CISSP Study Guide 3ed [2016]-Eric Conrad.pdf

(30746 KB) Pobierz
CISSP Study Guide
Third Edition
Eric Conrad
Seth Misenar
Joshua Feldman
Bryan Simon - Technical Editor
AMSTERDAM • BOSTON • HEIDELBERG • LONDON
NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Syngress is an imprint of Elsevier
Acquiring Editor: Chris Katsaropoulos
Editorial Project Manager: Anna Valutkevich
Project Manager: Priya Kumaraguruparan
Designer: Mark Rogers
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
Copyright © 2016, 2012, 2011 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such information
or methods they should be mindful of their own safety and the safety of others, including parties for whom
they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in
the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-802437-9
For information on all Syngress publications
visit our website at
store.elsevier.com/Syngress
About the Authors
Eric Conrad
(CISSP, GIAC GSE, GPEN, GCIH, GCIA, GCFA, GAWN, GSEC,
GISP, GCED), is a Senior SANS instructor and CTO of Backshore Communications,
which provides information warfare, hunt teaming, penetration testing, incident han-
dling, and intrusion detection consulting services. Eric started his professional career
in 1991 as a UNIX systems administrator for a small oceanographic communica-
tions company. He gained information security experience in a variety of industries,
including research, education, power, Internet, and healthcare, in positions ranging
from systems programmer to security engineer to HIPAA security officer and ISSO.
He is lead author of MGT414: SANS Training Program for CISSP
®
Certification, and
co-author of SANS SEC511: Continuous Monitoring and Security Operations and
SANS SEC542: Web App Penetration Testing and Ethical Hacking. Eric graduated
from the SANS Technology Institute with a Master of Science degree in Information
Security Engineering. He earned his Bachelor of Arts in English from Bridgewater
State College. Eric lives in Peaks Island, Maine, with his family, Melissa, Eric, and
Emma. His website is
http://ericconrad.com.
Seth Misenar
(CISSP, GIAC GSE, GSEC, GPPA, GCIA, GCIH, GCWN, GCFA,
GWAPT, GPEN) is a Cyber Security Expert who serves as Senior Instructor with
the SANS Institute and Principal Consultant at Context Security, LLC. He is num-
bered among the few security experts worldwide to have achieved the GIAC GSE
(#28) credential. Seth teaches a variety of cyber security courses for the SANS In-
stitute including two very popular courses for which he is lead author: the bestsell-
ing SEC511: Continuous Monitoring and Security Operations and SEC542: Web
Application Penetration Testing and Ethical Hacking. He also serves as co-author
for MGT414: SANS Training Program for CISSP
®
Certification. Seth’s background
includes security research, intrusion analysis, incident response, security architecture
design, network and web application penetration testing. He has previously served
as a security consultant for Fortune 100 companies, as well as, the HIPAA Security
Officer for a state government agency. Seth has a Bachelor of Science degree in
Philosophy from Millsaps College and resides in Jackson, Mississippi with his wife,
Rachel, and children, Jude, Hazel, and Shepherd.
Joshua Feldman
(CISSP) is a Vice President at the Moody’s Corporation – a bond
ratings agency critical to the security, health and welfare of the global commerce sec-
tor. He drives M&A, security architecture, design, and integration efforts for IT Risk
and InfoSec. Before taking on this promotion, Joshua was the Enterprise Security
Architect for Corning, Inc. At Corning, Joshua helped to deliver a slew of security
transformations for Corning and was a key team member focused on maturing the
security function. From 2002 until 2012, he worked as the Technical Director of a
xix
xx
About the Authors
US DoD cyber-security services contract. Supporting the DoD, he helped create the
current standard used for assessing cyber threats and analyzing potential adversaries
for impact. During his tenure, he supported many DoD organizations including the
Office of the Secretary of Defense, DISA, and the Combatant Commands. Joshua got
his start in the cyber security field when he left his high school science teaching posi-
tion in 1997 and began working for Network Flight Recorder (NFR, Inc.), a small
Washington, DC based startup making the first generation of Network Intrusion De-
tection Systems. He has a Bachelor’s of Science from the University of Maryland
and a Master’s in Cyber Operations from National Defense University. He currently
resides in New York, NY with his two dogs, Jacky and Lily.
Bryan Simon
(CISSP) is an internationally recognized expert in cybersecurity and
has been working in the information technology and security field since 1991. Over
the course of his career, Bryan has held various technical and managerial positions
in the education, environmental, accounting, and financial services sectors. Bryan
speaks on a regular basis at international conferences and with the press on matters
of cybersecurity. He has instructed individuals from organizations such as the FBI,
NATO, and the UN in matters of cybersecurity, on three continents. Bryan has spe-
cialized expertise in defensive and offensive capabilities. He has received recogni-
tion for his work in I.T. Security, and was most recently profiled by McAfee (part
of Intel Security) as an I.T. Hero. Bryan holds 11 GIAC Certifications including
GSEC, GCWN, GCIH, GCFA, GPEN, GWAPT, GAWN, GISP, GCIA, GCED, and
GCUX. Bryan’s scholastic achievements have resulted in the honour of sitting as a
current member of the Advisory Board for the SANS Institute, and his acceptance
into the prestigious SANS Cyber Guardian program. Bryan is a SANS Certified In-
structor for SEC401: Security Essentials Bootcamp Style, SEC501: Advanced Secu-
rity Essentials – Enterprise Defender, SEC505: Securing Windows with Powershell
and the Critical Security Controls, and SEC511: Continuous Monitoring and Secu-
rity Operations. Bryan dedicates this book to his little boy, Jesse. Daddy loves you!
Acknowledgments
Eric Conrad:
I need to first thank my wife, Melissa, and my children, Eric and
Emma, for their love and patience while I wrote this book. Thank you to the contrib-
uting authors and my friends Joshua Feldman and Seth Misenar.
Thank you to my teachers and mentors: Thank you, Miss Gilmore, for sending
me on my way. Thank you, Dave Curado and Beef Mazzola, for showing me the right
way to do it. Thank you, Stephen Northcutt, Alan Paller, Deb Jorgensen, Scott Weil,
Eric Cole, Ed Skoudis, Johannes Ullrich, Mike Poor, Ted Demopoulos, Jason Fossen,
Kevin Johnson, John Strand, Jonathan Ham, and many others from the SANS Insti-
tute, for showing me how to take it to the next level.
I would like to thank the supergroup of information security professionals who
answered my last-minute call and collectively wrote the 500 questions compris-
ing the two sets of online practice exams: Rodney Caudle, David Crafts, Bruce
Diamond, Jason Fowler, Philip Keibler, Warren Mack, Eric Mattingly, Ron Reidy,
Mike Saurbaugh, and Gary Whitsett.
Seth Misenar:
I would like to thank my wife, Rachel, the love of my life, who
showed continued patience, support, and strength while entertaining two young
children throughout this writing process. I am grateful to my children, Jude, Hazel,
and Shepherd who were amazingly gracious when Daddy had to write. And I count
myself lucky to have such wonderful parents, Bob and Jeanine, who, as always,
provided much of their time to ensure that my family was taken care of during this
writing period.
xxi
Zgłoś jeśli naruszono regulamin