Our study material recommendations.

Get the FULL CISSP 2024 bundle - All Videos, Practice Questions, ThorBot, Study Guides, Flashcards, Mnemonics, Glossary & More - Updated for 2024 Exam & 2024 Exam Ready!

πŸ’» 34 hours of CISSP videos
πŸ“ 4,300 CISSP questions, including:

πŸ“ 625 Hard CISSP questions
πŸ“ 3,250 Easy/Mid CISSP questions - both as exam emulation and domain tests.
πŸ“ 198 Topic quiz questions after each major knowledge area
πŸ“ 240 Domain practice questions (30 after each domain)

πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CISSP preparation.
πŸ“– CISSP Study Guides from the lectures (290 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– CISSP Quick Sheets (114 pages)
πŸ“– A CISSP study plan
πŸ“– CISSP Mnemonics
πŸ”— 500+ CISSP links
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ“… Updated for the 2024 curriculum.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 34 CPEs/CEUs.
πŸ”“ (Optional +$70) 700 Boson practice questions.

Get FREE "CISSP: How to study course".

πŸ’» 2.5 hours of videos on how to study for your CISSP, find the materials, make your own study plan, approach practice questions, and much more.
πŸ“– An 18-page study guide made from all the videos with links.
πŸ“– CISSP Mnemonics.
πŸ“– A CISSP study plan.
πŸ“… Updated for the 2024 curriculum.

Get Luke Ahmed's full CISSP course! - 2024 Exam Ready

πŸ’» 44 hours of CISSP videos
πŸ“ 800 CISSP practice questions
πŸ“– 1,450 flashcards
$44.99 per month, $119.99 for 3 months

Get ALL my CISSP questions - Easy/Mid/Hard - 2024 Updated

πŸ“ 3,875 CISSP questions, including:
πŸ“ 625 Hard CISSP questions
πŸ“ 3,250 Easy/Mid CISSP questions - both as exam emulation and domain tests.
πŸ“– CISSP Mnemonics
πŸ“… 2024 curriculum updated.
πŸ“… Lifetime or 12-months unlimited access
πŸ”“ (Optional +$75) 700 Boson practice questions.

Get ALL my HARD CISSP questions

πŸ“ 625 Hard CISSP questions
πŸ“– CISSP Mnemonics
πŸ“… 2024 curriculum updated.
πŸ“… Lifetime or 12-months unlimited access
πŸ”“ (Optional +$75) 700 Boson practice questions.

Get the FULL CISSP 2024 bundle - All Videos, Practice Questions, ThorBot, Study Guides, Flashcards, Mnemonics, Glossary & More - Updated for 2024 Exam & 2024 Exam Ready!

πŸ’» 34 hours of CISSP videos
πŸ“ 4,300 CISSP questions, including:

πŸ“ 625 Hard CISSP questions
πŸ“ 3,250 Easy/Mid CISSP questions - both as exam emulation and domain tests.
πŸ“ 198 Topic quiz questions after each major knowledge area
πŸ“ 240 Domain practice questions (30 after each domain)

πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CISSP preparation.
πŸ“– CISSP Study Guides from the lectures (290 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– CISSP Quick Sheets for your review sessions (114 pages)
πŸ“– A CISSP study plan
πŸ“– CISSP Mnemonics
πŸ”— 500+ CISSP links
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ“… 2024 curriculum updated.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 32 CPEs/CEUs.
πŸ”“ (Optional +$70) 700 Boson practice questions.

Get Luke Ahmed's full CISSP course! - 2024 Exam Ready

πŸ’» 44 hours of CISSP videos
πŸ“ 800 CISSP practice questions
πŸ“–1,450 flashcards
$44.99 per month, $119.99 for 3 months

Get the 700 CISSP Boson questions at a discount! <- Estimated update early June 2024

Boson ExSim-Max for CISSP
As a current student of ThorTeaches, you can get a discount on the Boson test.

The CISSP AIO book

2024 version – CISSP All-in-One Exam Guide 10th Edition – No publication date yet. For the 2021 update the AIO CISSP book was out in December.

2021 version – CISSP All-in-One Exam Guide 9th Edition – ~$68

Luke Ahmed's Think like a manager - 2024 Ready

How To Think Like A Manager for the CISSP Exam – Luke Ahmed ~$10-19

Wentz Wu's Effective CISSP - 2024 Ready

The Effective CISSP: Security and Risk Management – Wentz Wu $10 – 30

Get FREE "CISSP: How to study course".

πŸ’» 2.5 hours of videos on how to study for your CISSP, find the materials, make your own study plan, approach practice questions, and much more.
πŸ“– An 18-page study guide made from all the videos with links.
πŸ“– CISSP Mnemonics.
πŸ“– A CISSP study plan.
πŸ“… 2021 curriculum updated, 2022 exam updated, 2023, and 2024 updated.

Get our FREE CISSP/CISM Mnemonics!

Free questions:

Free CISSP practice questions Elsevier (2015 version)

Free daily CISSP practice questions (Facebook group)

Wentz Wu QOTD (Blog)

Adam Gordon QOTD (LinkedIn)

IT Dojo (YouTube)

Study Guides:

Study guide (free) – The memory palace – Prashant Mohan v5.0 – 2024 Exam Ready

Study guide (free) – Sunflower notes – Maarten de Frankrijker v2.0

Study guide (free) – CISSP Process guide – Fadi Sodah (madunix) v21.0

Study guide – CISSP notes – Luc Desfosses

Other:

CISSP Glossary – Student Guide

ISACA Cybersecurity Fundamentals Glossary

NIST – RMF for Systems and Organizations Introductory Course

Flash cards – Brainscrape

Awesome Security – Github

GDPR – Advisera

OWASP top 10 – 2013

OWASP top 10 – 2017

OWASP top 10 – 2021

All relevant NIST documents

NIST 800-30 – Guide for Conducting Risk Assessments
https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final

NIST 800-12 – An Introduction to Information Security
https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final

NIST 800-34 – Contingency Planning Guide for Information Technology SystemsΒ https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final

NIST 800-37 – Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final

NIST 800-39 – Managing Information Security Risk: Organization, Mission, and Information System View
https://csrc.nist.gov/publications/detail/sp/800-39/final

NIST 800-53 – Security and Privacy Controls for Federal Information Systems and Organization
https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final

https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft

NIST 800-86 – Guide to Integrating Forensic Techniques into Incident ResponseΒ https://csrc.nist.gov/publications/detail/sp/800-86/final

NIST 800-88 – Guidelines for Media Sanitization
https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final

NIST 800-115 – Technical Guide to Information Security Testing and AssessmentΒ Β 
https://csrc.nist.gov/publications/detail/sp/800-115/final

NIST 800-128 – Guide for Security-Focused Configuration Management of Information SystemsΒ https://csrc.nist.gov/publications/detail/sp/800-128/final

NIST 800-137 – Information Security Continuous Monitoring
https://csrc.nist.gov/publications/detail/sp/800-137/final

NIST 800-145 – The NIST Definition of Cloud Computing
https://csrc.nist.gov/publications/detail/sp/800-145/final

NIST 800-46 – Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
https://csrc.nist.gov/publications/detail/sp/800-46/rev-2/final

NIST 800-61 Computer Security Incident Handling Guide
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

Β NIST 800-160Β Β Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems
https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final

CISSP Links:

If a link is broken please let me know so I can fix it!

ISC2 and the CISSP certification links:

Waterfall Modelhttps://en.wikipedia.org/wiki/Waterfall_model
The ThorTeaches Discordhttps://discord.thorteaches.com/
Cybersecurity Job Openings Articlehttps://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/
Cybersecurity Jobshttps://cybersecurityventures.com/jobs/
CyberSeek Heatmaphttps://www.cyberseek.org/heatmap.html
The ThorTeaches Facebook Grouphttps://www.facebook.com/groups/ThorTeaches
The ThorTeaches Websitehttps://thorteaches.com/
Brief History of the Internethttps://www.internetsociety.org/internet/history-internet/brief-history-internet-related-networks
Cybersecurity Job Markethttps://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/2/
ISC2https://en.wikipedia.org/wiki/ISC2
ISC2 Communityhttps://community.isc2.org/
ISC2 Exam Candidateshttps://www.isc2.org/candidate
ISC2 Qualification Pathfinderhttps://www.isc2.org/Certifications/Qualification-Pathfinder
Registering for ISC2 Examhttps://www.isc2.org/Register-for-Exam
Associate of ISC2 Programhttps://www.isc2.org/Certifications/Associate
CISSPhttps://en.wikipedia.org/wiki/Certified_Information_Systems_Security_Professional
CISSP Certification Informationhttps://www.isc2.org/Certifications/CISSP
CISSP Certification Stepshttps://www.isc2.org/Certifications/CISSP#Certification%20&%20Membership
CISSP Exam Outlinehttps://www.isc2.org/certifications/cissp/cissp-certification-exam-outline
Register for your ISC2 examhttps://my.isc2.org/s/ISC2-Pearson

CISSP certification 2021 Domain (Common body of knowledge) domains:

Domain 1: Security and Risk Management

DescriptionLink
Computer Fraud and Abuse Act of 1986 (CFAA)Β https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
CIA Triadhttps://en.wikipedia.org/wiki/Information_security#Key_concepts
COBIThttp:https:https://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
Computer Ethics Principleshttps://en.wikipedia.org/wiki/Computer_Ethics_Institute
Copyrighthttps://en.wikipedia.org/wiki/Copyright
Copyright Fair Use Indexhttps://www.copyright.gov/fair-use/
Corporate IT governancehttps://en.wikipedia.org/wiki/IT_governance
Due Diligencehttps://en.wikipedia.org/wiki/Due_diligence
Electronic Communications Privacy Act of 1986Β (ECPA)Β https://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act
EU Artificial Intelligence Act (AI Act)Β https://en.wikipedia.org/wiki/Artificial_Intelligence_Act
European Union Agency for Cybersecurity (ENISA)https://www.enisa.europa.eu/
Framework for Improving Critical Infrastructure Cybersecurityhttps://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Gap Analysishttps://en.wikipedia.org/wiki/Gap_analysis
General Data Protection Regulation (GDPR)https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
Gramm-Leach-Bliley Acthttps://en.wikipedia.org/wiki/Gramm–Leach–Bliley_Act
Governance, risk management, and compliance (GRC)https://en.wikipedia.org/wiki/Governance,_risk_management,_and_compliance
HIPAAhttps://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
Information privacyhttps://en.wikipedia.org/wiki/Information_privacy
Information privacy lawhttps://en.wikipedia.org/wiki/Information_privacy_law
Information securityhttps://en.wikipedia.org/wiki/Information_security
Information Security Governancehttps://en.wikipedia.org/wiki/Information_security_governance
Information Security Managementhttps://en.wikipedia.org/wiki/Information_security_management
Information security policieshttps://en.wikipedia.org/wiki/Information_security_policy
Intellectual propertyhttps://en.wikipedia.org/wiki/Intellectual_property
ISOhttps://en.wikipedia.org/wiki/International_Organization_for_Standardization
ISO/IEC 27000-Serieshttps://en.wikipedia.org/wiki/ISO/IEC_27000-series
IT lawhttps://en.wikipedia.org/wiki/Information_technology_law
NIST SP 800-30 Frameworkhttps://en.wikipedia.org/wiki/IT_risk_management#NIST_SP_800_30_framework
Non-Disclosure Agreementhttps://en.wikipedia.org/wiki/Non-disclosure_agreement
OECD Privacy Frameworkhttps://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf
Organizational Processeshttps://en.wikipedia.org/wiki/Organizational_structure
Patenthttps://en.wikipedia.org/wiki/Patent
Patriot Acthttps://en.wikipedia.org/wiki/Patriot_Act
PCI-DSShttps://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Sarbanes-Oxley Acthttps://en.wikipedia.org/wiki/Sarbanes–Oxley_Act
Security Breach Notification Lawshttps://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Trademarkhttps://en.wikipedia.org/wiki/Trademark
PCI Security Standards Councilhttps://www.pcisecuritystandards.org/pci_security/
ISO 22301 Standardhttps://en.wikipedia.org/wiki/ISO_22301
COBIT ISACA resourceshttps://www.isaca.org/resources/cobit
Committee of Sponsoring Organizations (COSO)Β https://en.wikipedia.org/wiki/Committee_of_Sponsoring_Organizations_of_the_Treadway_Commission
End-User License Agreement (EULA)https://en.wikipedia.org/wiki/End-user_license_agreement
FedRAMPhttps://en.wikipedia.org/wiki/Federal_Risk_and_Authorization_Management_Program
NISThttps://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology
NIST SP 800-12 Rev. 1https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final
NIST SP 800-37 Rev. 1https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
NIST SP 800-37 Rev. 2https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
NIST SP 800-53https://en.wikipedia.org/wiki/NIST_Special_Publication_800-53
IT Riskhttps://en.wikipedia.org/wiki/IT_risk
IT risk managementhttps://en.wikipedia.org/wiki/IT_risk_management
Riskhttps://en.wikipedia.org/wiki/Risk
Risk – Attackers/Attackshttps://en.wikipedia.org/wiki/Cyberattack
Risk Assessmenthttps://en.wikipedia.org/wiki/Risk_management#Risk_assessment_and_analysis
Risk Managementhttps://en.wikipedia.org/wiki/Risk_management
Risk management toolshttps://en.wikipedia.org/wiki/Risk_management_tools
Threat Modelinghttps://en.wikipedia.org/wiki/Threat_model
Threat Modeling Process Articlehttps://www.experts-exchange.com/articles/33330/Threat-Modeling-Process-Basics-and-Purpose.html
Key Risk Indicatorhttps://en.wikipedia.org/wiki/Key_risk_indicator
Supply chain risk managementhttps://en.wikipedia.org/wiki/Supply_chain_risk_management
Separation of dutieshttps://en.wikipedia.org/wiki/Separation_of_duties
Security Awareness Traininghttps://en.wikipedia.org/wiki/Internet_Security_Awareness_Training
Software supply chainhttps://en.wikipedia.org/wiki/Software_supply_chain
Business continuityhttps://en.wikipedia.org/wiki/Business_continuity
Business Continuity Planninghttps://en.wikipedia.org/wiki/Business_continuity_planning
ISC2 Ethicshttps://www.isc2.org/Ethics
OCTAVEhttp:https:https://www.cert.org/resilience/products-services/octave/index.cfm
The Business Continuity Institutehttps://www.thebci.org/
Capital Expenditurehttps://en.wikipedia.org/wiki/Capital_expenditure
Center for Internet Security (CIS)https://www.cisecurity.org
ITIL Frameworkhttps://en.wikipedia.org/wiki/ITIL
Montreal Protocolhttps://en.wikipedia.org/wiki/Montreal_Protocol
Operating Expensehttps://en.wikipedia.org/wiki/Operating_expense
RACI Chartshttps://en.wikipedia.org/wiki/Responsibility_assignment_matrix
Rainbow Serieshttps://en.wikipedia.org/wiki/Rainbow_Series
SABSAhttps://en.wikipedia.org/wiki/Sherwood_Applied_Business_Security_Architecture
SWOT Analysishttps://en.wikipedia.org/wiki/SWOT_analysis
Wassenaar Arrangementhttps://en.wikipedia.org/wiki/Wassenaar_Arrangement

Domain 2: Asset Security

Β Β 
Security Clearancehttps://en.wikipedia.org/wiki/Security_clearance
Data Classificationhttps://en.wikipedia.org/wiki/Data_classification_(business_intelligence)
Data Collectionhttps://en.wikipedia.org/wiki/Data_collection
Data Retentionhttps://en.wikipedia.org/wiki/Data_retention
Digital rights management (DRM)Β https://en.wikipedia.org/wiki/Digital_rights_management
Asset managementhttps://en.wikipedia.org/wiki/Asset_management
Software as a Service (SaaS)https://en.wikipedia.org/wiki/Software_as_a_service
Data at resthttps://en.wikipedia.org/wiki/Data_at_rest
Data Destructionhttps://en.wikipedia.org/wiki/Data_erasure
Data in transithttps://en.wikipedia.org/wiki/Data_in_transit
Data in usehttps://en.wikipedia.org/wiki/Data_in_use
Data Protection Methodshttps://en.wikipedia.org/wiki/Data_protection
Data Remanencehttps://en.wikipedia.org/wiki/Data_remanence
Data loss prevention (DLP) softwareΒ https://en.wikipedia.org/wiki/Data_loss_prevention_software
Information Lifecyclehttps://en.wikipedia.org/wiki/Information_lifecycle_management
Modern Encryptionhttps://en.wikipedia.org/wiki/Cryptography#Modern_cryptography
Chain of trusthttps://en.wikipedia.org/wiki/Chain_of_trust
Firmwarehttps://en.wikipedia.org/wiki/Firmware
Flash Memoryhttps://en.wikipedia.org/wiki/Flash_memory
Memory Protectionhttps://en.wikipedia.org/wiki/Memory_protection
Verification and Validationhttps://en.wikipedia.org/wiki/Verification_and_validation
Data Definition Language (DDL)https://en.wikipedia.org/wiki/Data_definition_language
Data Manipulation Language (DML)https://en.wikipedia.org/wiki/Data_manipulation_language
Random-Access Memory (RAM)https://en.wikipedia.org/wiki/Random-access_memory
Read-Only Memory (ROM)https://en.wikipedia.org/wiki/Read-only_memory

Domain 3: Security Architecture and Engineering

Β Β 
Privacy by Designhttps://en.wikipedia.org/wiki/Privacy_by_design
Cloud Security Alliance (CSA)https://cloudsecurityalliance.org
Requirements Analysishttps://en.wikipedia.org/wiki/Requirements_analysis
Computer Securityhttps://en.wikipedia.org/wiki/Computer_security
Security Modelshttps://en.wikipedia.org/wiki/Computer_security_model
Bell-LaPadula Modelhttps://en.wikipedia.org/wiki/Bell-LaPadula_model
Biba Modelhttps://en.wikipedia.org/wiki/Biba_Model
Clark–Wilson modelhttps://en.wikipedia.org/wiki/Clark–Wilson_model
Graham-Denning Modelhttps://en.wikipedia.org/wiki/Graham-Denning_model
Physical securityhttps://en.wikipedia.org/wiki/Physical_security
Cloud Sccess Security Broker (CASB)Β https://en.wikipedia.org/wiki/Cloud_access_security_broker
Cloud computinghttps://en.wikipedia.org/wiki/Cloud_computing
Cloud computing securityhttps://en.wikipedia.org/wiki/Cloud_computing_security
Cloud Security Articlehttps://www.experts-exchange.com/articles/32132/Better-Security-in-the-Cloud.html
Cloud Security Threats Articlehttps://www.experts-exchange.com/articles/31744/Cloud-Security-Threats-Risks-and-Concerns.html
Containerizationhttps://en.wikipedia.org/wiki/OS-level_virtualization
Defense in Depthhttps://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Distributed Systemshttps://en.wikipedia.org/wiki/Distributed_computing
Edge Computinghttps://en.wikipedia.org/wiki/Edge_computing
Embedded Systemshttps://en.wikipedia.org/wiki/Embedded_system
Hypervisorhttps://en.wikipedia.org/wiki/Hypervisor
Industrial Control Systemshttps://en.wikipedia.org/wiki/Industrial_control_system
Infrastructure as a Service (IaaS)https://en.wikipedia.org/wiki/Infrastructure_as_a_service
Internet of thingsΒ (IoT)Β https://en.wikipedia.org/wiki/Internet_of_things
IoT Security Guidelineshttps://www.experts-exchange.com/articles/33356/Internet-of-Things-Guidelines-to-prevent-common-IoT-security-risks.html
Platform as a Service (PaaS)https://en.wikipedia.org/wiki/Platform_as_a_service
Serverless Computinghttps://en.wikipedia.org/wiki/Serverless_computing
Virtual Private Cloudhttps://en.wikipedia.org/wiki/Virtual_private_cloud
Virtualized Systemshttps://en.wikipedia.org/wiki/Virtualization
Asymmetric Encryptionhttps://en.wikipedia.org/wiki/Public-key_cryptography
Cryptographic Noncehttps://en.wikipedia.org/wiki/Cryptographic_nonce
Cryptographyhttps://en.wikipedia.org/wiki/Cryptography
Digital Signatureshttps://en.wikipedia.org/wiki/Digital_signature
Encryptionhttps://en.wikipedia.org/wiki/Encryption
Hashinghttps://en.wikipedia.org/wiki/Hash_function
Hybrid Cryptosystemhttps://en.wikipedia.org/wiki/Hybrid_cryptosystem
Initialization Vectorhttps://en.wikipedia.org/wiki/Initialization_vector
IPSechttps://en.wikipedia.org/wiki/Ipsec
Key Managementhttps://en.wikipedia.org/wiki/Key_management
One-Time Padhttps://en.wikipedia.org/wiki/One-time_pad
Pretty Good Privacy (PGP)https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Public Key Infrastructurehttps://en.wikipedia.org/wiki/Public_key_infrastructure
Secure Defaultshttps://en.wikipedia.org/wiki/Secure_by_default
Secure Design Principleshttps://en.wikipedia.org/wiki/Secure_by_design
Security by Design Principleshttps://wiki.owasp.org/index.php/Security_by_Design_Principles
Symmetric Encryptionhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
Architectural Designhttps://en.wikipedia.org/wiki/Software_architecture
Common Criteriahttps://en.wikipedia.org/wiki/Common_Criteria
Covert Channelshttps://en.wikipedia.org/wiki/Covert_channel
Emerging Technologieshttps://en.wikipedia.org/wiki/Emerging_technologies
Fault Injectionhttps://en.wikipedia.org/wiki/Fault_injection
Hardware Architecturehttps://en.wikipedia.org/wiki/Computer_architecture
Harrison-Ruzzo-Ullman (HRU) Modelhttps://en.wikipedia.org/wiki/HRU_(security)
MicroservicesΒ https://en.wikipedia.org/wiki/Microservices
Multilevel securityhttps://en.wikipedia.org/wiki/Multilevel_security
Operating System Kernelhttps://en.wikipedia.org/wiki/Kernel_(operating_system)
Server (computing)https://en.wikipedia.org/wiki/Server_(computing)
System integrationhttps://en.wikipedia.org/wiki/Systems_integration
Trusted Computer System Evaluation Criteria (TCSEC)https://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria
Trusted Platform Modulehttps://en.wikipedia.org/wiki/Trusted_Platform_Module
Cybercrimes/Data Breacheshttps://en.wikipedia.org/wiki/Cybercrime
Warfare/Terrorism/Ransomwarehttps://en.wikipedia.org/wiki/Cyberterrorism
Fire Suppressionhttps://en.wikipedia.org/wiki/Fire_suppression_system
Attacks on Cryptographyhttps://en.wikipedia.org/wiki/Cryptanalysis
Brute Force Attackhttps://en.wikipedia.org/wiki/Brute-force_attack
MITM Attackhttps://en.wikipedia.org/wiki/Man-in-the-middle_attack
History of Cryptographyhttps://en.wikipedia.org/wiki/History_of_cryptography
Fire Classeshttps://en.wikipedia.org/wiki/Fire_class
KISS principlehttps://en.wikipedia.org/wiki/KISS_principle
Object Databasehttps://en.wikipedia.org/wiki/Object_database
Object Request Broker (ORB)https://en.wikipedia.org/wiki/Object_request_broker
SIGABAhttps://en.wikipedia.org/wiki/SIGABA
Stuxnethttps://en.wikipedia.org/wiki/Stuxnet
Take-Grant Protection Modelhttps://en.wikipedia.org/wiki/Take-grant_protection_model
Web-oriented architecturehttps://en.wikipedia.org/wiki/Web-oriented_architecture
Zachman Frameworkhttps://en.wikipedia.org/wiki/Zachman_Framework

Domain 4: Communication and Network Security

Β Β 
Address Resolution Protocol (ARP)https://en.wikipedia.org/wiki/Address_Resolution_Protocol
Bluetoothhttps://en.wikipedia.org/wiki/Bluetooth
Cellular Networkhttps://en.wikipedia.org/wiki/Cellular_network
Cellular/Mobile Networkshttps://en.wikipedia.org/wiki/Mobile_telephony
Challenge-Handshake Authentication Protocol (CHAP)https://en.wikipedia.org/wiki/Challenge-Handshake_Authentication_Protocol
Cisco Internetworking Basicshttp:https:https://www.ciscopress.com/articles/article.asp?p=31289
Classless Inter-Domain Routing (CIDR)https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing
Computer NetworkingΒ https://en.wikipedia.org/wiki/Computer_network
Content Distribution Networks (CDN)https://en.wikipedia.org/wiki/Content_delivery_network
Converged Protocolshttps://en.wikipedia.org/wiki/Converged_network
Data Communicationshttps://en.wikipedia.org/wiki/Data_transmission
Distance-Vector Routing Protocolhttps://en.wikipedia.org/wiki/Distance-vector_routing_protocol
Domain Name System (DNS)https://en.wikipedia.org/wiki/Domain_Name_System
Dynamic Host Configuration Protocol (DHCP)https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
Ethernethttps://en.wikipedia.org/wiki/Ethernet
Fiber-Optichttps://en.wikipedia.org/wiki/Fiber-optic_communication
File Transfer Protocol (FTP)https://en.wikipedia.org/wiki/File_Transfer_Protocol
Firewallshttps://en.wikipedia.org/wiki/Firewall_(computing)
Frame Relayhttps://en.wikipedia.org/wiki/Frame_Relay
Global Area Network (GAN)https://en.wikipedia.org/wiki/Global_area_network
Internet Assigned Numbers Authority (IANA)https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority
Internet Control Message Protocol (ICMP)https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
IP Addresseshttps://en.wikipedia.org/wiki/IP_address
IPv4https://en.wikipedia.org/wiki/IPv4
IPv6https://en.wikipedia.org/wiki/IPv6
Layer 1-3 Deviceshttps://en.wikipedia.org/wiki/Networking_hardware
MAC Addresshttps://en.wikipedia.org/wiki/MAC_address
Micro-Segmentationhttps://en.wikipedia.org/wiki/Microsegmentation
Modemshttps://en.wikipedia.org/wiki/Modem
Multiprotocol Label Switching (MPLS)https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching
Network Access Controlhttps://en.wikipedia.org/wiki/Network_access_control
Network Managementhttps://en.wikipedia.org/wiki/Network_management
Network Switchhttps://en.wikipedia.org/wiki/Network_switch
Network topologyhttps://en.wikipedia.org/wiki/Network_topology
OSI Modelhttps://en.wikipedia.org/wiki/OSI_model
Ping Networking Utilityhttps://en.wikipedia.org/wiki/Ping_(networking_utility)
Quality of Service (QoS)https://en.wikipedia.org/wiki/Quality_of_service
Remote access servicehttps://en.wikipedia.org/wiki/Remote_access_service
Remote Desktop Protocol (RDP)https://en.wikipedia.org/wiki/Remote_Desktop_Protocol
Remote desktop softwarehttps://en.wikipedia.org/wiki/Remote_desktop_software
Routerhttps://en.wikipedia.org/wiki/Router_(computing)
Routing Protocolshttps://en.wikipedia.org/wiki/Routing_protocol
Satellite Internet Accesshttps://en.wikipedia.org/wiki/Satellite_Internet_access
Secure Access Service Edgehttps://en.wikipedia.org/wiki/Secure_access_service_edge
Secure Communication Channelshttps://en.wikipedia.org/wiki/Secure_communication
Secure Shell (SSH)https://en.wikipedia.org/wiki/Secure_Shell
Simple Network Management Protocol (SNMP)https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
Software Defined Networkshttps://en.wikipedia.org/wiki/Software-defined_networking
TCP and UDP Port Numbershttps://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
TCP/IP Modelhttps://en.wikipedia.org/wiki/Internet_protocol_suite
Transmission Control Protocol (TCP)https://en.wikipedia.org/wiki/Transmission_Control_Protocol
Transmission Mediahttps://en.wikipedia.org/wiki/Transmission_medium
Twisted Pairhttps://en.wikipedia.org/wiki/Twisted_pair
User Datagram Protocol (UDP)https://en.wikipedia.org/wiki/User_Datagram_Protocol
Virtual Private Network (VPN)https://en.wikipedia.org/wiki/Virtual_private_network
VLANhttps://en.wikipedia.org/wiki/Virtual_LAN
Voice over IP (VoIP)https://en.wikipedia.org/wiki/Voice_over_IP
WAN Protocolshttps://en.wikipedia.org/wiki/Wide_area_network
WiFihttps://en.wikipedia.org/wiki/Wi-Fi
Wireless Access Pointhttps://en.wikipedia.org/wiki/Wireless_access_point
Wireless LANhttps://en.wikipedia.org/wiki/Wireless_LAN
Wireless Networkshttps://en.wikipedia.org/wiki/Wireless_network
Zero Trusthttps://en.wikipedia.org/wiki/Zero_trust_security_model
ZigBeehttps://en.wikipedia.org/wiki/ZigBee
Transport Layer SecurityΒ (TLS)Β https://en.wikipedia.org/wiki/Transport_Layer_Security
Denial-of-Service Attackhttps://en.wikipedia.org/wiki/Denial-of-service_attack
Eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
Intrusion detection systemhttps://en.wikipedia.org/wiki/Intrusion_detection_system
Carrier-Sense Multiple Access (CSMA)https://en.wikipedia.org/wiki/Carrier-sense_multiple_access
Coaxial Cablehttps://en.wikipedia.org/wiki/Coaxial_cable
Duplexhttps://en.wikipedia.org/wiki/Duplex_(telecommunications)
Diameter Protocolhttps://en.wikipedia.org/wiki/Diameter_(protocol)
Internet Architecture Boardhttps://en.wikipedia.org/wiki/Internet_Architecture_Board
Storage area network (SAN)Β https://en.wikipedia.org/wiki/Storage_area_network

Domain 5: Identity and Access Management (IAM)

Β Β 
Need to knowhttps://en.wikipedia.org/wiki/Need_to_know
IAAA Frameworkhttps://en.wikipedia.org/wiki/AAA_(computer_security)
Attribute-based access control (ABAC)https://en.wikipedia.org/wiki/Attribute-based_access_control
Access Controlhttps://en.wikipedia.org/wiki/Access_control
Access control link 2https://en.wikipedia.org/wiki/Information_security#Access_control
Access Control Matrixhttps://en.wikipedia.org/wiki/Access_Control_Matrix
Access managementhttps://en.wikipedia.org/wiki/Access_management
Active Directoryhttps://en.wikipedia.org/wiki/Active_Directory
Authenticationhttps://en.wikipedia.org/wiki/Authentication
Authorizationhttps://en.wikipedia.org/wiki/Authorization
Credential Management Systemshttps://en.wikipedia.org/wiki/Credential_Management
Discretionary access control (DAC)Β https://en.wikipedia.org/wiki/Discretionary_access_control
Federated Identity Management FIDMhttps://en.wikipedia.org/wiki/Federated_identity
Identity managementhttps://en.wikipedia.org/wiki/Identity_management
Identity Provisioninghttps://en.wikipedia.org/wiki/Provisioning_(technology)
Identity verification servicehttps://en.wikipedia.org/wiki/Identity_verification_service
Least Privilegehttps://en.wikipedia.org/wiki/Principle_of_least_privilege
Mandatory access control (MAC)https://en.wikipedia.org/wiki/Mandatory_access_control
Mobile Device Managementhttps://en.wikipedia.org/wiki/Mobile_device_management
Mobile Device Securityhttps://en.wikipedia.org/wiki/Mobile_security
Multi-factor authenticationhttps://en.wikipedia.org/wiki/Multi-factor_authentication
Mutual Authenticationhttps://en.wikipedia.org/wiki/Mutual_authentication
Network Authenticationhttps://en.wikipedia.org/wiki/Authentication_protocol
Password Authentication Protocol (PAP)https://en.wikipedia.org/wiki/Password_Authentication_Protocol
Privilege Escalationhttps://en.wikipedia.org/wiki/Privilege_escalation
Role-based access control (RBAC)https://en.wikipedia.org/wiki/Role-based_access_control
Service Accounts Managementhttps://en.wikipedia.org/wiki/Service_account
Single Sign-Onhttps://en.wikipedia.org/wiki/Single_sign-on
System Accesshttps://en.wikipedia.org/wiki/Access_control#Computer_security
Type 1 Authenticationhttps://en.wikipedia.org/wiki/Password
Type 3 Authenticationhttps://en.wikipedia.org/wiki/Biometrics
Challenge-Response Authenticationhttps://en.wikipedia.org/wiki/Challenge–response_authentication
Extensible Authentication Protocol (EAP)https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
Kerberoshttps://en.wikipedia.org/wiki/Kerberos_(protocol)
RADIUShttps://en.wikipedia.org/wiki/RADIUS
Saltinghttps://en.wikipedia.org/wiki/Salt_(cryptography)
Session Managementhttps://en.wikipedia.org/wiki/Session_(computer_science)
TACACShttps://en.wikipedia.org/wiki/TACACS
Security Account Managerhttps://en.wikipedia.org/wiki/Security_Account_Manager

Domain 6: Security Assessment and Testing

Β Β 
IT Security Audithttps://en.wikipedia.org/wiki/Information_security_audit
Auditing and Logginghttps://en.wikipedia.org/wiki/Audit_trail
Information security audithttps://en.wikipedia.org/wiki/Information_technology_security_audit
IT Auditshttps://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG9.aspx – DEAD
NIST SP 800-115https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
Security Auditshttps://en.wikipedia.org/wiki/Information_technology_audit
NIST SP 800-37https://en.wikipedia.org/wiki/NIST_Special_Publication_800-37
Vulnerability (computing)https://en.wikipedia.org/wiki/Vulnerability_(computing)
Vulnerability Assessmenthttps://en.wikipedia.org/wiki/Vulnerability_assessment
Security Assessmentshttps://en.wikipedia.org/wiki/IT_security_assessment
Vulnerability Assessments vs. Penetration Testshttps://www.experts-exchange.com/articles/31793/Vulnerability-Assessments-versus-Penetration-Tests.html
Security Controls Testinghttps://en.wikipedia.org/wiki/Security_testing
Vulnerability Mitigationhttps://en.wikipedia.org/wiki/Vulnerability_management
Core Security Penetration Testing Serviceshttp:https:https://www.coresecurity.com/
Code Review and Testinghttps://en.wikipedia.org/wiki/Code_review
Continuous Monitoringhttps://en.wikipedia.org/wiki/Continuous_monitoring
Kali Linuxhttps://www.kali.org/
Coverage Analysishttps://en.wikipedia.org/wiki/Code_coverage
Dynamic Testinghttps://en.wikipedia.org/wiki/Dynamic_testing
Social Engineeringhttps://en.wikipedia.org/wiki/Social_engineering_(security)
0-day Attackshttps://en.wikipedia.org/wiki/Zero-day_(computing)
Pen Testing Toolshttps://en.wikipedia.org/wiki/Penetration_test#Tools
Penetration Testinghttps://en.wikipedia.org/wiki/Penetration_test
Security Fuzzershttps://en.wikipedia.org/wiki/Fuzzing
Vulnerability Scannershttps://en.wikipedia.org/wiki/Vulnerability_scanner
Metasploithttps://metasploit.com/
Nessus Softwarehttps://en.wikipedia.org/wiki/Nessus_(software)
Password Crackinghttps://en.wikipedia.org/wiki/Password_cracking
Rainbow Tablehttps://en.wikipedia.org/wiki/Rainbow_table
Exception Handlinghttps://en.wikipedia.org/wiki/Exception_handling
Misuse Case Testinghttps://en.wikipedia.org/wiki/Misuse_case
SOC 1/2/3 reportshttps://en.wikipedia.org/wiki/System_and_Organization_Controls
SOC 2 Reporthttps://www.aicpa-cima.com/topic/audit-assurance/audit-and-assurance-greater-than-soc-2

Domain 7: Security Operations

Β Β 
Internal controlhttps://en.wikipedia.org/wiki/Internal_control
ISO/IEC 27031 Guidelineshttp:https:https://www.iso27001security.com/html/27031.html
NIST SP 800-34 Rev. 1https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf
NIST SP 800-92https://en.wikipedia.org/wiki/NIST_Special_Publication_800-92
Change Managementhttps://en.wikipedia.org/wiki/Change_management
NIST Publicationshttps://www.nist.gov/publications
NIST SP 800-128https://csrc.nist.gov/publications/detail/sp/800-128/final
Fire Sprinkler Systemhttps://en.wikipedia.org/wiki/Fire_sprinkler_system
Physical Information Securityhttps://en.wikipedia.org/wiki/Physical_information_security
AI in Securityhttps://en.wikipedia.org/wiki/Artificial_intelligence_for_cybersecurity
Antivirus softwarehttps://en.wikipedia.org/wiki/Antivirus_software
Application Positive-listinghttps://en.wikipedia.org/wiki/Whitelist
Configuration Managementhttps://en.wikipedia.org/wiki/Configuration_management
Endpoint Securityhttps://en.wikipedia.org/wiki/Endpoint_security
Keystroke Logginghttps://en.wikipedia.org/wiki/Keystroke_logging
Logging and Monitoringhttps://en.wikipedia.org/wiki/Log_management
Patch Managementhttps://en.wikipedia.org/wiki/Patch_(computing)
Sandboxinghttps://en.wikipedia.org/wiki/Sandbox_(computer_security)
Security Toolshttp:https:https://sectools.org/
SIEM Articlehttps://www.experts-exchange.com/articles/32316/What-Gives-SIEM-a-Good-Name.html
Software deploymenthttps://en.wikipedia.org/wiki/Software_deployment
Artificial Intelligence (AI)https://en.wikipedia.org/wiki/Artificial_intelligence
Managed security servicehttps://en.wikipedia.org/wiki/Managed_security_service
Managed Serviceshttps://en.wikipedia.org/wiki/Managed_services
Backup Sitehttps://en.wikipedia.org/wiki/Backup_site
Backupshttps://en.wikipedia.org/wiki/Backup
Computer Security Incident Managementhttps://en.wikipedia.org/wiki/Computer_security_incident_management
Crisis Managementhttps://en.wikipedia.org/wiki/Crisis_management
Disaster Recoveryhttps://en.wikipedia.org/wiki/Disaster_recovery
Disaster Recovery Planhttps://en.wikipedia.org/wiki/Disaster_recovery_plan
Disaster Recovery Solution Designhttps://www.experts-exchange.com/articles/33009/Disaster-Recovery-Solution-Design.html
Emergency Managementhttps://en.wikipedia.org/wiki/Emergency_management
Emergency Operations Centerhttps://en.wikipedia.org/wiki/Emergency_operations_center
FEMA COOP Planning Templatehttps://www.fema.gov/sites/default/files/2020-10/fema_planning-template-federal-departments-agencies_october-2020_0.pdf
Incident Managementhttps://en.wikipedia.org/wiki/Incident_management
Post-Disaster Recovery Planning Forum Noteshttps://nws.weather.gov/nthmp/Minutes/oct-nov07/post-disaster_recovery_planning_forum_uo-csc-2.pdf
Recovery Time Objective (RTO)https://en.wikipedia.org/wiki/Recovery_time_objective
Redundancyhttps://en.wikipedia.org/wiki/Redundancy_(engineering)
System Resiliencehttps://en.wikipedia.org/wiki/High_availability#Resilience
Honeynets/Honeypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)
Malwarehttps://en.wikipedia.org/wiki/Malware
Incident Handling and Response Planhttps://www.experts-exchange.com/articles/31763/Incident-Handling-and-Response-Plan.html
Phishinghttps://en.wikipedia.org/wiki/Phishing
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Security information and event management (SIEM)https://en.wikipedia.org/wiki/Security_information_and_event_management
Security orchestration, automation and responseΒ (SOAR)Β https://en.wikipedia.org/wiki/Security_orchestration
Chain of custodyhttps://en.wikipedia.org/wiki/Chain_of_custody
Computer forensicshttps://en.wikipedia.org/wiki/Computer_forensics
Digital Forensicshttps://en.wikipedia.org/wiki/Digital_forensics
Digital Forensics Toolshttps://en.wikipedia.org/wiki/List_of_digital_forensics_tools
Evidence Artifactshttps://en.wikipedia.org/wiki/Digital_artifact
Service-level Agreementshttps://en.wikipedia.org/wiki/Service-level_agreement
Threat Intelligencehttps://en.wikipedia.org/wiki/Cyber_threat_intelligence
user and entity behavior analyticsΒ (UEBA)https://en.wikipedia.org/wiki/User_behavior_analytics
Mean Time Between Failures (MTBF)https://en.wikipedia.org/wiki/Mean_time_between_failures
Mean Time To Repair (MTTR)https://en.wikipedia.org/wiki/Mean_time_to_repair
Performance Indicatorhttps://en.wikipedia.org/wiki/Performance_indicator
Performance indicator KPIhttps://en.wikipedia.org/wiki/Performance_indicator#Key_performance_indicator
RAIDhttps://en.wikipedia.org/wiki/RAID
Supercomputerhttps://en.wikipedia.org/wiki/Supercomputer

Domain 8: Software Development Security

Β Β 
API Securityhttps://en.wikipedia.org/wiki/Application_programming_interface#Security
Application Programming Interface (API)https://en.wikipedia.org/wiki/API
Database securityhttps://en.wikipedia.org/wiki/Database_security
Databaseshttps://en.wikipedia.org/wiki/Database
2021 OWASP Top 10https://owasp.org/Top10/
Application SecurityΒ https://en.wikipedia.org/wiki/Application_security
Buffer Overflowhttps://en.wikipedia.org/wiki/Buffer_overflow
CI/CDhttps://en.wikipedia.org/wiki/CI/CD
DevOpshttps://en.wikipedia.org/wiki/DevOps
Integrated Development Environmenthttps://en.wikipedia.org/wiki/Integrated_development_environment
Integrated Product Teamhttps://en.wikipedia.org/wiki/Integrated_product_team
OWASPhttps://en.wikipedia.org/wiki/OWASP
OWASP Main Pagehttps://owasp.org/
OWASP Top 10https://owasp.org/www-project-top-ten/2017/
OWASP Vulnerability Categoryhttps://owasp.org/www-community/vulnerabilities/
Secure SDLC Principles and Practiceshttps://www.experts-exchange.com/articles/33288/Secure-SDLC-Principles-and-Practices.html
Software Configuration Managementhttps://en.wikipedia.org/wiki/Software_configuration_management
Software Vulnerabilitieshttps://en.wikipedia.org/wiki/Software_vulnerability
Source-Code Securityhttps://en.wikipedia.org/wiki/Source_code
Agilehttps://en.wikipedia.org/wiki/Agile_software_development
All-Pairs Testinghttps://en.wikipedia.org/wiki/All-pairs_testing
Continual improvement (CI) processhttps://en.wikipedia.org/wiki/Continuous_improvement_process
Secure Coding Guidelineshttps://en.wikipedia.org/wiki/Secure_coding
Software developmenthttps://en.wikipedia.org/wiki/Software_development
Software Development Methodologieshttps://en.wikipedia.org/wiki/Software_development_process
Software Testinghttps://en.wikipedia.org/wiki/Software_testing
Systems development life cycle SDLChttps://en.wikipedia.org/wiki/Systems_development_life_cycle
Version controlhttps://en.wikipedia.org/wiki/Version_control
Database Management System (DBMS)https://en.wikipedia.org/wiki/Database#Database_management_system
Berkeley Software Distribution (BSD)https://en.wikipedia.org/wiki/Berkeley_Software_Distribution
Computer-Aided Software Engineering (CASE)https://en.wikipedia.org/wiki/Computer-aided_software_engineering
Commercial off-the-shelfΒ (COTS)Β https://en.wikipedia.org/wiki/Commercial_off-the-shelf
Cripplewarehttps://en.wikipedia.org/wiki/Crippleware
Extreme Programming (XP)https://en.wikipedia.org/wiki/Extreme_programming
Freewarehttps://en.wikipedia.org/wiki/Freeware
GNU Projecthttps://en.wikipedia.org/wiki/GNU
Maturity Modelshttps://en.wikipedia.org/wiki/Capability_Maturity_Model
Object-Oriented Programming (OOP)https://en.wikipedia.org/wiki/Object-oriented_programming
Open Source Softwarehttps://en.wikipedia.org/wiki/Open-source_software
Open-Source Modelhttps://en.wikipedia.org/wiki/Open-source_model
Programming Conceptshttps://en.wikipedia.org/wiki/Programming_paradigm
Programming Languageshttps://en.wikipedia.org/wiki/Programming_language
Prototype-Based Programminghttps://en.wikipedia.org/wiki/Prototype-based_programming
Race Conditionhttps://en.wikipedia.org/wiki/Race_condition
Rapid Application Development (RAD)https://en.wikipedia.org/wiki/Rapid_application_development
Relational Database Management System (RDBMS)https://en.wikipedia.org/wiki/Relational_database_management_system
Runtimehttps://en.wikipedia.org/wiki/Runtime_system
Scrumhttps://en.wikipedia.org/wiki/Scrum_(software_development)
Sharewarehttps://en.wikipedia.org/wiki/Shareware
Software Librarieshttps://en.wikipedia.org/wiki/Library_(computing)
Spiral Modelhttps://en.wikipedia.org/wiki/Spiral_model
Traceability Matrixhttps://en.wikipedia.org/wiki/Traceability_matrix
Waterfall Modelhttps://en.wikipedia.org/wiki/Waterfall_model

Get the FULL CISM bundle - All videos and practice questions!

πŸ’» 32+ hours of CISM videos
πŸ“ 150 CISM questions
πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CISM preparation.
πŸ“– CISM study guides from the lectures (200 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– A CISM study plan
πŸ“– CISM Mnemonics
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ”— 300+ CISM links
πŸ“… 2022 curriculum updated, 2023, and 2024 updated.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 32 CPEs/CEUs.

Get the FULL CISM bundle - All videos and practice questions!

πŸ’» 32+ hours of CISM videos
πŸ“ 150 CISM questions
πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CISM preparation.
πŸ“– CISM study guides from the lectures (200 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– A CISM study plan
πŸ“– CISM Mnemonics
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ”— 300+ CISM links
πŸ“… 2022 curriculum updated, 2023, and 2024 updated.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 32 CPEs/CEUs.

The official ISACA QAE questions

CISM Review QAE, 10th Edition (2022)
These are retired CISM exam questions, you will learn exactly HOW ISACA asks the questions!
$156 on Amazon – totally worth it!

The CISM AIO questions

CISM AIO Practice Exams 1st Edition $35

The official CISM book

CISM Review Manual (2022)
16th Edition by ISACA
$87-98 on Amazon – Official book

CISM AIO v2

The CISM AIO book

CISM AIO (All-in-One)
Exam Guide 2nd Edition
$35-49 on Amazon
I like this book better than the official book, more in detail and cheaper.

General CISM and ISACA links:

If a link is broken please let me know so I can fix it!

DescriptionLink
The ThorTeaches Discordhttps://discord.thorteaches.com/
Cybersecurity Job Openings Articlehttps://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/
Cybersecurity Jobshttps://cybersecurityventures.com/jobs/
CyberSeek Heatmaphttps://www.cyberseek.org/heatmap.html
The ThorTeaches Facebook Grouphttps://www.facebook.com/groups/ThorTeaches
The ThorTeaches Websitehttps://thorteaches.com/
CISM Certification Informationhttps://www.isaca.org/credentialing/cism
CISM Exam Content Outlinehttps://www.isaca.org/credentialing/cism/cism-exam-content-outline
CISM Job Practice Areashttps://www.isaca.org/credentialing/cism/cism-job-practice-areas
How to get CISM Certifiedhttps://www.isaca.org/credentialing/cism/get-cism-certified
How to maintain you CISM Certificationhttps://www.isaca.org/credentialing/cism/maintain-cism-certification
ISACA Code of Professional Ethicshttps://www.isaca.org/credentialing/code-of-professional-ethics
PSI Test Center YouTube Videohttps://www.youtube.com/watch?v=B-X__iJmFHE

Β 

Β 

CISM Domain 1 links:

DescriptionLink
Computer Fraud and Abuse Act of 1986 (CFAA)Β https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
CIA Triadhttps://en.wikipedia.org/wiki/Information_security#Key_concepts
COBIThttp:https:https://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
Computer Ethics Principleshttps://en.wikipedia.org/wiki/Computer_Ethics_Institute
Copyrighthttps://en.wikipedia.org/wiki/Copyright
Copyright Fair Use Indexhttps://www.copyright.gov/fair-use/
Corporate IT governancehttps://en.wikipedia.org/wiki/IT_governance
Due Diligencehttps://en.wikipedia.org/wiki/Due_diligence
Electronic Communications Privacy Act of 1986Β (ECPA)Β https://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act
EU Artificial Intelligence Act (AI Act)Β https://en.wikipedia.org/wiki/Artificial_Intelligence_Act
European Union Agency for Cybersecurity (ENISA)https://www.enisa.europa.eu/
Framework for Improving Critical Infrastructure Cybersecurityhttps://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Gap Analysishttps://en.wikipedia.org/wiki/Gap_analysis
General Data Protection Regulation (GDPR)https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
Gramm-Leach-Bliley Acthttps://en.wikipedia.org/wiki/Gramm–Leach–Bliley_Act
Governance, risk management, and compliance (GRC)https://en.wikipedia.org/wiki/Governance,_risk_management,_and_compliance
HIPAAhttps://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
Information privacyhttps://en.wikipedia.org/wiki/Information_privacy
Information privacy lawhttps://en.wikipedia.org/wiki/Information_privacy_law
Information securityhttps://en.wikipedia.org/wiki/Information_security
Information Security Governancehttps://en.wikipedia.org/wiki/Information_security_governance
Information Security Managementhttps://en.wikipedia.org/wiki/Information_security_management
Information security policieshttps://en.wikipedia.org/wiki/Information_security_policy
Intellectual propertyhttps://en.wikipedia.org/wiki/Intellectual_property
ISOhttps://en.wikipedia.org/wiki/International_Organization_for_Standardization
ISO/IEC 27000-Serieshttps://en.wikipedia.org/wiki/ISO/IEC_27000-series
IT lawhttps://en.wikipedia.org/wiki/Information_technology_law
NIST SP 800-30 Frameworkhttps://en.wikipedia.org/wiki/IT_risk_management#NIST_SP_800_30_framework
Non-Disclosure Agreementhttps://en.wikipedia.org/wiki/Non-disclosure_agreement
OECD Privacy Frameworkhttps://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf
Organizational Processeshttps://en.wikipedia.org/wiki/Organizational_structure
Patenthttps://en.wikipedia.org/wiki/Patent
Patriot Acthttps://en.wikipedia.org/wiki/Patriot_Act
PCI-DSShttps://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Sarbanes-Oxley Acthttps://en.wikipedia.org/wiki/Sarbanes–Oxley_Act
Security Breach Notification Lawshttps://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Trademarkhttps://en.wikipedia.org/wiki/Trademark
PCI Security Standards Councilhttps://www.pcisecuritystandards.org/pci_security/
ISO 22301 Standardhttps://en.wikipedia.org/wiki/ISO_22301
COBIT ISACA resourceshttps://www.isaca.org/resources/cobit
Committee of Sponsoring Organizations (COSO)Β https://en.wikipedia.org/wiki/Committee_of_Sponsoring_Organizations_of_the_Treadway_Commission
End-User License Agreement (EULA)https://en.wikipedia.org/wiki/End-user_license_agreement
FedRAMPhttps://en.wikipedia.org/wiki/Federal_Risk_and_Authorization_Management_Program
NISThttps://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology
NIST SP 800-12 Rev. 1https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final
NIST SP 800-37 Rev. 1https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
NIST SP 800-37 Rev. 2https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r2.pdf
NIST SP 800-53https://en.wikipedia.org/wiki/NIST_Special_Publication_800-53
Security Clearancehttps://en.wikipedia.org/wiki/Security_clearance
Data Classificationhttps://en.wikipedia.org/wiki/Data_classification_(business_intelligence)
Data Collectionhttps://en.wikipedia.org/wiki/Data_collection
Data Retentionhttps://en.wikipedia.org/wiki/Data_retention
Privacy by Designhttps://en.wikipedia.org/wiki/Privacy_by_design
Cloud Security Alliance (CSA)https://cloudsecurityalliance.org
Need to knowhttps://en.wikipedia.org/wiki/Need_to_know
IT Security Audithttps://en.wikipedia.org/wiki/Information_security_audit
Auditing and Logginghttps://en.wikipedia.org/wiki/Audit_trail
Information security audithttps://en.wikipedia.org/wiki/Information_technology_security_audit
IT Auditshttps://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG9.aspx – DEAD
NIST SP 800-115https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
Security Auditshttps://en.wikipedia.org/wiki/Information_technology_audit
NIST SP 800-37https://en.wikipedia.org/wiki/NIST_Special_Publication_800-37
Internal controlhttps://en.wikipedia.org/wiki/Internal_control
ISO/IEC 27031 Guidelineshttp:https:https://www.iso27001security.com/html/27031.html
NIST SP 800-34 Rev. 1https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf
NIST SP 800-92https://en.wikipedia.org/wiki/NIST_Special_Publication_800-92
Change Managementhttps://en.wikipedia.org/wiki/Change_management
NIST Publicationshttps://www.nist.gov/publications
NIST SP 800-128https://csrc.nist.gov/publications/detail/sp/800-128/final

CISM Domain 2 links:

DescriptionLink
IT Riskhttps://en.wikipedia.org/wiki/IT_risk
IT risk managementhttps://en.wikipedia.org/wiki/IT_risk_management
Riskhttps://en.wikipedia.org/wiki/Risk
Risk – Attackers/Attackshttps://en.wikipedia.org/wiki/Cyberattack
Risk Assessmenthttps://en.wikipedia.org/wiki/Risk_management#Risk_assessment_and_analysis
Risk Managementhttps://en.wikipedia.org/wiki/Risk_management
Risk management toolshttps://en.wikipedia.org/wiki/Risk_management_tools
Threat Modelinghttps://en.wikipedia.org/wiki/Threat_model
Threat Modeling Process Articlehttps://www.experts-exchange.com/articles/33330/Threat-Modeling-Process-Basics-and-Purpose.html
Key Risk Indicatorhttps://en.wikipedia.org/wiki/Key_risk_indicator
Supply chain risk managementhttps://en.wikipedia.org/wiki/Supply_chain_risk_management
Requirements Analysishttps://en.wikipedia.org/wiki/Requirements_analysis
Vulnerability (computing)https://en.wikipedia.org/wiki/Vulnerability_(computing)
Vulnerability Assessmenthttps://en.wikipedia.org/wiki/Vulnerability_assessment
Security Assessmentshttps://en.wikipedia.org/wiki/IT_security_assessment
Vulnerability Assessments vs. Penetration Testshttps://www.experts-exchange.com/articles/31793/Vulnerability-Assessments-versus-Penetration-Tests.html

CISM Domain 3 links:

DescriptionLink
Separation of dutieshttps://en.wikipedia.org/wiki/Separation_of_duties
Security Awareness Traininghttps://en.wikipedia.org/wiki/Internet_Security_Awareness_Training
Software supply chainhttps://en.wikipedia.org/wiki/Software_supply_chain
Digital rights management (DRM)Β https://en.wikipedia.org/wiki/Digital_rights_management
Asset managementhttps://en.wikipedia.org/wiki/Asset_management
Software as a Service (SaaS)https://en.wikipedia.org/wiki/Software_as_a_service
Data at resthttps://en.wikipedia.org/wiki/Data_at_rest
Data Destructionhttps://en.wikipedia.org/wiki/Data_erasure
Data in transithttps://en.wikipedia.org/wiki/Data_in_transit
Data in usehttps://en.wikipedia.org/wiki/Data_in_use
Data Protection Methodshttps://en.wikipedia.org/wiki/Data_protection
Data Remanencehttps://en.wikipedia.org/wiki/Data_remanence
Data loss prevention (DLP) softwareΒ https://en.wikipedia.org/wiki/Data_loss_prevention_software
Information Lifecyclehttps://en.wikipedia.org/wiki/Information_lifecycle_management
Modern Encryptionhttps://en.wikipedia.org/wiki/Cryptography#Modern_cryptography
Chain of trusthttps://en.wikipedia.org/wiki/Chain_of_trust
Firmwarehttps://en.wikipedia.org/wiki/Firmware
Flash Memoryhttps://en.wikipedia.org/wiki/Flash_memory
Memory Protectionhttps://en.wikipedia.org/wiki/Memory_protection
Verification and Validationhttps://en.wikipedia.org/wiki/Verification_and_validation
Computer Securityhttps://en.wikipedia.org/wiki/Computer_security
Security Modelshttps://en.wikipedia.org/wiki/Computer_security_model
Bell-LaPadula Modelhttps://en.wikipedia.org/wiki/Bell-LaPadula_model
Biba Modelhttps://en.wikipedia.org/wiki/Biba_Model
Clark–Wilson modelhttps://en.wikipedia.org/wiki/Clark–Wilson_model
Graham-Denning Modelhttps://en.wikipedia.org/wiki/Graham-Denning_model
Physical securityhttps://en.wikipedia.org/wiki/Physical_security
Cloud Sccess Security Broker (CASB)Β https://en.wikipedia.org/wiki/Cloud_access_security_broker
Cloud computinghttps://en.wikipedia.org/wiki/Cloud_computing
Cloud computing securityhttps://en.wikipedia.org/wiki/Cloud_computing_security
Cloud Security Articlehttps://www.experts-exchange.com/articles/32132/Better-Security-in-the-Cloud.html
Cloud Security Threats Articlehttps://www.experts-exchange.com/articles/31744/Cloud-Security-Threats-Risks-and-Concerns.html
Containerizationhttps://en.wikipedia.org/wiki/OS-level_virtualization
Defense in Depthhttps://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Distributed Systemshttps://en.wikipedia.org/wiki/Distributed_computing
Edge Computinghttps://en.wikipedia.org/wiki/Edge_computing
Embedded Systemshttps://en.wikipedia.org/wiki/Embedded_system
Hypervisorhttps://en.wikipedia.org/wiki/Hypervisor
Industrial Control Systemshttps://en.wikipedia.org/wiki/Industrial_control_system
Infrastructure as a Service (IaaS)https://en.wikipedia.org/wiki/Infrastructure_as_a_service
Internet of thingsΒ (IoT)Β https://en.wikipedia.org/wiki/Internet_of_things
IoT Security Guidelineshttps://www.experts-exchange.com/articles/33356/Internet-of-Things-Guidelines-to-prevent-common-IoT-security-risks.html
Platform as a Service (PaaS)https://en.wikipedia.org/wiki/Platform_as_a_service
Serverless Computinghttps://en.wikipedia.org/wiki/Serverless_computing
Virtual Private Cloudhttps://en.wikipedia.org/wiki/Virtual_private_cloud
Virtualized Systemshttps://en.wikipedia.org/wiki/Virtualization
Asymmetric Encryptionhttps://en.wikipedia.org/wiki/Public-key_cryptography
Cryptographic Noncehttps://en.wikipedia.org/wiki/Cryptographic_nonce
Cryptographyhttps://en.wikipedia.org/wiki/Cryptography
Digital Signatureshttps://en.wikipedia.org/wiki/Digital_signature
Encryptionhttps://en.wikipedia.org/wiki/Encryption
Hashinghttps://en.wikipedia.org/wiki/Hash_function
Hybrid Cryptosystemhttps://en.wikipedia.org/wiki/Hybrid_cryptosystem
Initialization Vectorhttps://en.wikipedia.org/wiki/Initialization_vector
IPSechttps://en.wikipedia.org/wiki/Ipsec
Key Managementhttps://en.wikipedia.org/wiki/Key_management
One-Time Padhttps://en.wikipedia.org/wiki/One-time_pad
Pretty Good Privacy (PGP)https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Public Key Infrastructurehttps://en.wikipedia.org/wiki/Public_key_infrastructure
Secure Defaultshttps://en.wikipedia.org/wiki/Secure_by_default
Secure Design Principleshttps://en.wikipedia.org/wiki/Secure_by_design
Security by Design Principleshttps://wiki.owasp.org/index.php/Security_by_Design_Principles
Symmetric Encryptionhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
Architectural Designhttps://en.wikipedia.org/wiki/Software_architecture
Common Criteriahttps://en.wikipedia.org/wiki/Common_Criteria
Covert Channelshttps://en.wikipedia.org/wiki/Covert_channel
Emerging Technologieshttps://en.wikipedia.org/wiki/Emerging_technologies
Fault Injectionhttps://en.wikipedia.org/wiki/Fault_injection
Hardware Architecturehttps://en.wikipedia.org/wiki/Computer_architecture
Harrison-Ruzzo-Ullman (HRU) Modelhttps://en.wikipedia.org/wiki/HRU_(security)
MicroservicesΒ https://en.wikipedia.org/wiki/Microservices
Multilevel securityhttps://en.wikipedia.org/wiki/Multilevel_security
Operating System Kernelhttps://en.wikipedia.org/wiki/Kernel_(operating_system)
Server (computing)https://en.wikipedia.org/wiki/Server_(computing)
System integrationhttps://en.wikipedia.org/wiki/Systems_integration
Trusted Computer System Evaluation Criteria (TCSEC)https://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria
Trusted Platform Modulehttps://en.wikipedia.org/wiki/Trusted_Platform_Module
Address Resolution Protocol (ARP)https://en.wikipedia.org/wiki/Address_Resolution_Protocol
Bluetoothhttps://en.wikipedia.org/wiki/Bluetooth
Cellular Networkhttps://en.wikipedia.org/wiki/Cellular_network
Cellular/Mobile Networkshttps://en.wikipedia.org/wiki/Mobile_telephony
Challenge-Handshake Authentication Protocol (CHAP)https://en.wikipedia.org/wiki/Challenge-Handshake_Authentication_Protocol
Cisco Internetworking Basicshttp:https:https://www.ciscopress.com/articles/article.asp?p=31289
Classless Inter-Domain Routing (CIDR)https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing
Computer NetworkingΒ https://en.wikipedia.org/wiki/Computer_network
Content Distribution Networks (CDN)https://en.wikipedia.org/wiki/Content_delivery_network
Converged Protocolshttps://en.wikipedia.org/wiki/Converged_network
Data Communicationshttps://en.wikipedia.org/wiki/Data_transmission
Distance-Vector Routing Protocolhttps://en.wikipedia.org/wiki/Distance-vector_routing_protocol
Domain Name System (DNS)https://en.wikipedia.org/wiki/Domain_Name_System
Dynamic Host Configuration Protocol (DHCP)https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
Ethernethttps://en.wikipedia.org/wiki/Ethernet
Fiber-Optichttps://en.wikipedia.org/wiki/Fiber-optic_communication
File Transfer Protocol (FTP)https://en.wikipedia.org/wiki/File_Transfer_Protocol
Firewallshttps://en.wikipedia.org/wiki/Firewall_(computing)
Frame Relayhttps://en.wikipedia.org/wiki/Frame_Relay
Global Area Network (GAN)https://en.wikipedia.org/wiki/Global_area_network
Internet Assigned Numbers Authority (IANA)https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority
Internet Control Message Protocol (ICMP)https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
IP Addresseshttps://en.wikipedia.org/wiki/IP_address
IPv4https://en.wikipedia.org/wiki/IPv4
IPv6https://en.wikipedia.org/wiki/IPv6
Layer 1-3 Deviceshttps://en.wikipedia.org/wiki/Networking_hardware
MAC Addresshttps://en.wikipedia.org/wiki/MAC_address
Micro-Segmentationhttps://en.wikipedia.org/wiki/Microsegmentation
Modemshttps://en.wikipedia.org/wiki/Modem
Multiprotocol Label Switching (MPLS)https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching
Network Access Controlhttps://en.wikipedia.org/wiki/Network_access_control
Network Managementhttps://en.wikipedia.org/wiki/Network_management
Network Switchhttps://en.wikipedia.org/wiki/Network_switch
Network topologyhttps://en.wikipedia.org/wiki/Network_topology
OSI Modelhttps://en.wikipedia.org/wiki/OSI_model
Ping Networking Utilityhttps://en.wikipedia.org/wiki/Ping_(networking_utility)
Quality of Service (QoS)https://en.wikipedia.org/wiki/Quality_of_service
Remote access servicehttps://en.wikipedia.org/wiki/Remote_access_service
Remote Desktop Protocol (RDP)https://en.wikipedia.org/wiki/Remote_Desktop_Protocol
Remote desktop softwarehttps://en.wikipedia.org/wiki/Remote_desktop_software
Routerhttps://en.wikipedia.org/wiki/Router_(computing)
Routing Protocolshttps://en.wikipedia.org/wiki/Routing_protocol
Satellite Internet Accesshttps://en.wikipedia.org/wiki/Satellite_Internet_access
Secure Access Service Edgehttps://en.wikipedia.org/wiki/Secure_access_service_edge
Secure Communication Channelshttps://en.wikipedia.org/wiki/Secure_communication
Secure Shell (SSH)https://en.wikipedia.org/wiki/Secure_Shell
Simple Network Management Protocol (SNMP)https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
Software Defined Networkshttps://en.wikipedia.org/wiki/Software-defined_networking
TCP and UDP Port Numbershttps://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
TCP/IP Modelhttps://en.wikipedia.org/wiki/Internet_protocol_suite
Transmission Control Protocol (TCP)https://en.wikipedia.org/wiki/Transmission_Control_Protocol
Transmission Mediahttps://en.wikipedia.org/wiki/Transmission_medium
Twisted Pairhttps://en.wikipedia.org/wiki/Twisted_pair
User Datagram Protocol (UDP)https://en.wikipedia.org/wiki/User_Datagram_Protocol
Virtual Private Network (VPN)https://en.wikipedia.org/wiki/Virtual_private_network
VLANhttps://en.wikipedia.org/wiki/Virtual_LAN
Voice over IP (VoIP)https://en.wikipedia.org/wiki/Voice_over_IP
WAN Protocolshttps://en.wikipedia.org/wiki/Wide_area_network
WiFihttps://en.wikipedia.org/wiki/Wi-Fi
Wireless Access Pointhttps://en.wikipedia.org/wiki/Wireless_access_point
Wireless LANhttps://en.wikipedia.org/wiki/Wireless_LAN
Wireless Networkshttps://en.wikipedia.org/wiki/Wireless_network
Zero Trusthttps://en.wikipedia.org/wiki/Zero_trust_security_model
ZigBeehttps://en.wikipedia.org/wiki/ZigBee
Transport Layer SecurityΒ (TLS)Β https://en.wikipedia.org/wiki/Transport_Layer_Security
IAAA Frameworkhttps://en.wikipedia.org/wiki/AAA_(computer_security)
Attribute-based access control (ABAC)https://en.wikipedia.org/wiki/Attribute-based_access_control
Access Controlhttps://en.wikipedia.org/wiki/Access_control
Access control link 2https://en.wikipedia.org/wiki/Information_security#Access_control
Access Control Matrixhttps://en.wikipedia.org/wiki/Access_Control_Matrix
Access managementhttps://en.wikipedia.org/wiki/Access_management
Active Directoryhttps://en.wikipedia.org/wiki/Active_Directory
Authenticationhttps://en.wikipedia.org/wiki/Authentication
Authorizationhttps://en.wikipedia.org/wiki/Authorization
Credential Management Systemshttps://en.wikipedia.org/wiki/Credential_Management
Discretionary access control (DAC)Β https://en.wikipedia.org/wiki/Discretionary_access_control
Federated Identity Management FIDMhttps://en.wikipedia.org/wiki/Federated_identity
Identity managementhttps://en.wikipedia.org/wiki/Identity_management
Identity Provisioninghttps://en.wikipedia.org/wiki/Provisioning_(technology)
Identity verification servicehttps://en.wikipedia.org/wiki/Identity_verification_service
Least Privilegehttps://en.wikipedia.org/wiki/Principle_of_least_privilege
Mandatory access control (MAC)https://en.wikipedia.org/wiki/Mandatory_access_control
Mobile Device Managementhttps://en.wikipedia.org/wiki/Mobile_device_management
Mobile Device Securityhttps://en.wikipedia.org/wiki/Mobile_security
Multi-factor authenticationhttps://en.wikipedia.org/wiki/Multi-factor_authentication
Mutual Authenticationhttps://en.wikipedia.org/wiki/Mutual_authentication
Network Authenticationhttps://en.wikipedia.org/wiki/Authentication_protocol
Password Authentication Protocol (PAP)https://en.wikipedia.org/wiki/Password_Authentication_Protocol
Privilege Escalationhttps://en.wikipedia.org/wiki/Privilege_escalation
Role-based access control (RBAC)https://en.wikipedia.org/wiki/Role-based_access_control
Service Accounts Managementhttps://en.wikipedia.org/wiki/Service_account
Single Sign-Onhttps://en.wikipedia.org/wiki/Single_sign-on
System Accesshttps://en.wikipedia.org/wiki/Access_control#Computer_security
Type 1 Authenticationhttps://en.wikipedia.org/wiki/Password
Type 3 Authenticationhttps://en.wikipedia.org/wiki/Biometrics
Challenge-Response Authenticationhttps://en.wikipedia.org/wiki/Challenge–response_authentication
Extensible Authentication Protocol (EAP)https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
Kerberoshttps://en.wikipedia.org/wiki/Kerberos_(protocol)
RADIUShttps://en.wikipedia.org/wiki/RADIUS
Saltinghttps://en.wikipedia.org/wiki/Salt_(cryptography)
Session Managementhttps://en.wikipedia.org/wiki/Session_(computer_science)
TACACShttps://en.wikipedia.org/wiki/TACACS
Security Account Managerhttps://en.wikipedia.org/wiki/Security_Account_Manager
Security Controls Testinghttps://en.wikipedia.org/wiki/Security_testing
Vulnerability Mitigationhttps://en.wikipedia.org/wiki/Vulnerability_management
Core Security Penetration Testing Serviceshttp:https:https://www.coresecurity.com/
Code Review and Testinghttps://en.wikipedia.org/wiki/Code_review
Continuous Monitoringhttps://en.wikipedia.org/wiki/Continuous_monitoring
Kali Linuxhttps://www.kali.org/
Coverage Analysishttps://en.wikipedia.org/wiki/Code_coverage
Dynamic Testinghttps://en.wikipedia.org/wiki/Dynamic_testing
Fire Sprinkler Systemhttps://en.wikipedia.org/wiki/Fire_sprinkler_system
Physical Information Securityhttps://en.wikipedia.org/wiki/Physical_information_security
AI in Securityhttps://en.wikipedia.org/wiki/Artificial_intelligence_for_cybersecurity
Antivirus softwarehttps://en.wikipedia.org/wiki/Antivirus_software
Application Positive-listinghttps://en.wikipedia.org/wiki/Whitelist
Configuration Managementhttps://en.wikipedia.org/wiki/Configuration_management
Endpoint Securityhttps://en.wikipedia.org/wiki/Endpoint_security
Keystroke Logginghttps://en.wikipedia.org/wiki/Keystroke_logging
Logging and Monitoringhttps://en.wikipedia.org/wiki/Log_management
Patch Managementhttps://en.wikipedia.org/wiki/Patch_(computing)
Sandboxinghttps://en.wikipedia.org/wiki/Sandbox_(computer_security)
Security Toolshttp:https:https://sectools.org/
SIEM Articlehttps://www.experts-exchange.com/articles/32316/What-Gives-SIEM-a-Good-Name.html
Software deploymenthttps://en.wikipedia.org/wiki/Software_deployment
Artificial Intelligence (AI)https://en.wikipedia.org/wiki/Artificial_intelligence
Managed security servicehttps://en.wikipedia.org/wiki/Managed_security_service
Managed Serviceshttps://en.wikipedia.org/wiki/Managed_services
API Securityhttps://en.wikipedia.org/wiki/Application_programming_interface#Security
Application Programming Interface (API)https://en.wikipedia.org/wiki/API
Database securityhttps://en.wikipedia.org/wiki/Database_security
Databaseshttps://en.wikipedia.org/wiki/Database
2021 OWASP Top 10https://owasp.org/Top10/
Application SecurityΒ https://en.wikipedia.org/wiki/Application_security
Buffer Overflowhttps://en.wikipedia.org/wiki/Buffer_overflow
CI/CDhttps://en.wikipedia.org/wiki/CI/CD
DevOpshttps://en.wikipedia.org/wiki/DevOps
Integrated Development Environmenthttps://en.wikipedia.org/wiki/Integrated_development_environment
Integrated Product Teamhttps://en.wikipedia.org/wiki/Integrated_product_team
OWASPhttps://en.wikipedia.org/wiki/OWASP
OWASP Main Pagehttps://owasp.org/
OWASP Top 10https://owasp.org/www-project-top-ten/2017/
OWASP Vulnerability Categoryhttps://owasp.org/www-community/vulnerabilities/
Secure SDLC Principles and Practiceshttps://www.experts-exchange.com/articles/33288/Secure-SDLC-Principles-and-Practices.html
Software Configuration Managementhttps://en.wikipedia.org/wiki/Software_configuration_management
Software Vulnerabilitieshttps://en.wikipedia.org/wiki/Software_vulnerability
Source-Code Securityhttps://en.wikipedia.org/wiki/Source_code
Agilehttps://en.wikipedia.org/wiki/Agile_software_development
All-Pairs Testinghttps://en.wikipedia.org/wiki/All-pairs_testing
Continual improvement (CI) processhttps://en.wikipedia.org/wiki/Continuous_improvement_process
Secure Coding Guidelineshttps://en.wikipedia.org/wiki/Secure_coding
Software developmenthttps://en.wikipedia.org/wiki/Software_development
Software Development Methodologieshttps://en.wikipedia.org/wiki/Software_development_process
Software Testinghttps://en.wikipedia.org/wiki/Software_testing
Systems development life cycle SDLChttps://en.wikipedia.org/wiki/Systems_development_life_cycle
Version controlhttps://en.wikipedia.org/wiki/Version_control

CISM Domain 4 links:

DescriptionLink
Business continuityhttps://en.wikipedia.org/wiki/Business_continuity
Business Continuity Planninghttps://en.wikipedia.org/wiki/Business_continuity_planning
Cybercrimes/Data Breacheshttps://en.wikipedia.org/wiki/Cybercrime
Warfare/Terrorism/Ransomwarehttps://en.wikipedia.org/wiki/Cyberterrorism
Fire Suppressionhttps://en.wikipedia.org/wiki/Fire_suppression_system
Attacks on Cryptographyhttps://en.wikipedia.org/wiki/Cryptanalysis
Brute Force Attackhttps://en.wikipedia.org/wiki/Brute-force_attack
MITM Attackhttps://en.wikipedia.org/wiki/Man-in-the-middle_attack
Denial-of-Service Attackhttps://en.wikipedia.org/wiki/Denial-of-service_attack
Eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
Intrusion detection systemhttps://en.wikipedia.org/wiki/Intrusion_detection_system
Social Engineeringhttps://en.wikipedia.org/wiki/Social_engineering_(security)
0-day Attackshttps://en.wikipedia.org/wiki/Zero-day_(computing)
Pen Testing Toolshttps://en.wikipedia.org/wiki/Penetration_test#Tools
Penetration Testinghttps://en.wikipedia.org/wiki/Penetration_test
Security Fuzzershttps://en.wikipedia.org/wiki/Fuzzing
Vulnerability Scannershttps://en.wikipedia.org/wiki/Vulnerability_scanner
Metasploithttps://metasploit.com/
Nessus Softwarehttps://en.wikipedia.org/wiki/Nessus_(software)
Password Crackinghttps://en.wikipedia.org/wiki/Password_cracking
Rainbow Tablehttps://en.wikipedia.org/wiki/Rainbow_table
Exception Handlinghttps://en.wikipedia.org/wiki/Exception_handling
Misuse Case Testinghttps://en.wikipedia.org/wiki/Misuse_case
Backup Sitehttps://en.wikipedia.org/wiki/Backup_site
Backupshttps://en.wikipedia.org/wiki/Backup
Computer Security Incident Managementhttps://en.wikipedia.org/wiki/Computer_security_incident_management
Crisis Managementhttps://en.wikipedia.org/wiki/Crisis_management
Disaster Recoveryhttps://en.wikipedia.org/wiki/Disaster_recovery
Disaster Recovery Planhttps://en.wikipedia.org/wiki/Disaster_recovery_plan
Disaster Recovery Solution Designhttps://www.experts-exchange.com/articles/33009/Disaster-Recovery-Solution-Design.html
Emergency Managementhttps://en.wikipedia.org/wiki/Emergency_management
Emergency Operations Centerhttps://en.wikipedia.org/wiki/Emergency_operations_center
FEMA COOP Planning Templatehttps://www.fema.gov/sites/default/files/2020-10/fema_planning-template-federal-departments-agencies_october-2020_0.pdf
Incident Managementhttps://en.wikipedia.org/wiki/Incident_management
Post-Disaster Recovery Planning Forum Noteshttps://nws.weather.gov/nthmp/Minutes/oct-nov07/post-disaster_recovery_planning_forum_uo-csc-2.pdf
Recovery Time Objective (RTO)https://en.wikipedia.org/wiki/Recovery_time_objective
Redundancyhttps://en.wikipedia.org/wiki/Redundancy_(engineering)
System Resiliencehttps://en.wikipedia.org/wiki/High_availability#Resilience
Honeynets/Honeypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)
Malwarehttps://en.wikipedia.org/wiki/Malware
Incident Handling and Response Planhttps://www.experts-exchange.com/articles/31763/Incident-Handling-and-Response-Plan.html
Phishinghttps://en.wikipedia.org/wiki/Phishing
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Security information and event management (SIEM)https://en.wikipedia.org/wiki/Security_information_and_event_management
Security orchestration, automation and responseΒ (SOAR)Β https://en.wikipedia.org/wiki/Security_orchestration
Chain of custodyhttps://en.wikipedia.org/wiki/Chain_of_custody
Computer forensicshttps://en.wikipedia.org/wiki/Computer_forensics
Digital Forensicshttps://en.wikipedia.org/wiki/Digital_forensics
Digital Forensics Toolshttps://en.wikipedia.org/wiki/List_of_digital_forensics_tools
Evidence Artifactshttps://en.wikipedia.org/wiki/Digital_artifact
Service-level Agreementshttps://en.wikipedia.org/wiki/Service-level_agreement
Threat Intelligencehttps://en.wikipedia.org/wiki/Cyber_threat_intelligence
user and entity behavior analyticsΒ (UEBA)https://en.wikipedia.org/wiki/User_behavior_analytics

If used right my course should be enough to pass the CC exam!

πŸ’» 17+ hours of CC videos
πŸ“ 1,700 CC questions in 17 tests
πŸ“ 60 Topic quiz questions after each major knowledge area
πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CC preparation.
πŸ“– CC study guides from the lectures (120 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– A CC study plan
πŸ“– CC Mnemonics
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ”— 200+ CISSP links
πŸ“… 2022 curriculum updated, 2023, and 2024 updated.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 17 CPEs/CEUs.

Luke Ahmed's SONIC project (CC course)

πŸ’» 13 hours of CC videos
πŸ“ 225 CC practice questions
$49.99 - 180 days access

If used right my course should be enough to pass the CC exam!

πŸ’» 17+ hours of CC videos
πŸ“ 1,700 CC questions in 17 tests
πŸ“ 60 Topic quiz questions after each major knowledge area
πŸ€– ThorBot: Your 24/7 AI study assistant, clarify concepts, tailor your learning, and enhance your CC preparation.
πŸ“– CC study guides from the lectures (120 pages)
πŸ“– A 2,500 word Glossary
πŸ“– 2,500 Flashcards
πŸ“– A CC study plan
πŸ“– CC Mnemonics
πŸ“„ Subtitles in English, Spanish (Latin America), French, Arabic, Chinese, and Hindi
πŸ”— 200+ CISSP links
πŸ“… 2022 curriculum updated, 2023, and 2024 updated.
πŸ“† Lifetime or 12-months unlimited access
πŸ… Certificate of completion with 17 CPEs/CEUs.

Luke Ahmed's SONIC project (CC course)

πŸ’» 13 hours of CC videos
πŸ“ 225 CC practice questions
$49.99 - 180 days access

Cybersecurity Fundamentals Study Guide, 3rd Edition

This is a much better study book than the official one ~$44

Official ISC2 Certified in Cybersecurity (CC) eTextbook

The official book, lacked a lot of topics when I read it. $19.95

Get our FREE CC Mnemonics!

There are not a ton of free study materials for the CC since it is relatively new.
Some of the materials below are for the CISSP, but many topics are relevant.

When you sign up for the exam, you also get a 6-hour video course.
It is not enough to pass the exam on its own but it is a start and it is free.
https://www.isc2.org/landing/1MCC

Free questions:

Free QOTD (Question Of The Day) CC practice questions (Facebook group)

Wentz Wu QOTD (Blog)

Adam Gordon QOTD (LinkedIn)

Prabh Nair’s YT question videos

Study Guides:

Study guide (free) – The memory palace – Prashant Mohan v4.0

Study guide (free) – Sunflower notes – Maarten de Frankrijker v2.0

Study guide (free) – CISSP Process guide – Fadi Sodah (madunix) v21.0

Other:

CISSP Glossary – Student Guide

ISACA Cybersecurity Fundamentals Glossary

NIST – RMF for Systems and Organizations Introductory Course

Flash cards – Brainscrape

Awesome Security – Github

GDPR – Advisera

OWASP top 10 – 2013

OWASP top 10 – 2017

OWASP top 10 – 2021

All relevant NIST documents

NIST 800-30 – Guide for Conducting Risk Assessments
https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final

NIST 800-12 – An Introduction to Information Security
https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final

NIST 800-34 – Contingency Planning Guide for Information Technology SystemsΒ https://csrc.nist.gov/publications/detail/sp/800-34/rev-1/final

NIST 800-37 – Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
https://csrc.nist.gov/publications/detail/sp/800-37/rev-2/final

NIST 800-39 – Managing Information Security Risk: Organization, Mission, and Information System View
https://csrc.nist.gov/publications/detail/sp/800-39/final

NIST 800-53 – Security and Privacy Controls for Federal Information Systems and Organization
https://csrc.nist.gov/publications/detail/sp/800-53/rev-4/final

https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft

NIST 800-86 – Guide to Integrating Forensic Techniques into Incident ResponseΒ https://csrc.nist.gov/publications/detail/sp/800-86/final

NIST 800-88 – Guidelines for Media Sanitization
https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final

NIST 800-115 – Technical Guide to Information Security Testing and AssessmentΒ Β 
https://csrc.nist.gov/publications/detail/sp/800-115/final

NIST 800-128 – Guide for Security-Focused Configuration Management of Information SystemsΒ https://csrc.nist.gov/publications/detail/sp/800-128/final

NIST 800-137 – Information Security Continuous Monitoring
https://csrc.nist.gov/publications/detail/sp/800-137/final

NIST 800-145 – The NIST Definition of Cloud Computing
https://csrc.nist.gov/publications/detail/sp/800-145/final

NIST 800-46 – Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
https://csrc.nist.gov/publications/detail/sp/800-46/rev-2/final

NIST 800-61 Computer Security Incident Handling Guide
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final

Β NIST 800-160Β Β Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems
https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final

General Certified in Cybersecurity links:

DescriptionLink
Cybersecurity Job Openings Articlehttps://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/
Cybersecurity Jobshttps://cybersecurityventures.com/jobs/
CyberSeek Heatmaphttps://www.cyberseek.org/heatmap.html
The ThorTeaches Facebook Grouphttps://www.facebook.com/groups/ThorTeaches
The ThorTeaches Websitehttps://thorteaches.com/
Cybersecurity Job Markethttps://www.forbes.com/sites/stevemorgan/2016/01/02/one-million-cybersecurity-job-openings-in-2016/2/
ISC2https://en.wikipedia.org/wiki/ISC2
ISC2 Communityhttps://community.isc2.org/
ISC2 Exam Candidateshttps://www.isc2.org/candidate
ISC2 Qualification Pathfinderhttps://www.isc2.org/Certifications/Qualification-Pathfinder
Registering for ISC2 Examhttps://www.isc2.org/Register-for-Exam
CC study book on Amazonhttps://www.amazon.com/gp/product/1604207515/
ISC2 CC Certificationhttps://www.isc2.org/Certifications/CC/
ISC2 Cybersecurity Campaignhttps://www.isc2.org/landing/1MCC

Domain 1: Security Principles

DescriptionLink
Computer Fraud and Abuse Act of 1986 (CFAA)Β https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
CIA Triadhttps://en.wikipedia.org/wiki/Information_security#Key_concepts
COBIThttp:https:https://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
Computer Ethics Principleshttps://en.wikipedia.org/wiki/Computer_Ethics_Institute
Copyrighthttps://en.wikipedia.org/wiki/Copyright
Copyright Fair Use Indexhttps://www.copyright.gov/fair-use/
Corporate IT governancehttps://en.wikipedia.org/wiki/IT_governance
Due Diligencehttps://en.wikipedia.org/wiki/Due_diligence
Electronic Communications Privacy Act of 1986Β (ECPA)Β https://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act
EU Artificial Intelligence Act (AI Act)Β https://en.wikipedia.org/wiki/Artificial_Intelligence_Act
European Union Agency for Cybersecurity (ENISA)https://www.enisa.europa.eu/
Framework for Improving Critical Infrastructure Cybersecurityhttps://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
Gap Analysishttps://en.wikipedia.org/wiki/Gap_analysis
General Data Protection Regulation (GDPR)https://en.wikipedia.org/wiki/General_Data_Protection_Regulation
Gramm-Leach-Bliley Acthttps://en.wikipedia.org/wiki/Gramm–Leach–Bliley_Act
Governance, risk management, and compliance (GRC)https://en.wikipedia.org/wiki/Governance,_risk_management,_and_compliance
HIPAAhttps://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act
Information privacyhttps://en.wikipedia.org/wiki/Information_privacy
Information privacy lawhttps://en.wikipedia.org/wiki/Information_privacy_law
Information securityhttps://en.wikipedia.org/wiki/Information_security
Information Security Governancehttps://en.wikipedia.org/wiki/Information_security_governance
Information Security Managementhttps://en.wikipedia.org/wiki/Information_security_management
Information security policieshttps://en.wikipedia.org/wiki/Information_security_policy
Intellectual propertyhttps://en.wikipedia.org/wiki/Intellectual_property
ISOhttps://en.wikipedia.org/wiki/International_Organization_for_Standardization
ISO/IEC 27000-Serieshttps://en.wikipedia.org/wiki/ISO/IEC_27000-series
IT lawhttps://en.wikipedia.org/wiki/Information_technology_law
NIST SP 800-30 Frameworkhttps://en.wikipedia.org/wiki/IT_risk_management#NIST_SP_800_30_framework
Non-Disclosure Agreementhttps://en.wikipedia.org/wiki/Non-disclosure_agreement
OECD Privacy Frameworkhttps://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf
Organizational Processeshttps://en.wikipedia.org/wiki/Organizational_structure
Patenthttps://en.wikipedia.org/wiki/Patent
Patriot Acthttps://en.wikipedia.org/wiki/Patriot_Act
PCI-DSShttps://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Sarbanes-Oxley Acthttps://en.wikipedia.org/wiki/Sarbanes–Oxley_Act
Security Breach Notification Lawshttps://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx
Trademarkhttps://en.wikipedia.org/wiki/Trademark
PCI Security Standards Councilhttps://www.pcisecuritystandards.org/pci_security/
Security Clearancehttps://en.wikipedia.org/wiki/Security_clearance
Privacy by Designhttps://en.wikipedia.org/wiki/Privacy_by_design
IT Security Audithttps://en.wikipedia.org/wiki/Information_security_audit
Internal controlhttps://en.wikipedia.org/wiki/Internal_control
IT Riskhttps://en.wikipedia.org/wiki/IT_risk
IT risk managementhttps://en.wikipedia.org/wiki/IT_risk_management
Riskhttps://en.wikipedia.org/wiki/Risk
Risk – Attackers/Attackshttps://en.wikipedia.org/wiki/Cyberattack
Risk Assessmenthttps://en.wikipedia.org/wiki/Risk_management#Risk_assessment_and_analysis
Risk Managementhttps://en.wikipedia.org/wiki/Risk_management
Risk management toolshttps://en.wikipedia.org/wiki/Risk_management_tools
Threat Modelinghttps://en.wikipedia.org/wiki/Threat_model
Threat Modeling Process Articlehttps://www.experts-exchange.com/articles/33330/Threat-Modeling-Process-Basics-and-Purpose.html
Vulnerability (computing)https://en.wikipedia.org/wiki/Vulnerability_(computing)
Vulnerability Assessmenthttps://en.wikipedia.org/wiki/Vulnerability_assessment
Separation of dutieshttps://en.wikipedia.org/wiki/Separation_of_duties
Computer Securityhttps://en.wikipedia.org/wiki/Computer_security
Security Modelshttps://en.wikipedia.org/wiki/Computer_security_model
Security Controls Testinghttps://en.wikipedia.org/wiki/Security_testing
Vulnerability Mitigationhttps://en.wikipedia.org/wiki/Vulnerability_management
Cybercrimes/Data Breacheshttps://en.wikipedia.org/wiki/Cybercrime
Warfare/Terrorism/Ransomwarehttps://en.wikipedia.org/wiki/Cyberterrorism
Social Engineeringhttps://en.wikipedia.org/wiki/Social_engineering_(security)
ISC2 Ethicshttps://www.isc2.org/Ethics
OCTAVEhttp:https:https://www.cert.org/resilience/products-services/octave/index.cfm
Brief History of the Internethttps://www.internetsociety.org/internet/history-internet/brief-history-internet-related-networks

Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

DescriptionLink
ISO 22301 Standardhttps://en.wikipedia.org/wiki/ISO_22301
ISO/IEC 27031 Guidelineshttp:https:https://www.iso27001security.com/html/27031.html
NIST SP 800-34 Rev. 1https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf
Digital rights management (DRM)Β https://en.wikipedia.org/wiki/Digital_rights_management
Business continuityhttps://en.wikipedia.org/wiki/Business_continuity
Business Continuity Planninghttps://en.wikipedia.org/wiki/Business_continuity_planning
Fire Suppressionhttps://en.wikipedia.org/wiki/Fire_suppression_system
Backup Sitehttps://en.wikipedia.org/wiki/Backup_site
Backupshttps://en.wikipedia.org/wiki/Backup
Computer Security Incident Managementhttps://en.wikipedia.org/wiki/Computer_security_incident_management
Crisis Managementhttps://en.wikipedia.org/wiki/Crisis_management
Disaster Recoveryhttps://en.wikipedia.org/wiki/Disaster_recovery
Disaster Recovery Planhttps://en.wikipedia.org/wiki/Disaster_recovery_plan
Disaster Recovery Solution Designhttps://www.experts-exchange.com/articles/33009/Disaster-Recovery-Solution-Design.html
Emergency Managementhttps://en.wikipedia.org/wiki/Emergency_management
Emergency Operations Centerhttps://en.wikipedia.org/wiki/Emergency_operations_center
FEMA COOP Planning Templatehttps://www.fema.gov/sites/default/files/2020-10/fema_planning-template-federal-departments-agencies_october-2020_0.pdf
Incident Managementhttps://en.wikipedia.org/wiki/Incident_management
Post-Disaster Recovery Planning Forum Noteshttps://nws.weather.gov/nthmp/Minutes/oct-nov07/post-disaster_recovery_planning_forum_uo-csc-2.pdf
Recovery Time Objective (RTO)https://en.wikipedia.org/wiki/Recovery_time_objective
Redundancyhttps://en.wikipedia.org/wiki/Redundancy_(engineering)
System Resiliencehttps://en.wikipedia.org/wiki/High_availability#Resilience
The Business Continuity Institutehttps://www.thebci.org/
Mean Time Between Failures (MTBF)https://en.wikipedia.org/wiki/Mean_time_between_failures
Mean Time To Repair (MTTR)https://en.wikipedia.org/wiki/Mean_time_to_repair

Domain 3: Access Controls Concepts

DescriptionLink
Need to knowhttps://en.wikipedia.org/wiki/Need_to_know
Asset managementhttps://en.wikipedia.org/wiki/Asset_management
Bell-LaPadula Modelhttps://en.wikipedia.org/wiki/Bell-LaPadula_model
Biba Modelhttps://en.wikipedia.org/wiki/Biba_Model
Clark–Wilson modelhttps://en.wikipedia.org/wiki/Clark–Wilson_model
Graham-Denning Modelhttps://en.wikipedia.org/wiki/Graham-Denning_model
Physical securityhttps://en.wikipedia.org/wiki/Physical_security
IAAA Frameworkhttps://en.wikipedia.org/wiki/AAA_(computer_security)
Attribute-based access control (ABAC)https://en.wikipedia.org/wiki/Attribute-based_access_control
Access Controlhttps://en.wikipedia.org/wiki/Access_control
Access control link 2https://en.wikipedia.org/wiki/Information_security#Access_control
Access Control Matrixhttps://en.wikipedia.org/wiki/Access_Control_Matrix
Access managementhttps://en.wikipedia.org/wiki/Access_management
Active Directoryhttps://en.wikipedia.org/wiki/Active_Directory
Authenticationhttps://en.wikipedia.org/wiki/Authentication
Authorizationhttps://en.wikipedia.org/wiki/Authorization
Credential Management Systemshttps://en.wikipedia.org/wiki/Credential_Management
Discretionary access control (DAC)Β https://en.wikipedia.org/wiki/Discretionary_access_control
Federated Identity Management FIDMhttps://en.wikipedia.org/wiki/Federated_identity
Identity managementhttps://en.wikipedia.org/wiki/Identity_management
Identity Provisioninghttps://en.wikipedia.org/wiki/Provisioning_(technology)
Identity verification servicehttps://en.wikipedia.org/wiki/Identity_verification_service
Least Privilegehttps://en.wikipedia.org/wiki/Principle_of_least_privilege
Mandatory access control (MAC)https://en.wikipedia.org/wiki/Mandatory_access_control
Mobile Device Managementhttps://en.wikipedia.org/wiki/Mobile_device_management
Mobile Device Securityhttps://en.wikipedia.org/wiki/Mobile_security
Multi-factor authenticationhttps://en.wikipedia.org/wiki/Multi-factor_authentication
Mutual Authenticationhttps://en.wikipedia.org/wiki/Mutual_authentication
Network Authenticationhttps://en.wikipedia.org/wiki/Authentication_protocol
Password Authentication Protocol (PAP)https://en.wikipedia.org/wiki/Password_Authentication_Protocol
Privilege Escalationhttps://en.wikipedia.org/wiki/Privilege_escalation
Role-based access control (RBAC)https://en.wikipedia.org/wiki/Role-based_access_control
Service Accounts Managementhttps://en.wikipedia.org/wiki/Service_account
Single Sign-Onhttps://en.wikipedia.org/wiki/Single_sign-on
System Accesshttps://en.wikipedia.org/wiki/Access_control#Computer_security
Type 1 Authenticationhttps://en.wikipedia.org/wiki/Password
Type 3 Authenticationhttps://en.wikipedia.org/wiki/Biometrics
Fire Sprinkler Systemhttps://en.wikipedia.org/wiki/Fire_sprinkler_system
Physical Information Securityhttps://en.wikipedia.org/wiki/Physical_information_security

Domain 4: Network Security

DescriptionLink
Software as a Service (SaaS)https://en.wikipedia.org/wiki/Software_as_a_service
Cloud Sccess Security Broker (CASB)Β https://en.wikipedia.org/wiki/Cloud_access_security_broker
Cloud computinghttps://en.wikipedia.org/wiki/Cloud_computing
Cloud computing securityhttps://en.wikipedia.org/wiki/Cloud_computing_security
Cloud Security Articlehttps://www.experts-exchange.com/articles/32132/Better-Security-in-the-Cloud.html
Cloud Security Threats Articlehttps://www.experts-exchange.com/articles/31744/Cloud-Security-Threats-Risks-and-Concerns.html
Containerizationhttps://en.wikipedia.org/wiki/OS-level_virtualization
Defense in Depthhttps://en.wikipedia.org/wiki/Defense_in_depth_(computing)
Distributed Systemshttps://en.wikipedia.org/wiki/Distributed_computing
Edge Computinghttps://en.wikipedia.org/wiki/Edge_computing
Embedded Systemshttps://en.wikipedia.org/wiki/Embedded_system
Hypervisorhttps://en.wikipedia.org/wiki/Hypervisor
Industrial Control Systemshttps://en.wikipedia.org/wiki/Industrial_control_system
Infrastructure as a Service (IaaS)https://en.wikipedia.org/wiki/Infrastructure_as_a_service
Internet of thingsΒ (IoT)Β https://en.wikipedia.org/wiki/Internet_of_things
IoT Security Guidelineshttps://www.experts-exchange.com/articles/33356/Internet-of-Things-Guidelines-to-prevent-common-IoT-security-risks.html
Platform as a Service (PaaS)https://en.wikipedia.org/wiki/Platform_as_a_service
Serverless Computinghttps://en.wikipedia.org/wiki/Serverless_computing
Virtual Private Cloudhttps://en.wikipedia.org/wiki/Virtual_private_cloud
Virtualized Systemshttps://en.wikipedia.org/wiki/Virtualization
Address Resolution Protocol (ARP)https://en.wikipedia.org/wiki/Address_Resolution_Protocol
Bluetoothhttps://en.wikipedia.org/wiki/Bluetooth
Cellular Networkhttps://en.wikipedia.org/wiki/Cellular_network
Cellular/Mobile Networkshttps://en.wikipedia.org/wiki/Mobile_telephony
Challenge-Handshake Authentication Protocol (CHAP)https://en.wikipedia.org/wiki/Challenge-Handshake_Authentication_Protocol
Cisco Internetworking Basicshttp:https:https://www.ciscopress.com/articles/article.asp?p=31289
Classless Inter-Domain Routing (CIDR)https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing
Computer NetworkingΒ https://en.wikipedia.org/wiki/Computer_network
Content Distribution Networks (CDN)https://en.wikipedia.org/wiki/Content_delivery_network
Converged Protocolshttps://en.wikipedia.org/wiki/Converged_network
Data Communicationshttps://en.wikipedia.org/wiki/Data_transmission
Distance-Vector Routing Protocolhttps://en.wikipedia.org/wiki/Distance-vector_routing_protocol
Domain Name System (DNS)https://en.wikipedia.org/wiki/Domain_Name_System
Dynamic Host Configuration Protocol (DHCP)https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
Ethernethttps://en.wikipedia.org/wiki/Ethernet
Fiber-Optichttps://en.wikipedia.org/wiki/Fiber-optic_communication
File Transfer Protocol (FTP)https://en.wikipedia.org/wiki/File_Transfer_Protocol
Firewallshttps://en.wikipedia.org/wiki/Firewall_(computing)
Frame Relayhttps://en.wikipedia.org/wiki/Frame_Relay
Global Area Network (GAN)https://en.wikipedia.org/wiki/Global_area_network
Internet Assigned Numbers Authority (IANA)https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority
Internet Control Message Protocol (ICMP)https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
IP Addresseshttps://en.wikipedia.org/wiki/IP_address
IPv4https://en.wikipedia.org/wiki/IPv4
IPv6https://en.wikipedia.org/wiki/IPv6
Layer 1-3 Deviceshttps://en.wikipedia.org/wiki/Networking_hardware
MAC Addresshttps://en.wikipedia.org/wiki/MAC_address
Micro-Segmentationhttps://en.wikipedia.org/wiki/Microsegmentation
Modemshttps://en.wikipedia.org/wiki/Modem
Multiprotocol Label Switching (MPLS)https://en.wikipedia.org/wiki/Multiprotocol_Label_Switching
Network Access Controlhttps://en.wikipedia.org/wiki/Network_access_control
Network Managementhttps://en.wikipedia.org/wiki/Network_management
Network Switchhttps://en.wikipedia.org/wiki/Network_switch
Network topologyhttps://en.wikipedia.org/wiki/Network_topology
OSI Modelhttps://en.wikipedia.org/wiki/OSI_model
Ping Networking Utilityhttps://en.wikipedia.org/wiki/Ping_(networking_utility)
Quality of Service (QoS)https://en.wikipedia.org/wiki/Quality_of_service
Remote access servicehttps://en.wikipedia.org/wiki/Remote_access_service
Remote Desktop Protocol (RDP)https://en.wikipedia.org/wiki/Remote_Desktop_Protocol
Remote desktop softwarehttps://en.wikipedia.org/wiki/Remote_desktop_software
Routerhttps://en.wikipedia.org/wiki/Router_(computing)
Routing Protocolshttps://en.wikipedia.org/wiki/Routing_protocol
Satellite Internet Accesshttps://en.wikipedia.org/wiki/Satellite_Internet_access
Secure Access Service Edgehttps://en.wikipedia.org/wiki/Secure_access_service_edge
Secure Communication Channelshttps://en.wikipedia.org/wiki/Secure_communication
Secure Shell (SSH)https://en.wikipedia.org/wiki/Secure_Shell
Simple Network Management Protocol (SNMP)https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol
Software Defined Networkshttps://en.wikipedia.org/wiki/Software-defined_networking
TCP and UDP Port Numbershttps://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
TCP/IP Modelhttps://en.wikipedia.org/wiki/Internet_protocol_suite
Transmission Control Protocol (TCP)https://en.wikipedia.org/wiki/Transmission_Control_Protocol
Transmission Mediahttps://en.wikipedia.org/wiki/Transmission_medium
Twisted Pairhttps://en.wikipedia.org/wiki/Twisted_pair
User Datagram Protocol (UDP)https://en.wikipedia.org/wiki/User_Datagram_Protocol
Virtual Private Network (VPN)https://en.wikipedia.org/wiki/Virtual_private_network
VLANhttps://en.wikipedia.org/wiki/Virtual_LAN
Voice over IP (VoIP)https://en.wikipedia.org/wiki/Voice_over_IP
WAN Protocolshttps://en.wikipedia.org/wiki/Wide_area_network
WiFihttps://en.wikipedia.org/wiki/Wi-Fi
Wireless Access Pointhttps://en.wikipedia.org/wiki/Wireless_access_point
Wireless LANhttps://en.wikipedia.org/wiki/Wireless_LAN
Wireless Networkshttps://en.wikipedia.org/wiki/Wireless_network
Zero Trusthttps://en.wikipedia.org/wiki/Zero_trust_security_model
ZigBeehttps://en.wikipedia.org/wiki/ZigBee
Core Security Penetration Testing Serviceshttp:https:https://www.coresecurity.com/
AI in Securityhttps://en.wikipedia.org/wiki/Artificial_intelligence_for_cybersecurity
Antivirus softwarehttps://en.wikipedia.org/wiki/Antivirus_software
API Securityhttps://en.wikipedia.org/wiki/Application_programming_interface#Security
Application Programming Interface (API)https://en.wikipedia.org/wiki/API
Attacks on Cryptographyhttps://en.wikipedia.org/wiki/Cryptanalysis
Brute Force Attackhttps://en.wikipedia.org/wiki/Brute-force_attack
MITM Attackhttps://en.wikipedia.org/wiki/Man-in-the-middle_attack
Denial-of-Service Attackhttps://en.wikipedia.org/wiki/Denial-of-service_attack
Eavesdroppinghttps://en.wikipedia.org/wiki/Eavesdropping
Intrusion detection systemhttps://en.wikipedia.org/wiki/Intrusion_detection_system
0-day Attackshttps://en.wikipedia.org/wiki/Zero-day_(computing)
Pen Testing Toolshttps://en.wikipedia.org/wiki/Penetration_test#Tools
Penetration Testinghttps://en.wikipedia.org/wiki/Penetration_test
Security Fuzzershttps://en.wikipedia.org/wiki/Fuzzing
Vulnerability Scannershttps://en.wikipedia.org/wiki/Vulnerability_scanner
Honeynets/Honeypotshttps://en.wikipedia.org/wiki/Honeypot_(computing)
Malwarehttps://en.wikipedia.org/wiki/Malware
Carrier-Sense Multiple Access (CSMA)https://en.wikipedia.org/wiki/Carrier-sense_multiple_access
Coaxial Cablehttps://en.wikipedia.org/wiki/Coaxial_cable
Duplexhttps://en.wikipedia.org/wiki/Duplex_(telecommunications)

Domain 5: Security Operations

DescriptionLink
Data Classificationhttps://en.wikipedia.org/wiki/Data_classification_(business_intelligence)
Data Collectionhttps://en.wikipedia.org/wiki/Data_collection
Data Retentionhttps://en.wikipedia.org/wiki/Data_retention
Auditing and Logginghttps://en.wikipedia.org/wiki/Audit_trail
Information security audithttps://en.wikipedia.org/wiki/Information_technology_security_audit
IT Auditshttps://na.theiia.org/standards-guidance/recommended-guidance/practice-guides/Pages/GTAG9.aspx – DEAD
NIST SP 800-115https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
Security Auditshttps://en.wikipedia.org/wiki/Information_technology_audit
NIST SP 800-92https://en.wikipedia.org/wiki/NIST_Special_Publication_800-92
Change Managementhttps://en.wikipedia.org/wiki/Change_management
Security Assessmentshttps://en.wikipedia.org/wiki/IT_security_assessment
Vulnerability Assessments vs. Penetration Testshttps://www.experts-exchange.com/articles/31793/Vulnerability-Assessments-versus-Penetration-Tests.html
Security Awareness Traininghttps://en.wikipedia.org/wiki/Internet_Security_Awareness_Training
Data at resthttps://en.wikipedia.org/wiki/Data_at_rest
Data Destructionhttps://en.wikipedia.org/wiki/Data_erasure
Data in transithttps://en.wikipedia.org/wiki/Data_in_transit
Data in usehttps://en.wikipedia.org/wiki/Data_in_use
Data Protection Methodshttps://en.wikipedia.org/wiki/Data_protection
Data Remanencehttps://en.wikipedia.org/wiki/Data_remanence
Data loss prevention (DLP) softwareΒ https://en.wikipedia.org/wiki/Data_loss_prevention_software
Information Lifecyclehttps://en.wikipedia.org/wiki/Information_lifecycle_management
Modern Encryptionhttps://en.wikipedia.org/wiki/Cryptography#Modern_cryptography
Asymmetric Encryptionhttps://en.wikipedia.org/wiki/Public-key_cryptography
Cryptographic Noncehttps://en.wikipedia.org/wiki/Cryptographic_nonce
Cryptographyhttps://en.wikipedia.org/wiki/Cryptography
Digital Signatureshttps://en.wikipedia.org/wiki/Digital_signature
Encryptionhttps://en.wikipedia.org/wiki/Encryption
Hashinghttps://en.wikipedia.org/wiki/Hash_function
Hybrid Cryptosystemhttps://en.wikipedia.org/wiki/Hybrid_cryptosystem
Initialization Vectorhttps://en.wikipedia.org/wiki/Initialization_vector
IPSechttps://en.wikipedia.org/wiki/Ipsec
Key Managementhttps://en.wikipedia.org/wiki/Key_management
One-Time Padhttps://en.wikipedia.org/wiki/One-time_pad
Pretty Good Privacy (PGP)https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Public Key Infrastructurehttps://en.wikipedia.org/wiki/Public_key_infrastructure
Secure Defaultshttps://en.wikipedia.org/wiki/Secure_by_default
Secure Design Principleshttps://en.wikipedia.org/wiki/Secure_by_design
Security by Design Principleshttps://wiki.owasp.org/index.php/Security_by_Design_Principles
Symmetric Encryptionhttps://en.wikipedia.org/wiki/Symmetric-key_algorithm
Transport Layer SecurityΒ (TLS)Β https://en.wikipedia.org/wiki/Transport_Layer_Security
Challenge-Response Authenticationhttps://en.wikipedia.org/wiki/Challenge–response_authentication
Extensible Authentication Protocol (EAP)https://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
Kerberoshttps://en.wikipedia.org/wiki/Kerberos_(protocol)
RADIUShttps://en.wikipedia.org/wiki/RADIUS
Saltinghttps://en.wikipedia.org/wiki/Salt_(cryptography)
Session Managementhttps://en.wikipedia.org/wiki/Session_(computer_science)
TACACShttps://en.wikipedia.org/wiki/TACACS
Code Review and Testinghttps://en.wikipedia.org/wiki/Code_review
Continuous Monitoringhttps://en.wikipedia.org/wiki/Continuous_monitoring
Kali Linuxhttps://www.kali.org/
Application Positive-listinghttps://en.wikipedia.org/wiki/Whitelist
Configuration Managementhttps://en.wikipedia.org/wiki/Configuration_management
Endpoint Securityhttps://en.wikipedia.org/wiki/Endpoint_security
Keystroke Logginghttps://en.wikipedia.org/wiki/Keystroke_logging
Logging and Monitoringhttps://en.wikipedia.org/wiki/Log_management
Patch Managementhttps://en.wikipedia.org/wiki/Patch_(computing)
Sandboxinghttps://en.wikipedia.org/wiki/Sandbox_(computer_security)
Security Toolshttp:https:https://sectools.org/
SIEM Articlehttps://www.experts-exchange.com/articles/32316/What-Gives-SIEM-a-Good-Name.html
Software deploymenthttps://en.wikipedia.org/wiki/Software_deployment
Database securityhttps://en.wikipedia.org/wiki/Database_security
Databaseshttps://en.wikipedia.org/wiki/Database
2021 OWASP Top 10https://owasp.org/Top10/
Application SecurityΒ https://en.wikipedia.org/wiki/Application_security
Buffer Overflowhttps://en.wikipedia.org/wiki/Buffer_overflow
CI/CDhttps://en.wikipedia.org/wiki/CI/CD
DevOpshttps://en.wikipedia.org/wiki/DevOps
Integrated Development Environmenthttps://en.wikipedia.org/wiki/Integrated_development_environment
Integrated Product Teamhttps://en.wikipedia.org/wiki/Integrated_product_team
OWASPhttps://en.wikipedia.org/wiki/OWASP
OWASP Main Pagehttps://owasp.org/
OWASP Top 10https://owasp.org/www-project-top-ten/2017/
OWASP Vulnerability Categoryhttps://owasp.org/www-community/vulnerabilities/
Secure SDLC Principles and Practiceshttps://www.experts-exchange.com/articles/33288/Secure-SDLC-Principles-and-Practices.html
Software Configuration Managementhttps://en.wikipedia.org/wiki/Software_configuration_management
Software Vulnerabilitieshttps://en.wikipedia.org/wiki/Software_vulnerability
Source-Code Securityhttps://en.wikipedia.org/wiki/Source_code
Metasploithttps://metasploit.com/
Nessus Softwarehttps://en.wikipedia.org/wiki/Nessus_(software)
Password Crackinghttps://en.wikipedia.org/wiki/Password_cracking
Rainbow Tablehttps://en.wikipedia.org/wiki/Rainbow_table
Incident Handling and Response Planhttps://www.experts-exchange.com/articles/31763/Incident-Handling-and-Response-Plan.html
Phishinghttps://en.wikipedia.org/wiki/Phishing
Ransomwarehttps://en.wikipedia.org/wiki/Ransomware
Security information and event management (SIEM)https://en.wikipedia.org/wiki/Security_information_and_event_management
Security orchestration, automation and responseΒ (SOAR)Β https://en.wikipedia.org/wiki/Security_orchestration
History of Cryptographyhttps://en.wikipedia.org/wiki/History_of_cryptography