My Account Details

ISBN10: 1260128709 | ISBN13: 9781260128703

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated study guide offers complete coverage of every topic on the latest version of the SSCP exam This thoroughly revised guide offers complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam. Written by a leading IT security certification and training expert, this authoritative resource addresses all seven SSCP domains as developed by the International Information Systems Security Certification Consortium (ISC)2®, including updated exam objectives effective November 1, 2018. You’ll find lists of topics covered at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Third Edition also serves as an essential on-the-job reference. Covers all exam domains, including: •Access controls •Networking and communications •Attacks •Malicious code and activity •Risk, response, and recovery •Monitoring and analysis •Controls and countermeasures •Auditing •Security operations •Security administration and planning •Legal issues •Cryptography Digital content includes: •Two practice exams
Chapter 2: Access Controls
Chapter 3: Basic Networking and Communications
Chapter 4: Advanced Networking and Communications
Chapter 5: Attacks
Chapter 6: Malicious Code and Activity
Chapter 7: Risk, Response, and Recovery
Chapter 8: Monitoring and Analysis
Chapter 9: Controls and Countermeasures
Chapter 10: Auditing
Chapter 11: Security Operations
Chapter 12: Security Administration and Planning
Chapter 13: Legal Issues
Chapter 14: Cryptography
Need support? We're here to help - Get real-world support and resources every step of the way.