1. Trang chủ
  2. » Thể loại khác

CISSP study guide third edition

597 131 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 597
Dung lượng 30,03 MB

Nội dung

CISSP Study Guide Third Edition Eric Conrad Seth Misenar Joshua Feldman Bryan Simon - Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an imprint of Elsevier Acquiring Editor: Chris Katsaropoulos Editorial Project Manager: Anna Valutkevich Project Manager: Priya Kumaraguruparan Designer: Mark Rogers Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA Copyright © 2016, 2012, 2011 Elsevier Inc All rights reserved No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein) Notices Knowledge and best practice in this field are constantly changing As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress ISBN: 978-0-12-802437-9 For information on all Syngress publications visit our website at store.elsevier.com/Syngress About the Authors Eric Conrad (CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC, GISP, GCED), is a Senior SANS instructor and CTO of Backshore Communications, which provides information warfare, hunt teaming, penetration testing, incident handling, and intrusion detection consulting services Eric started his professional career in 1991 as a UNIX systems administrator for a small oceanographic communications company He gained information security experience in a variety of industries, including research, education, power, Internet, and healthcare, in positions ranging from systems programmer to security engineer to HIPAA security officer and ISSO He is lead author of MGT414: SANS Training Program for CISSP® Certification, and co-author of SANS SEC511: Continuous Monitoring and Security Operations and SANS SEC542: Web App Penetration Testing and Ethical Hacking Eric graduated from the SANS Technology Institute with a Master of Science degree in Information Security Engineering He earned his Bachelor of Arts in English from Bridgewater State College Eric lives in Peaks Island, Maine, with his family, Melissa, Eric, and Emma His website is http://ericconrad.com Seth Misenar (CISSP, GIAC GSE, GSEC, GPPA, GCIA, GCIH, GCWN, GCFA, GWAPT, GPEN) is a Cyber Security Expert who serves as Senior Instructor with the SANS Institute and Principal Consultant at Context Security, LLC He is numbered among the few security experts worldwide to have achieved the GIAC GSE (#28) credential Seth teaches a variety of cyber security courses for the SANS Institute including two very popular courses for which he is lead author: the bestselling SEC511: Continuous Monitoring and Security Operations and SEC542: Web Application Penetration Testing and Ethical Hacking He also serves as co-author for MGT414: SANS Training Program for CISSP® Certification Seth’s background includes security research, intrusion analysis, incident response, security architecture design, network and web application penetration testing He has previously served as a security consultant for Fortune 100 companies, as well as, the HIPAA Security Officer for a state government agency Seth has a Bachelor of Science degree in Philosophy from Millsaps College and resides in Jackson, Mississippi with his wife, Rachel, and children, Jude, Hazel, and Shepherd Joshua Feldman (CISSP) is a Vice President at the Moody’s Corporation – a bond ratings agency critical to the security, health and welfare of the global commerce sector He drives M&A, security architecture, design, and integration efforts for IT Risk and InfoSec Before taking on this promotion, Joshua was the Enterprise Security Architect for Corning, Inc At Corning, Joshua helped to deliver a slew of security transformations for Corning and was a key team member focused on maturing the security function From 2002 until 2012, he worked as the Technical Director of a xix xx About the Authors US DoD cyber-security services contract Supporting the DoD, he helped create the current standard used for assessing cyber threats and analyzing potential adversaries for impact During his tenure, he supported many DoD organizations including the Office of the Secretary of Defense, DISA, and the Combatant Commands Joshua got his start in the cyber security field when he left his high school science teaching position in 1997 and began working for Network Flight Recorder (NFR, Inc.), a small Washington, DC based startup making the first generation of Network Intrusion Detection Systems He has a Bachelor’s of Science from the University of Maryland and a Master’s in Cyber Operations from National Defense University He currently resides in New York, NY with his two dogs, Jacky and Lily Bryan Simon (CISSP) is an internationally recognized expert in cybersecurity and has been working in the information technology and security field since 1991 Over the course of his career, Bryan has held various technical and managerial positions in the education, environmental, accounting, and financial services sectors Bryan speaks on a regular basis at international conferences and with the press on matters of cybersecurity He has instructed individuals from organizations such as the FBI, NATO, and the UN in matters of cybersecurity, on three continents Bryan has specialized expertise in defensive and offensive capabilities He has received recognition for his work in I.T Security, and was most recently profiled by McAfee (part of Intel Security) as an I.T Hero Bryan holds 11 GIAC Certifications including GSEC, GCWN, GCIH, GCFA, GPEN, GWAPT, GAWN, GISP, GCIA, GCED, and GCUX Bryan’s scholastic achievements have resulted in the honour of sitting as a current member of the Advisory Board for the SANS Institute, and his acceptance into the prestigious SANS Cyber Guardian program Bryan is a SANS Certified Instructor for SEC401: Security Essentials Bootcamp Style, SEC501: Advanced Security Essentials – Enterprise Defender, SEC505: Securing Windows with Powershell and the Critical Security Controls, and SEC511: Continuous Monitoring and Security Operations Bryan dedicates this book to his little boy, Jesse Daddy loves you! Acknowledgments Eric Conrad: I need to first thank my wife, Melissa, and my children, Eric and Emma, for their love and patience while I wrote this book Thank you to the contributing authors and my friends Joshua Feldman and Seth Misenar Thank you to my teachers and mentors: Thank you, Miss Gilmore, for sending me on my way Thank you, Dave Curado and Beef Mazzola, for showing me the right way to it Thank you, Stephen Northcutt, Alan Paller, Deb Jorgensen, Scott Weil, Eric Cole, Ed Skoudis, Johannes Ullrich, Mike Poor, Ted Demopoulos, Jason Fossen, Kevin Johnson, John Strand, Jonathan Ham, and many others from the SANS Institute, for showing me how to take it to the next level I would like to thank the supergroup of information security professionals who answered my last-minute call and collectively wrote the 500 questions comprising the two sets of online practice exams: Rodney Caudle, David Crafts, Bruce Diamond, Jason Fowler, Philip Keibler, Warren Mack, Eric Mattingly, Ron Reidy, Mike Saurbaugh, and Gary Whitsett Seth Misenar: I would like to thank my wife, Rachel, the love of my life, who showed continued patience, support, and strength while entertaining two young children throughout this writing process I am grateful to my children, Jude, Hazel, and Shepherd who were amazingly gracious when Daddy had to write And I count myself lucky to have such wonderful parents, Bob and Jeanine, who, as always, provided much of their time to ensure that my family was taken care of during this writing period xxi CHAPTER Introduction EXAM OBJECTIVES IN THIS CHAPTER • How to Prepare for the Exam • How to Take the Exam • Good Luck! This book is born out of real-world information security industry experience The authors of this book have held the titles of systems administrator, systems programmer, network engineer/security engineer, security director, HIPAA security officer, ISSO, security consultant, instructor, and others This book is also born out of real-world instruction We have logged countless road miles teaching information security classes to professionals around the world We have taught thousands of students in hundreds of classes: both physically on most of the continents, as well as online Classes include CISSP®, of course, but also continuous monitoring, hunt teaming, penetration testing, security essentials, hacker techniques, information assurance boot camps, and others Good instructors know that students have spent time and money to be with them, and time can be the most precious We respect our students and their time: we not waste it We teach our students what they need to know, and we so as efficiently as possible This book is also a reaction to other books on the same subject As the years have passed, other books’ page counts have grown, often past 1000 pages As Larry Wall once said, “There is more than one way to it.” [1] Our experience tells us that there is another way If we can teach someone with the proper experience how to pass the CISSP® exam in a 6-day boot camp, is a 1000+ page CISSP® book really necessary? We asked ourselves: what can we that has not been done before? What can we better or differently? Can we write a shorter book that gets to the point, respects our student’s time, and allows them to pass the exam? We believe the answer is yes; you are reading the result We know what is important, and we will not waste your time We have taken Strunk and White’s advice to “omit needless words” [2] to heart: it is our mantra This book will teach you what you need to know, and so as concisely as possible CHAPTER 1  Introduction HOW TO PREPARE FOR THE EXAM Read this book, and understand it: all of it If we cover a subject in this book, we are doing so because it is testable (unless noted otherwise) The exam is designed to test your understanding of the Common Body of Knowledge, which may be thought of as the universal language of information security professionals It is said to be “a mile wide and two inches deep.” Formal terminology is critical: pay attention to it The Common Body of Knowledge is updated occasionally, most recently in April 2015 This book has been updated to fully reflect the 2015 CBK The (ISC)2® Candidate Information Bulletin (CIB) describes the current version of the exam; downloading and reading the CIB is a great exam preparation step You may download it here: https://www.isc2.org/uploadedfiles/(isc)2_public_content/exam_outlines/ cissp-exam-outline-april-2015.pdf Learn the acronyms in this book and the words they represent, backwards and forwards Both the glossary and index of this book are highly detailed, and map from acronym to name We did this because it is logical for a technical book, and also to get you into the habit of understanding acronyms forwards and backwards Much of the exam question language can appear unclear at times: formal terms from the Common Body of Knowledge can act as a beacon to lead you through the more difficult questions, highlighting the words in the question that really matter THE CISSP® EXAM IS A MANAGEMENT EXAM Never forget that the CISSP® exam is a management exam: answer all questions as an information security manager would Many questions are fuzzy and provide limited background: when asked for the best answer, you may think: “it depends.” Think and answer like a manager For example: the exam states you are c­ oncerned with network exploitation If you are a professional penetration tester you may wonder: am I trying to launch an exploit, or mitigate one? What does “concerned” mean? Your CSO is probably trying to mitigate network exploitation, and that is how you should answer on the exam THE 2015 UPDATE The 2015 exam moved to domains of knowledge (down from 10) Lots of content was moved The domain content can seem jumbled at times: the concepts not always flow logically from one to the next Some domains are quite large, while others are small In the end this is a non-issue: you will be faced with 250 questions from the domains, and the questions will not overtly state the domain they are based on The 2015 update focused on adding more up-to-date technical content, including an emphasis on cloud computing, the Internet of Things (IoT) and Content Distribution Networks (CDN), as well as other modern technical topics Even DevOps was added, which is quite a spin on the pre-2015 “exam way” concerning best practices for development How to Prepare for the Exam THE NOTES CARD APPROACH As you are studying, keep a “notes card” file for highly specific information that does not lend itself to immediate retention A notes card is simply a text file (you can create it with a simple editor like WordPad) that contains a condensed list of detailed information Populate your notes card with any detailed information (which you not already know from previous experience) which is important for the exam, like the five levels of the Software Capability Maturity Level (CMM; covered in Chapter 9, Domain 8: Software Development Security), or the ITSEC and Common Criteria Levels ­(covered in Chapter 4, Domain 3: Security Engineering), for example The goal of the notes card is to avoid getting lost in the “weeds”: drowning in specific information that is difficult to retain on first sight Keep your studies focused on core concepts, and copy specific details to the notes card When you are done, print the file As your exam date nears, study your notes card more closely In the days before your exam, really focus on those details PRACTICE TESTS Quizzing can be the best way to gauge your understanding of this material, and of your readiness to take the exam A wrong answer on a test question acts as a laser beam: showing you what you know, and more importantly, what you not know Each chapter in this book has 15 practice test questions at the end, ranging from easy to medium to hard The Self Test Appendix includes explanations for all correct and incorrect answers; these explanations are designed to help you understand why the answers you chose were marked correct or incorrect This book’s companion Web site is located at http://booksite.elsevier.com/companion/conrad/index.php It contains 500 questions: two full practice exams Use them You should aim for 80% or greater correct answers on any practice test The real exam requires 700 out of 1000 points, but achieving 80% or more on practice tests will give you some margin for error Take these quizzes closed book, just as you will take the real exam Pay careful attention to any wrong answers, and be sure to reread the relevant section of this book Identify any weaker domains (we all have them): domains where you consistently get more wrong answers than others Then focus your studies on those weak areas Time yourself while taking any practice exam Aim to answer at a rate of at least one question per minute You need to move faster than true exam pace because the actual exam questions may be more difficult and therefore take more time If you are taking longer than that, practice more to improve your speed Time management is critical on the exam, and running out of time usually equals failure READ THE GLOSSARY As you wrap up your studies, quickly read through the glossary towards the back of this book It has over 1000 entries, and is highly detailed by design The glossary definitions should all be familiar concepts to you at this point CHAPTER 1  Introduction If you see a glossary definition that is not clear or obvious to you, go back to the chapter it is based on, and reread that material Ask yourself: I understand this concept enough to answer a question about it? READINESS CHECKLIST These steps will serve as a “readiness checklist” as you near the exam day If you remember to think like a manager, are consistently scoring over 80% on practice tests, are answering practice questions quickly, understand all glossary terms, and perform a final thorough read through of your notes card, you are ready to go HOW TO TAKE THE EXAM The CISSP® exam was traditionally taken via paper-based testing: old-school paperand-pencil This has now changed to computer-based testing (CBT), which we will discuss shortly The exam has 250 questions, with a 6-hour time limit Six hours sounds like a long time, until you the math: 250 questions in 360 minutes leaves less than a minute and a half to answer each question The exam is long and can be grueling; it is also a race against time Preparation is the key to success STEPS TO BECOMING A CISSP® Becoming a CISSPđ requires four steps: Proper professional information security experience Agreeing to the (ISC)2® code of ethics Passing the CISSP® exam Endorsement by another CISSP® Additional details are available on the examination registration form available at https://www.isc2.org The exam currently requires 5 years of professional experience in or more of the domains of knowledge Those domains are covered in chapters 2–9 of this book You may waive 1 year with a college degree or approved certification; see the examination registration form for more information You may pass the exam before you have enough professional experience and become an “Associate of (ISC)2®.” Once you meet the experience requirement, you can then complete the process and become a CISSP® The (ISC)2® code of ethics is discussed in Chapter 2, Domain 1: Security and Risk Management Passing the exam is discussed in section “How to Take the Exam,” and we discuss endorsement in section “After the Exam” below How to Take the Exam COMPUTER BASED TESTING (CBT) (ISC)2® has partnered with Pearson VUE (http://www.pearsonvue.com/) to provide computer-based testing (CBT) Pearson VUE has testing centers located in over 160 countries around the world; go to their website to schedule your exam Note that the information regarding CBT is subject to change: please check the (ISC)2® CBT site (https://www.isc2.org/cbt/default.aspx) for any updates to the CBT process According to (ISC)2®, “Candidates will receive their unofficial test result at the test center The results will be handed out by the Test Administrator during the checkout process (ISC)2 will then follow up with an official result via email In some instances, real time results may not be available A comprehensive statistical and psychometric analysis of the score data is conducted during every testing cycle before scores are released.” [3] This normally occurs when the exam changes: students who took the updated exam in April and May of 2015 reported a 6-week wait before they received their results Immediate results followed shortly after that time Pearson VUE’s (ISC)2® site is: http://www.pearsonvue.com/isc2/ It includes useful resources, including the “Pearson VUE Testing Tutorial and Practice Exam,” a Microsoft Windows application that allows candidates to try out a demo exam, explore functionality, test the “Flag for Review” function, etc This can help reduce exam-day jitters, and familiarity with the software can also increase your test taking speed HOW TO TAKE THE EXAM The exam has 250 questions comprised of four types: • • • • Multiple choice Scenario Drag/drop Hotspot Multiple-choice questions have four possible answers, lettered A, B, C, or D Each multiple-choice question has exactly one correct answer A blank answer is a wrong answer: guessing does not hurt you Scenario questions contain a long paragraph of information, followed by a number of multiple choice questions based on the scenario The questions themselves are multiple choice, with one correct answer only, as with other multiple choice questions The scenario is often quite long, and contains unnecessary information It is often helpful to read the scenario questions first: this method will provide guidance on keywords to look for in the scenario Drag & drop questions are visual multiple choice questions that may have multiple correct answers Figure 1.1 is an example from Chapter 2, Domain 1: Security and Risk Management Drag and drop: Identify all objects listed below Drag and drop all objects from left to right ... CISSP Becoming a CISSP requires four steps: • • Proper professional information security experience Agreeing to the (ISC)2® code of ethics Passing the CISSP exam Endorsement by another CISSP ... questions, highlighting the words in the question that really matter THE CISSP EXAM IS A MANAGEMENT EXAM Never forget that the CISSP exam is a management exam: answer all questions as an information... way If we can teach someone with the proper experience how to pass the CISSP exam in a 6-day boot camp, is a 1000+ page CISSP book really necessary? We asked ourselves: what can we that has

Ngày đăng: 14/05/2018, 10:52

TỪ KHÓA LIÊN QUAN