CISSP (Certified Information Systems Security Professional) What you'll learn CHAPTER 1-Blue Team MethodologyCHAPTER 2-Intro to LinuxCHAPTER 3-Identity and Access (IAM)CHAPTER 4-Vulnerability ScanningCHAPTER 5-Linux FirewallsCHAPTER 6-Security Information and Event Management (SIEM)CHAPTER 7-Incident Response ToolkitCHAPTER 8-Digital ForensicsCHAPTER 9-SOAR – Security Orchestration Automation ResponseCHAPTER 10-Policies to Mitigate RiskCHAPTER 11-Software Development Life Cycle (SDLC)CHAPTER 12-Setting Localization OptionsCHAPTER 13-Sifting through ServicesCHAPTER 14-Threat and Vulnerability ManagementCHAPTER 15-Cryptography and PKICHAPTER 16-Package Management and RepositoriesCHAPTER 17-Mobile Device HackingCHAPTER 18-Kali Linux Bash ScriptingCHAPTER 19-Recruiting Blue Team Members CISSP (Certified Information Systems Security Professional) CISSP (Certified Information Systems Security Professional) e-Book Buy now CISSP (Certified Information Systems Security Professional) Text book Buy now