authentication Protocols
      • Load Balancing Techniques
      • Wireless Networks
      • VLAN (Virtual local area network)
      • Email Security
    • GOVERNANCE, RISK AND COMPLIANCE
      • ISC2 Code of Professional Ethics Canons
      • Security Control Frameworks
      • Laws and Regulations
      • Intellectual Property
      • Privacy
      • Investigation Types
      • Business Impact Analysis (BIA)
      • Risk Analysis and Assessment
      • Applicable Types of Controls
      • Risk Frameworks
      • Threat Modeling
      • Supply Chain Risk Management (SCRM)
      • Security Awareness, Education and Training
    • ASSET SECURITY
      • Data Classification
      • Asset Classification
      • Asset Inventory
      • Asset Management
      • Data Lifecycle
      • Data Security Controls
      • Security Mode of Operation
    • PHYSICAL SECURITY
      • Personnel Safety and Security
      • Perimeter Security Controls
      • Internal Security Controls
      • Data Center Classification
      • Power
      • Humidity and Temperature
      • Fire Safety
    • IDENTITY AND ACCESS MANAGEMENT
      • Registration, Proofing and Establishment of Identity
      • Authentication Factors
      • Identity Management
      • Authorization Mechanisms
      • Identity and Access Provisioning Lifecycle
      • Attacks
    • CLOUD SECURITY
      • Federated Identity With a Third-Party Service
      • Vulnerabilities and Challenges in Cloud Environment
    • SECURITY ASSESSMENT AND TESTING
      • Security Control Testing
      • Software Testing
      • Log Review and Analysis
      • Key Performance and Risk Indicators
      • Backup Verification Data
    • SECURITY OPERATIONS
      • Investigations
      • Logging and Monitoring
      • Security Operations Concepts
      • Configuration Management (CM)
      • Change Management Process
      • Patch Management Process
      • Incident Management
      • Detection and Preventative Measures
      • Recovery Strategies
      • Backup Storage Strategies
      • RAID (Redundant Array of Independent Disks)
      • Recovery Site Strategies
      • Disaster Recovery (DR)
      • Testing Disaster Recovery Plans (DRP)
      • Business Continuity planning (BCP)
      • Common Attacks
    • SOFTWARE DEVELOPMENT SECURITY
      • Security and Software Development Life Cycle (SDLC)
      • Development Methodologies
      • Maturity Models
      • Applying Security Controls in Software Development
      • Security Impact of Acquired Software
      • Secure Coding
    • CONFUSING TERMS
    • BIBLIOGRAPHY

The Leanpub 60 Day 100% Happiness Guarantee

Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.

You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!

So, there's no reason not to click the Add to Cart button, is there?

See full terms...

Earn $8 on a $10 Purchase, and $16 on a $20 Purchase

We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.

(Yes, some authors have already earned much more than that on Leanpub.)

In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.

Learn more about writing on Leanpub

Free Updates. DRM Free.

If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).

Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.

Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.

Learn more about Leanpub's ebook formats and where to read them

Write and Publish on Leanpub

You can use Leanpub to easily write, publish and sell in-progress and completed ebooks and online courses!

Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks.

Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. (Or, if you are producing your ebook your own way, you can even upload your own PDF and/or EPUB files and then publish with one click!) It really is that easy.

Learn more about writing on Leanpub