Page 4 - CISSO_Workbookv18
P. 4

Certified Information Systems Security Officer


                  Section 5 – Threats to Operations ........................................................................................................ 312

               Chapter 7 – Symmetric Cryptography and Hashing .................................................................................. 324
                  Section 1 – Cryptography Terms ........................................................................................................... 326

                  Section 2 – Historical Uses of Cryptography ......................................................................................... 338
                  Section 3 – Cryptography Foundations ................................................................................................. 349

                  Section 4 – Modern Cryptography ........................................................................................................ 354
                  Section 6 - Hashing ................................................................................................................................ 378
               Chapter 8 – Asymmetric Cryptography and PKI........................................................................................ 388

                  Section 1 – Asymmetric Cryptography.................................................................................................. 390
                  Section 2 – Hybrid Crypto and Digital Signatures ................................................................................. 401

                  Section 3 – Public Key Infrastructure .................................................................................................... 406
                  Section 4 – Cryptography in Use ........................................................................................................... 414
                  Section 6 – Attacks on Cryptography .................................................................................................... 431

               Chapter 9 – Network Connections ............................................................................................................ 436
                  Section 1 – Network and Communications Security ............................................................................. 438

                  Section 2 - Topologies ........................................................................................................................... 445
                  Section 4 - Cabling ................................................................................................................................. 457

                  Section 5 – LAN & WAN ........................................................................................................................ 465
               Chapter 10 – Network Protocols and Devices .......................................................................................... 480

                  Section 1 – OSI Model ........................................................................................................................... 482
                  Section 2 – Network Devices ................................................................................................................ 494
                  Section 3 – Network Security Sentries .................................................................................................. 502

                  Section 4 – Ports, Protocols and Services ............................................................................................. 525
               Chapter 11 – Telephony, VPNs and Wireless ............................................................................................ 539

                  Section 1 – Telephony ........................................................................................................................... 542
                  Section 2 - VPNs .................................................................................................................................... 551

                  Section 3 - Wireless ............................................................................................................................... 560
                  Section 4 – Network Based Attacks ...................................................................................................... 575

               Chapter 12 – Security Architecture and Attacks ....................................................................................... 586
                  Section 1 – Security Architecture .......................................................................................................... 588
                  Section 2 – Architectural Models .......................................................................................................... 599

                  Section 3 – System Threats ................................................................................................................... 605
               Chapter 13 – Software Development Security ......................................................................................... 617


               Certified Information Systems Security Officer  P a g e  | 4
               ©Mile2 – All Rights Reserved - v18
   1   2   3   4   5   6   7   8   9