Introduction
  • Introduction
  • CISSP ALL 8 DOMAINS
Domain 1 (Security and Risk Management)
  • CIA TRIAD
  • IAAA (Identification, authentication, authorization & accounting)
  • Non Repudiation
  • Protecting Mechanism Layering
  • Abstraction, Data Hiding & Encryption
  • Security Governamance, security Plans, Control Management, Data Classification
  • Security Roles, Types Of Security Policies, Security Procedures & Standards
  • Threat Modelying, Identify Threats, reduction analysis & Rank of threats
Domain 2 (Personal Security & Risk Management)
  • Risk, Control, Agreement & Policies & candidate screening
  • Business Continuity Process
  • Law Regulations & Compliance
  • Protecting Security Assets
  • Cryptography and symmetric key algorithm
  • Hash Function & Digital Signature
  • IPSEC, cryptographic attack
DOMAIN 3 (Security Engineering)
  • SECURITY VULNERABILITIES
  • BYOD
  • CACHE RAM
  • Cloud Computing
  • Device Security
  • Security Engineering
Domain 4 (communication and Network Security)
  • OSI Reference Model
  • OSI 7 LAYERS
  • TCP/IP vs OSI
  • Three way Handshake
  • IP Address
  • DNS
  • WI-FI & Firewall
  • Collision Domain Vs Broadcast Domain
  • Cabling & Types
  • Authentication Protocol
  • VPN
  • Network Attacks
DOMAIN 5 (Identity and Access Management)
  • Password & Biometric Passwords
  • Types of ACCESS Control & SSO
  • AAA (Authentication, Authorization & Accounting)
  • Permission & Rights, Defense of Depth
  • DAC
  • NAC & Password Attacks
  • Protection Methods against Attacks
DOMAIN 6 (Security Assessment & Testing)
  • Security Assessment & Testing
  • Penetration Testing
  • Code Review
  • Interface Testing
Domain 7 (Security Operations)
  • Security Operations
  • Methods of Protecting Info
  • Change Management
  • Patch Management
  • Incident (Detection, Response & Document)
  • Basic Preventive Measures
  • IDS
  • Common Log Types
  • Monitoring, IDS/IPS
  • Audit Trails
  • Disaster & Recovery
  • Protecting Servers & Recovery
  • Recovery Strategy
  • Backup
  • Incident and Ethics
  • Investigation
Domain 8 (Software Development Security)
  • Generations of languages
  • OOPS Concepts
  • System Development Cycle
  • Life Cycle Model
  • Development Approach
  • Knowledge based system
  • Virus