Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
Chapter 1 Governance and Risk Management |
|
|
1 | (70) |
|
|
2 | (7) |
|
Information Security Governance |
|
|
4 | (5) |
|
Information Security Management Structure |
|
|
9 | (3) |
|
|
9 | (1) |
|
|
10 | (2) |
|
Principles of Information Security |
|
|
12 | (4) |
|
|
12 | (1) |
|
Security Vulnerabilities, Threats, Risks, and Exposures |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (10) |
|
|
17 | (8) |
|
Best Practice Frameworks for Risk Management |
|
|
25 | (1) |
|
Management and Technical Information Security Elements |
|
|
26 | (8) |
|
|
26 | (2) |
|
Security Policies, Standards, and Guidelines |
|
|
28 | (1) |
|
|
29 | (1) |
|
Identity and Access Management |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
|
Software Development Security |
|
|
33 | (1) |
|
Security Assessments and Testing |
|
|
33 | (1) |
|
Security Training and Awareness |
|
|
33 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
34 | (1) |
|
|
34 | (5) |
|
|
36 | (1) |
|
|
36 | (3) |
|
|
39 | (1) |
|
Privacy Impact Assessment |
|
|
40 | (1) |
|
|
40 | (1) |
|
Laws and Regulatory Drivers |
|
|
40 | (10) |
|
Federal Information Security Modernization Act |
|
|
41 | (1) |
|
Defense Federal Acquisition Regulation Supplement 252.204-7012 |
|
|
42 | (1) |
|
|
43 | (1) |
|
Payment Card Industry Data Security Standard |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Health Insurance Portability and Accountability Act |
|
|
46 | (1) |
|
Family Educational Rights and Privacy Act |
|
|
47 | (1) |
|
|
47 | (1) |
|
General Data Protection Regulation |
|
|
48 | (1) |
|
North American Electric Reliability Corporation Critical Infrastructure Protection |
|
|
49 | (1) |
|
Summary of Laws and Regulatory Drivers |
|
|
50 | (1) |
|
|
50 | (8) |
|
|
51 | (1) |
|
|
52 | (1) |
|
NIST Cybersecurity Framework |
|
|
53 | (1) |
|
Federal Information Processing Standards |
|
|
54 | (1) |
|
NIST Special Publications |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Information Security Trends and Best Practices |
|
|
58 | (1) |
|
Open Web Application Security Project |
|
|
58 | (1) |
|
|
58 | (1) |
|
Center for Internet Security |
|
|
58 | (1) |
|
Information Security Training and Certifications |
|
|
59 | (4) |
|
International Information System Security Certification Consortium |
|
|
59 | (1) |
|
|
59 | (1) |
|
International Council of E-Commerce Consultants |
|
|
60 | (1) |
|
|
60 | (2) |
|
Computing Technology Industry Association |
|
|
62 | (1) |
|
International Association of Privacy Professionals |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (7) |
|
|
65 | (2) |
|
|
67 | (2) |
|
|
69 | (2) |
|
Chapter 2 Information Security Controls, Compliance, and Audit Management |
|
|
71 | (50) |
|
Information Security Controls |
|
|
72 | (4) |
|
|
72 | (3) |
|
|
75 | (1) |
|
Information Security Control Life Cycle Frameworks |
|
|
76 | (2) |
|
NIST Risk Management Framework |
|
|
76 | (1) |
|
NIST Cybersecurity Framework |
|
|
77 | (1) |
|
|
77 | (1) |
|
Information Security Control Life Cycle |
|
|
78 | (8) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (2) |
|
|
84 | (2) |
|
Exploring Information Security Control Frameworks |
|
|
86 | (10) |
|
|
87 | (1) |
|
NIST Cybersecurity Framework |
|
|
88 | (2) |
|
|
90 | (2) |
|
CIS Critical Security Controls |
|
|
92 | (2) |
|
CSA Cloud Controls Matrix |
|
|
94 | (2) |
|
|
96 | (18) |
|
|
96 | (4) |
|
|
100 | (8) |
|
|
108 | (2) |
|
|
110 | (1) |
|
Specific Types of Audits and Assessments |
|
|
111 | (3) |
|
|
114 | (7) |
|
|
114 | (3) |
|
|
117 | (2) |
|
|
119 | (2) |
|
Chapter 3 Security Program Management and Operations |
|
|
121 | (42) |
|
Security Program Management |
|
|
121 | (11) |
|
|
122 | (3) |
|
|
125 | (4) |
|
Asset Security Management |
|
|
129 | (2) |
|
|
131 | (1) |
|
Security Program Budgets, Finance, and Cost Control |
|
|
132 | (7) |
|
|
133 | (3) |
|
Managing and Monitoring Spending |
|
|
136 | (1) |
|
Security Program Resource Management: Building the Security Team |
|
|
136 | (3) |
|
|
139 | (3) |
|
Project Management Fundamentals |
|
|
139 | (1) |
|
Project Management Training and Certifications |
|
|
140 | (2) |
|
Phases of Project Management |
|
|
142 | (15) |
|
|
143 | (2) |
|
|
145 | (8) |
|
|
153 | (1) |
|
Monitoring and Controlling |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (6) |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
161 | (2) |
|
Chapter 4 Information Security Core Competencies |
|
|
163 | (134) |
|
Malicious Software and Attacks |
|
|
164 | (8) |
|
|
164 | (6) |
|
Scripting and Vulnerability-Specific Attacks |
|
|
170 | (2) |
|
|
172 | (7) |
|
Types of Social Engineering Attacks |
|
|
172 | (2) |
|
Why Employees Are Susceptible to Social Engineering |
|
|
174 | (1) |
|
Social Engineering Defenses |
|
|
174 | (5) |
|
|
179 | (7) |
|
Asset Inventory and Configuration Management |
|
|
180 | (1) |
|
Secure Configuration Baselines |
|
|
180 | (1) |
|
|
181 | (1) |
|
Asset Security Techniques |
|
|
182 | (4) |
|
|
186 | (6) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (5) |
|
Identity and Access Management |
|
|
192 | (7) |
|
Identity and Access Management Fundamentals |
|
|
193 | (1) |
|
Identity Management Technologies |
|
|
194 | (1) |
|
Authentication Factors and Mechanisms |
|
|
195 | (1) |
|
Access Control Principles |
|
|
195 | (1) |
|
|
196 | (1) |
|
Access Control Administration |
|
|
197 | (1) |
|
Identity and Access Management Life Cycle |
|
|
198 | (1) |
|
Communication and Network Security |
|
|
199 | (17) |
|
|
199 | (5) |
|
|
204 | (1) |
|
Network Address Translation |
|
|
205 | (1) |
|
Network Protocols and Communications |
|
|
206 | (5) |
|
|
211 | (1) |
|
Network Technologies and Defenses |
|
|
212 | (4) |
|
|
216 | (13) |
|
Cryptographic Definitions |
|
|
217 | (1) |
|
|
218 | (1) |
|
Symmetric, Asymmetric, and Hybrid Cryptosystems |
|
|
218 | (5) |
|
|
223 | (2) |
|
Message Authentication Codes |
|
|
225 | (1) |
|
|
226 | (1) |
|
Public Key Infrastructure |
|
|
227 | (2) |
|
|
229 | (3) |
|
Cloud Computing Characteristics |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Cloud Security Risks and Assurance Levels |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (11) |
|
Physical Security Threats |
|
|
233 | (1) |
|
Physical Security Program Planning |
|
|
234 | (1) |
|
Physical Security Resources |
|
|
234 | (1) |
|
Physical Security Controls |
|
|
235 | (5) |
|
Physical Security Auditing and Measurement |
|
|
240 | (1) |
|
|
241 | (2) |
|
Software Development Security |
|
|
243 | (12) |
|
Integrating Security into the SDLC |
|
|
245 | (1) |
|
Security SDLC Roles and Responsibilities |
|
|
246 | (1) |
|
|
247 | (5) |
|
|
252 | (1) |
|
Software Vulnerability Analysis and Assessments |
|
|
253 | (2) |
|
Forensics, Incident Handling, and Investigations |
|
|
255 | (10) |
|
|
255 | (2) |
|
|
257 | (2) |
|
Incident Response and Investigations |
|
|
259 | (4) |
|
Forensics and Digital Evidence |
|
|
263 | (2) |
|
Security Assessment and Testing |
|
|
265 | (7) |
|
Vulnerability Assessments |
|
|
267 | (3) |
|
|
270 | (1) |
|
Regulatory Compliance Assessments |
|
|
271 | (1) |
|
Security Program Assessments |
|
|
272 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
272 | (16) |
|
Continuity Planning Initiation |
|
|
274 | (1) |
|
|
275 | (4) |
|
Identify Preventive Controls |
|
|
279 | (1) |
|
Develop Recovery Strategies and Solutions |
|
|
279 | (5) |
|
|
284 | (1) |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
288 | (9) |
|
|
289 | (2) |
|
|
291 | (3) |
|
|
294 | (3) |
|
Chapter 5 Strategic Planning, Finance, Procurement, and Vendor Management |
|
|
297 | (44) |
|
|
297 | (10) |
|
Organizational Strategic Planning |
|
|
298 | (5) |
|
Organizational Strategic Planning Teams |
|
|
303 | (2) |
|
Strategic Planning Process |
|
|
305 | (1) |
|
Security Strategic Plan Example |
|
|
305 | (2) |
|
Making Security Decisions |
|
|
307 | (7) |
|
|
308 | (6) |
|
|
314 | (12) |
|
Accounting and Finance Basics |
|
|
314 | (9) |
|
Information Security Annual Budget |
|
|
323 | (3) |
|
Procurement and Vendor Management |
|
|
326 | (12) |
|
Procurement Core Principles and Processes |
|
|
326 | (5) |
|
|
331 | (1) |
|
|
332 | (1) |
|
Third-Party Vendor Risk Management |
|
|
333 | (5) |
|
|
338 | (1) |
|
|
338 | (3) |
|
|
339 | (1) |
|
|
340 | (1) |
|
Appendix About the Online Content |
|
|
341 | (4) |
|
|
341 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
341 | (1) |
|
|
341 | (1) |
|
Single User License Terms and Conditions |
|
|
341 | (2) |
|
|
343 | (1) |
|
|
343 | (2) |
Glossary |
|
345 | (12) |
Index |
|
357 | |