Published on ThorTeaches and Udemy:
How to design your career and certification path
The 4 things you need to pass your CISSP certification
How to find your study materials – Videos and books
How to find your study materials – Free resources
How to find your study materials – Practice questions
What I would get if I was studying for the CISSP
How to build your study plan
How to use practice questions, deconstruct them, and time management – part 1
How to use practice questions, deconstruct them, and time management – part 2
Domain 1 what we will be covering
The CIA triad – Part 1 – Confidentiality, Integrity, and Availability
The CIA triad – Part 2 – Confidentiality, Integrity, and Availability
IAAA – Part 1 – Identification, Authentication, Authorization, and Accountability
IAAA – Part 2 – Identification, Authentication, Authorization, and Accountability
Governance and Management
Standards and frameworks
Laws and regulations
Laws and regulations – Evidence
Intellectual property
US laws, European laws, and international treaties
GDPR (General Data Protection Regulation)
International agreements and guidelines.
3rd party, Acquisitions, and Divesture security.
The (ISC)² Code of Ethics
Information Security Governance: Values, vision, mission, and plans.
Information Security Governance: Policies, procedures, guidelines, and frameworks.
Access Control Categories and Types
Risk Management – Identification
Risk Management – Assessment Part 1
Risk Management – Assessment Part 2
KGIs, KPIs, and KRIs
Risk response and mitigation & Risk and Control Monitoring and Reporting.
NIST SP 800-53 Revision 4
NIST SP 800-37 Revision 1 and 2
Risk: Attackers and types of attacks – Part 1.
Risk: Attackers and types of attacks – Part 2.
BCP – Business Continuity Planning – Part 1.
BCP – Business Continuity Planning – Part 2.
BCP – BIA (Business Impact Analysis).
Domain 1 what we covered.
Domain 1 study guides
Domain 2 what we will be covering.
The information life cycle.
Data classification and clearance.
The 3 states of data (data at rest, data in motion, and data in use).
Data handling, data storage, and data retention.
Mission, data, system owners, and data custodians.
Memory and data remanence.
Data remanence and destruction.
Data security frameworks.
Domain 2 what we covered.
Domain 2 study guides
Domain 3 what we will be covering.
Security models and concepts – introduction.
Security models and concepts – part 1
Security models and concepts – part 2
Security evaluation models
Secure system design concepts
Hardware architecture
Secure operating systems and software architecture
Virtualization, Cloud, and Distributed Computing – Part 1
Virtualization, Cloud, and Distributed Computing – Part 2
Virtualization, Cloud, and Distributed Computing – Part 3
Virtualization, Cloud, and Distributed Computing – Part 4
IOT (Internet Of Things)
Emanations and covert channels.
Malware part 1
Malware part 2
Web architecture and attacks
Database security
Mobile device security
Industrial Control Systems
Introduction to Cryptography part 1
Introduction to Cryptography part 2
The history of cryptography part 1
The history of cryptography part 2
The encryption we use today
Symmetric encryption part 1
Symmetric encryption part 2
Asymmetric encryption part 1
Asymmetric encryption part 2
Hashing part 1
Hashing part 2
Attacks on our cryptography part 1
Attacks on our cryptography part 2
Attacks on our cryptography part 3
Digital signatures
MAC, HMAC, SSL, and TLS
IPSec and PGP
Physical security part 1
Physical security part 2
Physical security part 3
Physical security part 4
Physical security part 5
Physical security part 6
Site selection part 1
Site selection part 2
Media storage
Asset tracking and hardware hardening
Electricity
Fire suppression and hot and cold aisles
Heat, Flame, Particle, and Smoke Detectors
Personnel safety
Fire suppression
Domain 3 what we covered.
Domain 3 study guides
Editing should start 3/3
Safari:
Updates are sent a full domain at a time, how long Safari takes before they update the content I can’t speculate on.
Sent to Safari:
CISSP Domain 1
CISSP Domain 2
CISSP Domain 3