Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

61 total results found

CISSP Study Guide

PhD Research Proposal

3.1 Cryptography

CISSP Study Guide

Cryptography can be a challenging aspect of the CISSP exam, as it demands a substantial grasp of theory and involves considerable memorization. This chapter is structured to be rich with examples, aiming to deepen your understanding of the diverse types of cry...

1: Security and Risk Management

CISSP Study Guide

2, 3: Security Architecture & Engineering

CISSP Study Guide

4: Communication and Network Sec.

CISSP Study Guide

5: Identity and Access Management

CISSP Study Guide

6: Security Assessment and Testing

CISSP Study Guide

7: Security Operations

CISSP Study Guide

8: Software Development Security

CISSP Study Guide

Practice Exams

CISSP Study Guide

Think like a C-Suite

CISSP Study Guide 1: Security and Risk Management

You may have heard the mantra "think like a manager" numerous times, be it from resources like Reddit or YouTube, as a part of your CISSP preparation, and it makes perfect sense. But what does that mean? Anyone can be a manager... What strategies and do you ne...

Risk Analysis Formulas

CISSP Study Guide 1: Security and Risk Management

Understanding Risks Analysis Formulas Risk analysis can be broken down into two primary methods. Qualitative Risk Analysis and Quantitative Risk Analysis.  Qualitative Risk Analysis is much more subjective and focuses on the perceived level of risk. This cou...

Introduction & Concepts

CISSP Study Guide 3.1 Cryptography

Understanding the core principles of cryptography is crucial in the journey towards CISSP certification. These principles underpin the mechanisms of secure data handling, confidentiality, and non-repudiation. Additionally, concepts like work function, zero-kno...

Ciphers & Codes

CISSP Study Guide 3.1 Cryptography

This overview provides an introduction to the basic concepts of codes and ciphers, essential elements of cryptography in cybersecurity. Codes are systems of symbols or a technical language used to convey a hidden meaning. They convert a message into a form tha...

Public Key Infrastructure (PKI)

CISSP Study Guide 3.1 Cryptography

Public Key Infrastructure (PKI) is an essential framework in cybersecurity that works like a digital passport office, issuing and validating certificates for secure data transfer and communication. The process involves Certificate Authorities (CAs), akin to pa...

Asymmetric vs. Symmetric

CISSP Study Guide 3.1 Cryptography

In short, symmetric cryptography is faster and simpler but lacks scalability, has challenges with key distribution, and cannot provide nonrepudiation. On the other hand, asymmetric cryptography, while slower and more complex, offers scalability, easier key di...

Hashing vs. Encryption

CISSP Study Guide 3.1 Cryptography

In the previous pages, we covered discussed encryption as a bidirectional function. Note how encryption was a two-way function. What we have sent is to be decrypted and interpreted. Where as Hashing, what we will cover below, is a one-way function. It scramble...

Threat Modeling

CISSP Study Guide 1: Security and Risk Management

 Supply Chain Risk Management (SCRM) Modern service delivery often involves a chain of multiple entities. Even companies that aim to control as much production in-house as possible, such as Apple, rely on components from a diverse range of suppliers. For ex...

Domain 2: Asset Security

CISSP Study Guide 2, 3: Security Architecture & Engineering

Data Security Controls When preparing for your CISSP exam, the primary areas to focus on include Marking, Labeling, Handling, and Classification, with Classification taking precedence. Security Control Baseline: This is a standard set of controls that an...

Frameworks

CISSP Study Guide 2, 3: Security Architecture & Engineering

Common Criteria (CC) - ISO/IEC 15408 Overview: Provides a framework for the security evaluation of software and hardware products. Key Point: Allows objective evaluation ensuring products/systems meet specific security standards. Relevance: Internationall...

Introduction & New Concepts

CISSP Study Guide 2, 3: Security Architecture & Engineering

Introduction to Key Concepts We will cover, at a high level, the following concepts which will be required on the exam: 3.1 - Research, Implement, and Manage Engineering Processes Using Secure Design Principles Traditional Concepts: Threat Modeling: Sy...

Technological Architectures

CISSP Study Guide 2, 3: Security Architecture & Engineering

Microservices and Service Orientated Architecture (SOA) Service-Oriented Architecture (SOA) is all about creating distinct, user-accessible services that operate in a black-box fashion. However, you might not hear much about it these days. Its relevance has f...

Computing Programs

CISSP Study Guide 2, 3: Security Architecture & Engineering

Grid Computing Grid computing, a subset of distributed computing, harnesses the power of many loosely coupled computers to perform sizable tasks. Characteristics: Resource Pooling: Often described as "virtual supercomputing," grid computing pools reso...

Authentication & Access

CISSP Study Guide 2, 3: Security Architecture & Engineering

Security Modes Multilevel Mode Designed for systems that handle data of varying classifications within a single system. Not all users have the clearance to access all data. Example: In a government organization, a system might contain both "Confidential"...

Cloud & Network Security

CISSP Study Guide 2, 3: Security Architecture & Engineering

CASB (Cloud Access Security Broker) Definition: A CASB is a security solution that sits between an organization's on-premises infrastructure and cloud provider's infrastructure. It acts as a gatekeeper, allowing organizations to extend their security policies...

Hardware & System Infrastructure

CISSP Study Guide 2, 3: Security Architecture & Engineering

Processor States Single State Processors Multi-State Processors Processors restricted to one security level at a time. Processors capable of managing data at multiple security levels simultaneously. A system exclusively processing confid...

Threats & Countermeasures

CISSP Study Guide 2, 3: Security Architecture & Engineering

Process Isolation: It's like giving each process its own private room. This ensures a process only gets to access its own data, ensuring no nosy neighbors. Layering: Think of it as setting up multiple security checkpoints in a building. By establishin...

Physical Security

CISSP Study Guide 2, 3: Security Architecture & Engineering

Physical Security Controls Functional Order of Security Controls Stage Purpose Example ⬇️ Deterrence Discourage unwanted behavior. Not designed to block, just deter Security warning signs ⬇️ Denial Block unwanted behavior or access Lock...

Cryptographic Systems

CISSP Study Guide 3.1 Cryptography

Post-Quantum Cryptography (PQC) PQC refers to cryptographic algorithms designed to be secure against the potential future threats posed by quantum computers. Traditional cryptographic algorithms are susceptible to quantum attacks, making PQC vital for future-...

Introduction & Concepts

CISSP Study Guide 4: Communication and Network Sec.

Objective Implement secure design principles in network architectures. Secure network components. Implement secure communication channels according to design. Recent updates in Domain 4 stress the assessment and implementation of secure design principl...