Tag Archives: CISSP Study Requirements

20150415 = Changes to CISSP Domains

Q: How is the CISSP exam changing? A: The CISSP exam is being updated to stay relevant amidst the changes occurring in the information security field. Refreshed technical content has been added to the Official (ISC)² CISSP CBK to reflect … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 20150415 = Changes to CISSP Domains

Be a CISSP!

Avoid this frustration Be a C. I. Double S. P. To be honest, since I passed my exam in January, I feel I’ve been even more a respected member at work. The bolded ones below are the ones I’ve studied … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Be a CISSP!

Some CISSP Webcasts

Some CISSP Webcasts that I reviewed last year prior to my test, which I passed in January of 2014. Access Control  Telecommunications and Network Security  Information Security Governance and Risk Management  Application Development Security  Cryptography  Security Architecture and Design  Operations … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Some CISSP Webcasts

19. Exam Essentials for Physical Security

Without control over the physical environment, you can’t have adequate security with as much administrative or technical/logical control you through at it. If a malicious person can gain physical access to your facility or equipment, they can do whatever they … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 19. Exam Essentials for Physical Security

18. Exam Essentials for Incidents and Ethics

Computer crime is a crime that is directed against, or directly involves, a computer. Computer crimes are grouped into six categories: military, business, financial, terrorist, grudge, and thrill. As soon as you discover an incident, you must being to collect … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 18. Exam Essentials for Incidents and Ethics

17. Exam Essentials for Laws, Regulations, and Compliance

The differences between criminal law, civil law,and administrative law are: Criminal law protects society against acts that violate the basic principles we believe in. Violations of criminal law are prosecuted by federal and state governments. Civil law provides the framework … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 17. Exam Essentials for Laws, Regulations, and Compliance

16. Exam Essentials for Disaster Recovery Planning

Natural disasters that commonly threaten organizations include earthquakes, floods, storms, fires, tsunamis, and volcanic eruptions. Explosions, electrical fires, terrorist acts, power outages, other utility failures, infrastructure failures, hardware/software failures, labor difficulties, theft, and vandalism are all common man-made disasters. The … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 16. Exam Essentials for Disaster Recovery Planning

15. Exam Essentials for Business Continuity Planning

Business continuity planning involves four distinct phases: project scope and planning, business impact assessment, continuity planning, and approval and implementation. Each task contributes to the overall goal of ensuring that business operations continue uninterrupted in the face of an emergency … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 15. Exam Essentials for Business Continuity Planning

14. Exam Essentials for Incident Management

Incident response steps are specifically listed in the CIB as: Detection Response Reporting Recovery Remediation and Review Once an incident is detected, the first response sohould be to limit or contain the scope fo the incident while protecting evidence. Based … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 14. Exam Essentials for Incident Management

13. Exam Essentials for Security Operations

Need to Know & The principle of least privilege are two standard IT security principles implemented in secure networks. They limit access to data and system so that users and other subjects have access only to what they require. When … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 13. Exam Essentials for Security Operations