Archiv:Security bei Kerzenschein/CISSP: Unterschied zwischen den Versionen
MiKa (Diskussion | Beiträge) →CISSP CBK Meetings: Title of first meeting adapted |
Pepi (Diskussion | Beiträge) K Pepi verschob die Seite Security bei Kerzenschein/CISSP nach Archiv:Security bei Kerzenschein/CISSP: No activity for 3 years |
||
(9 dazwischenliegende Versionen von 3 Benutzern werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
{{Vorlage:SbC_CISSP|subtitle=Portal}} | |||
{ | |||
{| | |||
== What to expect == | == What to expect == | ||
Zeile 72: | Zeile 31: | ||
'''Recommended Textbook:''' | '''Recommended Textbook:''' | ||
CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris | CISSP All-in-One Exam Guide, 5th Edition, by Shon Harris (6th Edition is current) | ||
* McGraw-Hill Osborne Media; (February 8, 2010) | * McGraw-Hill Osborne Media; (February 8, 2010) | ||
* ISBN-10: 0071602178 - ISBN-13: 978-0071602174 | * ISBN-10: 0071602178 - ISBN-13: 978-0071602174 | ||
Zeile 78: | Zeile 37: | ||
== Contributions and Discussions == | == Contributions and Discussions == | ||
* [[Security_by_Candlelight/CISSP/Material|Material]] | |||
* [[Security_by_Candlelight/CISSP/Access_Control|Access Control]] | * [[Security_by_Candlelight/CISSP/Access_Control|Access Control]] | ||
* [[Security_by_Candlelight/CISSP/Network_Security|Telecommunications and Network Security]] | * [[Security_by_Candlelight/CISSP/Network_Security|Telecommunications and Network Security]] | ||
Zeile 88: | Zeile 48: | ||
* [[Security_by_Candlelight/CISSP/Legal_and_Compliance|Legal, Regulations, Investigations and Compliance]] | * [[Security_by_Candlelight/CISSP/Legal_and_Compliance|Legal, Regulations, Investigations and Compliance]] | ||
* [[Security_by_Candlelight/CISSP/Physical_Security|Physical (Environmental) Security]] | * [[Security_by_Candlelight/CISSP/Physical_Security|Physical (Environmental) Security]] | ||
* [[Security_by_Candlelight/CISSP/Glossary|Glossary]] | |||
== CISSP CBK Meetings == | == CISSP CBK Meetings == | ||
Zeile 93: | Zeile 54: | ||
{| border="2" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;" | {| border="2" cellspacing="0" cellpadding="2" width="100%" style="border-collapse:collapse;" | ||
|width="25"| # ||width="280"| Date || Topic and Host(s) | |width="25"| # ||width="280"| Date || Topic and Host(s) | ||
|- | |||
| #02 || [[Security_by_Candlelight/CISSP/CBK_Review_02|2013-03-05 Tue 19:00]] || TBA | |||
|- | |||
| #01 || [[Security_by_Candlelight/CISSP/CBK_Review_01|2013-02-05 Tue 19:00]] || '''CISSP CBK:''' Definitions, Terms and Vocabulary | |||
|- | |- | ||
| #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br> | | #00 || [[Security_by_Candlelight/CISSP/SBC13_CISSP_CBK_Review_00|2013-01-22 Tue 19:00]] || '''Revival of Security by Candlelight: CISSP CBK Zero Day''' <br>Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review. Based on a Creative Commons Training by Alfred Ouyang<br> |