(ISC)2 Releases Updated Information Security Guide For CISSP Certification(ISC)2 Releases Updated Information Security Guide For CISSP Certification
Book includes a CD of sample exams that simulate the actual CISSP exam
April 17, 2010
PALM HARBOR, Fla., USA, April 12, 2010 " (ISC)2 ("ISC-squared"), the not-for-profit global leader in educating and certifying information security professionals throughout their careers with more than 66,000 certified members worldwide, today announced the release of the second edition of the Official (ISC)2 Guide to the CISSP CBK (ISBN 978-1-4398-0959-4).
Updated and revised to reflect the late st developments in the field, the Guide provides a comprehensive overview of the CISSP CBK — a collection of topics relevant to information security professionals around the world — that serves as the basis for the CISSP (Certified Information Systems Security Professional) certification exam and as an authoritative resource for information security professionals.
The book includes a CD of sample exams that simulate the actual CISSP exam, providing the same number and types of questions with the same allotment of time allowed as with the actual exam. The CD can grade the exams, provide correct answers, and identify areas where more study is needed.
"This book is an invaluable tool for professionals seeking to achieve the CISSP certification, providing current, reliable and thorough information," said W. Hord Tipton, CISSP-ISSEP, CAP, CISA, executive director for(ISC)2. "The Guide is written by skilled authors from around the world who are leading subject matter experts in each CBK domain."
The CISSP CBK was established by (ISC)2 to create a common framework of information security terms and principles that allows information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession. It also serves as the basis for (ISC)2's education programs.
The Guide contains these 10 CISSP CBK domains, which reflect evolving terminology and changing emphasis in the security professional's day-to-day environment.
* Access Control * Application Development Security * Business Continuity and Disaster Recovery Planning * Cryptography * Information Security Governance and Risk Management * Legal, Regulations, Investigations and Compliance * Operations Security * Physical (Environmental) Security * Security Architecture and Design * Telecommunications and Network Security
"Because few practitioners have significant work experience in all 10 domains, (ISC)2 highly recommends reading this Guide, taking the sample exams included on the CD, reading at least one other CISSP exam study book, and attending an Official (ISC) Review Seminar in person or virtually via LiveOnline," Tipton said.
The Guide is available online from the (ISC)2 Store, as well as through online booksellers for a suggested retail price of $69.95.
About (ISC) ' (ISC) is the largest not-for-profit membership body of certified information security professionals worldwide, with over 66,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC) issues the Certified Information Systems Security Professional (CISSP') and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP'), Certification and Accreditation Professional (CAP'), and Systems Security Certified Practitioner (SSCP') credentials to qualifying candidates. (ISC)'s certifications are among the first information tech nology credentials to meet the stringent requirements of ANSI/ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC) also offers education programs and services based on its CBK', a compendium of information security topics. More information is available at www.isc2.org.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023