X

CISSP Bundle, Fourth Edition

Product ID : 34426735


Galleon Product ID 34426735
Model
Manufacturer
Shipping Dimension Unknown Dimensions
I think this is wrong?
-
7,846

*Price and Stocks may change without prior notice
*Packaging of actual item may differ from photo shown

Pay with

About CISSP Bundle, Fourth Edition

Product Description Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Prepare for the 2018 CISSP exam with this up-to-date, money-saving study package Designed as a complete self-study program, this collection offers a wide variety of proven, exam-focused resources to use in preparation for the current edition of the CISSP exam. The set bundles the eighth edition of Shon Harris’ bestselling CISSP All-in-One Exam Guide and CISSP Practice Exams, Fifth Edition―. You will gain access to a variety of comprehensive resources to get ready for the challenging exam.  CISSP Bundle, Fourthe Edition fully covers all eight exam domains and offers real-world insights from the authors’ professional experiences. More than 2500 accurate practice exam questions are provided, along with in-depth explanations of both the correct and incorrect answers. The included Total Tester test engine provides full-length, timed simulated exams or customized quizzes that target selected chapters or exam objectives. • Presents 100% coverage of the 2018 CISSP Exam • Includes special discount to Shon Harris Brand CISSP video training from Human Element Security • Written by leading experts in IT security certification and training From the Publisher Shon Harris, CISSP, was the founder and CEO of Shon Harris Security LLC and Logical Security LLC, a security consultant, a former engineer in the Air Force’s Information Warfare unit, and an instructor. She authored three bestselling CISSP books and was a contributing author to  Gray Hat Hacking: The Ethical Hacker’s Handbook and Security Information and Event Management (SIEM) Implementation. Fernando Maymí, Ph.D., CISSP, is a security practitioner with over 25 years of experience. He is currently the Lead Scientist in the cyber division at Soar Technology, Inc., where he researches and develops solutions at the intersection of cyberspace operations and artificial intelligence. Dr. Maymí is the author of over a dozen publications and holds three patents.  Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS training program for CISSP certification. He is co-author of  Network Forensics: Tracking Hackers through Cyberspace. About the Author Fernando Maymí (West Point, NY), Ph.D., CISSP is a security practitioner with over 25 years’ experience in the field. He is currently the Deputy Director at the Army Cyber Institute at West Point, where he leads a multidisciplinary team charged with developing disruptive innovations for cyberspace operations as well as impactful public-private partnerships aimed at better securing cyberspace. Dr. Maymí has served as a consultant for both government and private sector organizations in the US and abroad. He has authored and taught dozens of courses and workshops in cyber security for academic, government, and professional audiences in the United States and Latin America. Dr. Maymí is the author of over a dozen publications and holds three patents. His awards include the U.S. Department of the Army Research and Development Achievement Award and he was recognized as a HENAAC Luminary. He worked closely with Shon Harris for the last two years of her life, advising her on a multitude of projects, including the previous version of this book. Dr. Maymí is also a volunteer puppy raiser for Guiding Eyes for the Blind and has raised two guide dogs, Trinket and Virgo. Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen