Overview
This CISSP exam cram lecture covers all eight CISSP domains, focusing on high-probability topics, key definitions, exam strategies, and practical study techniques to efficiently prepare for the exam.
Exam Prep Strategy & Learning Techniques
- Study the 9th edition official CISSP guide (ebook recommended).
- Focus on high-probability, high-difficulty topics first.
- Use spaced repetition for long-term retention (review weak areas frequently).
- Apply mnemonic devices and chunking to memorize complex concepts (e.g., OSI model, risk formulas).
- Use practice quizzes to identify domain-specific weaknesses.
- Map book chapters to domains to target practice.
- Employ variety in study methods (quizzes, flashcards, readings) for best retention.
CISSP Exam Format & Recent Changes
- CISSP has 8 domains; domain weightings changed minimally in 2021.
- CAT (Computerized Adaptive Testing): 3 hours, 100β150 questions; adapts to your performance.
- Pass requirement: 70%, must pass every domain.
- Upcoming change: 4 hours, 125β175 questions, with 50 pre-test items.
Domain 1: Security and Risk Management
- Key concepts: CIA Triad (Confidentiality, Integrity, Availability).
- Due Care: Doing what a reasonable person would do (prudent man rule).
- Due Diligence: Ongoing evaluation, risk assessments, and audits.
- Know the ISCΒ² Code of Ethics.
- Understand types and responses to risk: acceptance, mitigation, transference, avoidance, deterrence, rejection.
- Know risk management frameworks, especially NIST 800-37 (7 steps: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor).
- Be familiar with risk analysis: qualitative (subjective, uses rankings) vs. quantitative (objective, uses formulas).
- Quantitative formulas:
- SLE = Asset Value Γ Exposure Factor
- ALE = SLE Γ Annualized Rate of Occurrence
- Safeguard Value = (ALE before β ALE after) β Annual Safeguard Cost
Domain 2: Asset Security
- Know the data lifecycle: create, store, use, share, archive, destroy.
- Data must be classified immediately after creation for proper protection.
- Data destruction methods: erasing (recoverable), clearing/overwriting (not recoverable with standard tools), purging, degaussing, destruction (most secure).
- Data classification levels (government: unclassified, confidential, secret, top secret; commercial: public, sensitive, private, confidential/proprietary).
- Understand PII (personally identifiable information) and PHI (protected health information).
- Roles: Data Owner (senior management) delegates, Data Custodian implements.
- GDPR terminology: data controller, data processor, data transfer restrictions, breach notification within 72 hours.
- Anonymization (irreversible) vs. pseudonymization (reversible masking).
Domain 3: Security Architecture and Engineering
- Secure design principles: zero trust, least privilege, defense in depth, secure defaults, fail securely, simplicity, shared responsibility.
- Understand cryptographic concepts: symmetric/asymmetric, key management, non-repudiation, hashing.
- Security models: Bell-LaPadula (confidentiality, no read up/no write down), Biba (integrity, no read down/no write up), Clark-Wilson (access control triple), lattice-based models.
- Trusted Computing Base (TCB), security kernel, reference monitor.
- Evaluation criteria: Common Criteria (EAL levels), TCSEC, ITSEC (focus on Common Criteria).
- Access control types: MAC, DAC, RBAC, rule-based.
Domain 4: Communication and Network Security
- OSI model layers (mnemonics: Please Do Not Throw Sausage Pizza Away).
- TCP/IP stack vs. OSI.
- Key protocols, ports, and cable types.
- Network topologies: mesh, ring, bus, star.
- Collision management: CSMA/CD (Ethernet), CSMA/CA (wireless).
- Wireless security standards: WEP, WPA, WPA2 (CCMP/AES).
- Firewalls: stateless, stateful, next-gen, web app firewall.
- Network attacks: DoS, DDoS, SYN flood, ping of death, etc.
Domain 5: Identity and Access Management
- Authentication factors: something you know, have, are.
- Single Sign-On protocols: SAML, OAuth 2.0, OpenID Connect.
- Know policies: need to know, least privilege, separation of duties.
- Access control models: DAC, RBAC, ABAC, MAC.
- Common attacks: brute force, dictionary, spoofing, phishing.
Domain 6: Security Assessment and Testing
- Difference between vulnerability scanning (automated) and penetration testing (exploitation).
- Software testing: static (code review) vs. dynamic (runtime).
- Maintain ongoing assessment programs.
- Internal vs. external audits.
- Always have a defined, operational assessment and testing program.
Domain 7: Security Operations
- Principles: least privilege, need to know, separation of duties, job rotation.
- Information lifecycle: creation, classification, storage, use, archival, destruction.
- Understand incident response: detection, response, mitigation, reporting, recovery, remediation, lessons learned (mnemonic: DRM RRL).
- Denial of service attacks, botnets, honeypots.
- Types of recovery sites: hot, warm, cold; RPO and RTO definitions.
- Backup strategies: electronic vaulting, remote journaling, mirroring.
- Business continuity and disaster recovery planning: know steps and key definitions.
Domain 8: Software Development Security
- Secure SDLC models: Agile, Waterfall, Spiral.
- Software testing: code review, peer review, static/dynamic analysis.
- Secure coding practices, secure code repositories.
- Code scanning: SAST (static) and DAST (dynamic).
- Database security: primary/foreign keys, aggregation, inference, sql injection.
- Change/configuration management and versioning.
- Familiarity with software maturity models: SW-CMM, IDEAL.
Key Terms & Definitions
- CIA Triad β Confidentiality, Integrity, Availability; core security principles.
- Due Diligence β Ongoing evaluation and risk assessment.
- Due Care β Acting as a prudent person would to prevent harm.
- SLE (Single Loss Expectancy) β The financial loss from a single event.
- ALE (Annualized Loss Expectancy) β Expected yearly loss; SLE Γ ARO.
- RBAC β Role-Based Access Control; assigns permissions by roles.
- AAA β Authentication, Authorization, Accounting.
- GDPR β EU data protection law impacting any org with EU customers.
- Zero Trust β No default trust; always verify users/devices/requests.
- EAL (Evaluation Assurance Level) β Security certification level under Common Criteria.
Action Items / Next Steps
- Obtain the official (9th ed.) CISSP study guide (ebook).
- Identify and focus on weakest domains first using practice quizzes.
- Memorize risk formulas and security model properties.
- Review key laws, GDPR terminology, and data classification schemes.
- Practice OSI model layers and common network attacks.
- Download and use FAQ/errata and supplemental resources from video description.