Preview

Network Security

Powerful Essays
Open Document
Open Document
6254 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security
All-in-1 / CISSP All-in-One / Harris / 5712-1

CHAPTER

Becoming a CISSP

1

This chapter presents the following:
• The reasons to become a CISSP
• What the CISSP exam entails
• What the Common Body of Knowledge contains
• The history of (ISC)2 and the CISSP exam
• Recertification requirements
• An assessment test to gauge your current security knowledge

This book is intended to welcome you to the exciting world of security and start you on a new path toward obtaining your CISSP certification!
The Certified Information Systems Security Professional (CISSP) exam covers ten domains, each of which may be considered a full field of study in itself, with many individual books and papers written on just that subject. Thus, you may have the impression that to prepare properly for the CISSP exam you must read a stack of books.
Without this third edition of CISSP All-In-One Exam Guide in hand, that impression may be true. However, the goal of this book is to provide in one resource all the information that you need to pass the CISSP exam. It also serves as a reference that you can use long after you achieve the CISSP certification.

Why Become a CISSP?
Security is a hot issue, not only in the security and technology fields, but also in every organization, government agency, and military unit. Computer and information security used to be an obscure term known only by a few. Security expertise was considered of minimal importance because risks were low. Hacking required great skill and knowledge and thus was not a common practice. Today, however, most corporations and organizations are desperately searching for talented and experienced security professionals to help them protect the resources that keep their companies alive and competitive. The CISSP certification identifies you as a security professional who has successfully met a predefined standard of knowledge and experience that is well understood and respected throughout the industry at

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Now that we know what a CCS-P is, Listed below are what is stated as being required for taking the certification exam to gain the credentials for this title. As of January 1, 2013, Candidates must meet one of the following eligibility requirements:…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Security, in its earliest years, consisted of mainly physical security, the need to safeguard the equipment itself. During the next decade, when ARPANET grew in use, more advanced security was needed. This led to the creation of MULTICS, an operating system with security being its main concern. From MULTICS spawned the UNIX operating system which did not require the same in-depth levels of security. In the early 1970's the password function was implemented as one of the first security measures. As computers and networking became more wide spread, during the 1990's, some security measures were implemented though they were seen as a low priority. Because of the lack of security in the start, we now have…

    • 764 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Good Essays

    References: Clifford, M. (2004). Identifying and Exploring Security Essentials. Upper Saddle River, NJ: Pearson Prentice-Hall…

    • 705 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    LESMA204

    • 2205 Words
    • 7 Pages

    References: The Open University of Hong Kong. LESM A204 Security Practices and Management (Unit2). Hong Kong: OUHK…

    • 2205 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    Members of the Information Security Team assist the CISO with design, evaluation, implementation, and management of security programs for the organization.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This unit is intended for people who want to work in the private security industry and who require an SIA licence to practise. It covers the knowledge and understanding for areas that are relevant to front line roles.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Checkpoint

    • 270 Words
    • 2 Pages

    I believe that it is essential for security professionals to be well familiar with their surroundings and have great knowledge of their primary targets, while roaming their environment. It is critical that all security professionals must maintain full control of the environment they are assigned to, and are aware of not leaving a vulnerable gap to the criminals. These security professionals must be ready to notice the slight changes of the environment, and must keep in mind that all areas are different. Therefore, they must plot a defense mechanism based on the type of environment they are assigned to.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Hucaby, Dave. CCNP BCMSN Official Exam Certification Guide: CCNP Self-study. 3rd ed. Vol. 1. Indianapolis: Cisco, 2007. Print.…

    • 790 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The type of security was dominant in the early years of computing security was entirely…

    • 994 Words
    • 4 Pages
    Satisfactory Essays