2nd Edition

Official (ISC)2® Guide to the ISSAP® CBK

Edited By (ISC)² Corporate Copyright 2014
    600 Pages 108 B/W Illustrations
    by Auerbach Publications

    600 Pages 108 B/W Illustrations
    by Auerbach Publications

    Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.

    Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC) Guide to the ISSAP® CBK®, Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.

    Newly Enhanced Design – This Guide Has It All!

    • Only guide endorsed by (ISC)2
    • Most up-to-date CISSP-ISSAP CBK
    • Evolving terminology and changing requirements for security professionals
    • Practical examples that illustrate how to apply concepts in real-life situations
    • Chapter outlines and objectives
    • Review questions and answers
    • References to free study resources

    Read It. Study It. Refer to It Often.

    Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.

    Access Control Systems & Methodology
    Access Control Concepts
    Authentication, Authorization, and Accounting (AAA)
    Access Control Administration and Management Concepts
    Communications & Network Security
    Voice and Facsimile Communications
    Network Architecture
    Network Security Design Considerations
    Interoperability and Associated Risks
    Audits and Assessments
    Operating Environment
    Secure Sourcing Strategy
    Cryptographic Principles
    Applications of Cryptography
    Vet Proprietary Cryptography & Design Testable Cryptographic Systems
    Computational Overhead & Useful Life
    Key Management
    Key Life Cycle
    Public Key Infrastructure
    Design Validation
    Security Architecture Analysis
    Risk Analysis
    Product Assurance Evaluation Criteria
    Assurance through Evaluation
    Architecture Frameworks
    Design Process
    Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
    Planning Phases and Deliverables
    Risk Analysis
    Business Impact Analysis
    Selecting a Recovery Strategy for Technology
    Bringing It All Together – A Sample "Walk Through" of a DR Plan
    Step by Step Guide for Disaster Recovery Planning for Security Architects
    References
    Physical Security Considerations
    Physical Security Policies and Standards
    Physical Security Risks
    Protection Plans
    Answers to Review Questions

    Biography

    (ISC)² Corporate

    (ISC)2 is pleased to offer the Official (ISC) Guide to the ISSAP® CBK®, Second Edition. This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP® CBK®.
    —W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)