Solved

CISSP materials and step by step

Posted on 2011-03-14
2
468 Views
Last Modified: 2012-05-11
Hi,
my friends i decided to study and apply for the CISSP exam so:
1- i need to know which book i should read .. should i read Shon Harris or CBK nd edition ?
2- if anyone has experience with that exam what is your recommendations to pass it ?

Thanks
0
Comment
Question by:F_A_H_D
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 14

Accepted Solution

by:
amichaell earned 500 total points
ID: 35131157
1. Shon Harris is by far the most recommended.  Still, don't read just one book.  And don't read just books geared specifically for the CISSP.  Sign up at cccure.org and read over the many files in the Main Library.  You will also want to read over the NIST documents.
0
 
LVL 10

Expert Comment

by:pand0ra_usa
ID: 35151485
Shon Harris is good. I would personally recommend a week long training class. NIST docs are very good docs but not for the CISSP exam. As for the exam what do you want to know about it? There is only so much anyone who has passed it can say about the exam itself (like we are not able to talk about the questions and such). I passed mine back in 2003 but I understand it has gotten easier from people who have taken it lately (but it's still not an easy test).
0

Featured Post

Edgartown IT Case Study

Learn about Edgartown's quest to ensure the safety and security of the entire town's employee and citizen data. Read the case study!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Businesses who process credit card payments have to adhere to PCI Compliance standards. Here’s why that’s important.
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malw…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question