SlideShare a Scribd company logo
CISSP Preview - For the next generation of Security Leaders
OVERVIEW OF 8 DOMAINS
A look into the 8 domains in the CISSP CBK
3
CISSP 8 Domains
1. Security and Risk Management
(Security, Risk, Compliance, Law, Regulations, Business Continuity)
2. Asset Security
(Protecting Security of Assets)
3. Security Engineering
(Engineering and Management of Security)
4. Communications and Network Security
(Designing and Protecting Network Security)
5. Identity and Access Management
(Controlling Access and Managing Identity)
6. Security Assessment and Testing
(Designing, Performing, and Analyzing Security Testing)
7. Security Operations
(Foundational Concepts, Investigations, Incident Management, Disaster Recovery)
8. Software Development Security
(Understanding, Applying, and Enforcing Software Security)
Effective April 15, 2015
4
CISSP Domain & Weights
Domains Weight
1. Security and Risk Management 16%
2. Asset Security 10%
3. Security Engineering 12%
4. Communication and Network Security 12%
5. Identity and Access Management 13%
6. Security Assessment and Testing 11%
7. Security Operations 16%
8. Software Development Security 10%
Total 100%
5
Security & Risk Management
The Security and Risk Management provides you with
the framework and policies, concepts, principles,
structures, and standards used to establish criteria
for the protection of information assets and to assess
the effectiveness of that protection. It includes issues
of governance, organizational behavior, and security
awareness.
6
Security & Risk Management
• Understand and apply concepts of confidentiality,
integrity and availability
• Apply security governance principles
• Compliance
• Understand legal and regulatory issues that pertain
to information security in a global context
• Understand professional ethics
• Develop and implement documented security
policy, standards, procedures, and guidelines
7
Security & Risk Management
• Understand business continuity requirements
• Contribute to personnel security policies
• Understand and apply risk management concepts
• Understand and and apply threat modeling
• Integrate security risk considerations into
acquisition strategy and practice
• Establish and manage information security
education, training, and awareness
8
Asset Security
The Asset Security domain provides you with the
concepts, principles, structures, and standards used
to monitor and secure assets and those controls
used to enforce various levels of confidentiality,
integrity, and availability.
9
Asset Security
• Classify information and supporting assets
• Determine and maintain ownership
• Protect privacy
• Ensure appropriate retention
• Determine data security controls
• Establish handling requirements
10
Security Engineering
The Security Engineering domain provides you with
the concepts, principles, structures, and standards
used to design, implement, monitor, and secure
operating systems, equipment, networks,
applications, and those controls used to enforce
various levels of confidentiality, integrity, and
availability.
11
Security Engineering
• Implement and manage engineering processes using
secure design principles
• Understand the fundamental concepts of security
models
• Select controls and countermeasures based upon
systems security evaluation models
• Understand security capabilities of information
systems
• Assess and mitigate the vulnerabilities of security
architectures, designs, and solution elements
12
Security Engineering
• Assess and mitigate the vulnerabilities in web-based
systems
• Assess and mitigate vulnerabilities in mobile systems
• Assess and mitigate vulnerabilities in embedded
devices and cyber-physical systems
• Apply cryptography
• Apply secure principles to site and facility design
• Design and implement physical security
13
Communications & Network Security
The Communications and Network Security domain
provides you with an understanding of network
security related to structures, methods, formats, and
measures for the transmission of information.
14
Communications & Network Security
• Apply secure design principles to network
architecture
• Secure network components
• Design and establish secure communication
channels
• Prevent or mitigate network attacks
15
Identity and Access Management
The Identity and Access Management domain
provides the basis for the understanding how access
management works, why it is a key security discipline,
and how each individual component to be discussed
in this chapter relates to the overall access
management universe. The most fundamental and
significant concept to master is a precise definition of
the term “access control”.
16
Identity and Access Management
• Control physical and logical access to assets
• Manage identification and authentication of people
and devices
• Integrate identity as a service
• Integrate third-party identity services
• Implement and manage authorization mechanisms
• Prevent or mitigate access control attacks
• Manage the identity and access provisioning
lifecycle
17
Security Assessment and Testing
The Security Assessment and Testing domain
provides you with the knowledge to assist in
managing the risks involved in developing, producing,
operating, and sustaining systems and capabilities.
18
Security Assessment and Testing
• Design and validate assessment and test
strategies
• Conduct security control testing
• Collect security process data
• Analyze and report test outputs
• Understand the vulnerabilities of security
architectures
19
Security Operations
The Security Operations domain covers operations
security and security operations. Operations security
is primarily concerned with the protection and control
of information processing assets in centralized and
distributed environments. Security operations is
primarily concerned with the daily tasks required to
keep security services operating reliably and
efficiently.
20
Security Operations
• Understand and support investigations
• Understand requirements for investigation types
• Conduct logging and monitoring activities
• Secure the provisioning of resources
• Understand and apply foundational security operations
concepts
• Employ resource protection techniques
• Conduct incident management
• Operate and maintain preventative measures
21
Security Operations
• Implement and support patch and vulnerability
management
• Participate in and understand change management
processes
• Implement recovery strategies
• Implement disaster recovery processes
• Test disaster recover plans
• Participate in business continuity planning and exercises
• Implement and manage physical security
• Participate in addressing personnel safety concerns
22
Software Security Development
The Software Security Development domain provides
you with the abilities required to ensure that the
focus of the enterprise security architecture includes
application development, since many information
security incidents involve software vulnerabilities in
one form or another.
23
Software Development Security
• Understand and apply security in the software
development lifecycle
• Enforce security controls in development
environments
• Assess the effectiveness of software security
• Assess security impact of acquired software
24
CISSP Exam
• 250 Questions
– 225 questions are graded
• Multiple choice questions
– One answer is correct or is the “BEST” answer
• 6 hours given to complete the exam
• Passing grade is 700 out of 1000 points
PREPARING FOR THE EXAM
26
(ISC)² Education
Official (ISC)² Education Products
Official (ISC)² Guide to the CISSP CBK
Textbook
Official (ISC)² CISSP Study Guide
CISSP for Dummies
CISSP Practice Tests
Official Study App
Exam Outline
Official (ISC)² Training
Interactive Flashcards
For details: https://www.isc2.org/cissp-exam-prep/
27
CISSP Exam Preparation
• Self-Study Tools
– CISSP Exam Outline
– Official (ISC)² Guide to the CISSP CBK, 4th Edition
– Official (ISC)² CISSP Study Guide, 7th Edition
– CISSP for Dummies, 5th Edition
– Official (ISC)² CISSP Practice Tests
– Official CISSP Study App
– Official (ISC)² CISSP Flash Cards
28
CISSP Exam Preparation
• Training Methods
– Classroom-based
– Private, On-site
– Live OnLine
– OnDemand
29
Download the Exam Outline
• Provides a comprehensive overview of the
domains and key areas of knowledge
• Examination qualification requirements
• Includes a suggested reference list
• Download >> www.isc2.org/exam-outline
30
Official (ISC)² Guide to the CISSP
CBK, Fourth Edition
• Aligns with the 8 domains
• Real work examples
• Glossary with over 400 terms
• End of domain review questions
• Only textbook endorsed by (ISC)²
• Available in hard cover, iTunes,
and Kindle
• Learn more >> www.isc2.org/official-isc2-textbooks
31
Official (ISC)² Training Seminar
• Official (ISC)² courseware
• Taught by an authorized (ISC)² instructor
• Student handbook
• Real-world learning activities and scenarios
• Interactive and engaging learning techniques
• Available online, in classroom, or private on-site
• Learn more >> www.isc2.org/cissprevsem
32
Official Training Provider
Find your nearest official training provider:
www.isc2.org/educationaffiliates.aspx
QUESTIONS?

More Related Content

PPT
isms-presentation.ppt
PPTX
Information Security Governance and Strategy
PDF
Cybersecurity Roadmap Development for Executives
PPT
Security policy
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
ISO 27001 - Information Security Management System
PPSX
Security policies
isms-presentation.ppt
Information Security Governance and Strategy
Cybersecurity Roadmap Development for Executives
Security policy
Information Assurance And Security - Chapter 1 - Lesson 4
ISO 27001 - Information Security Management System
Security policies

What's hot (20)

PDF
Introduction to Cybersecurity
PDF
Cyber Threat Intelligence
PDF
Threat Intelligence
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PPTX
Information Security Governance and Strategy - 3
PDF
ISO/IEC 27001:2013 An Overview
PDF
PDF
MITRE ATT&CK Framework
PPTX
Basic introduction to iso27001
PDF
Governance of security operation centers
PDF
NQA ISO 27001 Implementation Guide
PPTX
CISSP - Chapter 1 - Security Concepts
PPT
Overview of ISO 27001 ISMS
PPT
ISO 27001 Benefits
PDF
HITRUST 101: All the basics you need to know
PDF
ISO 27001:2022 What has changed.pdf
PPTX
What's changing with ITIL® 4?
PDF
Building an effective Information Security Roadmap
PDF
Why ISO27001 For My Organisation
PPTX
The Zero Trust Model of Information Security
Introduction to Cybersecurity
Cyber Threat Intelligence
Threat Intelligence
Enterprise Cybersecurity: From Strategy to Operating Model
Information Security Governance and Strategy - 3
ISO/IEC 27001:2013 An Overview
MITRE ATT&CK Framework
Basic introduction to iso27001
Governance of security operation centers
NQA ISO 27001 Implementation Guide
CISSP - Chapter 1 - Security Concepts
Overview of ISO 27001 ISMS
ISO 27001 Benefits
HITRUST 101: All the basics you need to know
ISO 27001:2022 What has changed.pdf
What's changing with ITIL® 4?
Building an effective Information Security Roadmap
Why ISO27001 For My Organisation
The Zero Trust Model of Information Security
Ad

Similar to CISSP Preview - For the next generation of Security Leaders (20)

PPTX
How to Prepare for the CISSP Exam
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
PPT
Chapter 5
PPTX
CS5300 class presentation on managing information systems
PDF
CISSP Certification Training By Edvistaar
PDF
cissp-course content.pdf & cissp description
PDF
CISSP _Course _Description and course overview
PDF
1. Security and Risk Management
PPTX
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
PPT
Information Technology Security Basics
PDF
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
PDF
Security audit
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Untitled (1).pptx
PPTX
Untitled (1).pptx
PPTX
Starting your Career in Information Security
PPTX
CISSP-Certified.pptx
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
1 info sec+risk-mgmt
PPTX
Security management concepts and principles
How to Prepare for the CISSP Exam
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Chapter 5
CS5300 class presentation on managing information systems
CISSP Certification Training By Edvistaar
cissp-course content.pdf & cissp description
CISSP _Course _Description and course overview
1. Security and Risk Management
ch1.pptx Chapter 1 of CISSP ch1.pptx Chapter 1 of CISSPch1.pptx Chapter 1 of ...
Information Technology Security Basics
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Security audit
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Untitled (1).pptx
Untitled (1).pptx
Starting your Career in Information Security
CISSP-Certified.pptx
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
1 info sec+risk-mgmt
Security management concepts and principles
Ad

More from NUS-ISS (20)

PDF
Designing Impactful Services and User Experience - Lim Wee Khee
PDF
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
PDF
The Importance of Cybersecurity for Digital Transformation
PDF
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
PDF
Understanding GenAI/LLM and What is Google Offering - Felix Goh
PDF
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
PDF
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
PDF
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
PDF
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
PDF
Future of Learning - Yap Aye Wee.pdf
PDF
Future of Learning - Khoong Chan Meng
PPTX
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
PDF
Product Management in The Trenches for a Cloud Service
PDF
Overview of Data and Analytics Essentials and Foundations
PDF
Predictive Analytics
PDF
Feature Engineering for IoT
PDF
Master of Technology in Software Engineering
PDF
Master of Technology in Enterprise Business Analytics
PDF
Diagnosing Complex Problems Using System Archetypes
PPTX
Satisfying the ‘-ilities’ of an Enterprise Cloud Service
Designing Impactful Services and User Experience - Lim Wee Khee
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
The Importance of Cybersecurity for Digital Transformation
Architecting CX Measurement Frameworks and Ensuring CX Metrics are fit for Pu...
Understanding GenAI/LLM and What is Google Offering - Felix Goh
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Beyond the Hype: What Generative AI Means for the Future of Work - Damien Cum...
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Future of Learning - Yap Aye Wee.pdf
Future of Learning - Khoong Chan Meng
Site Reliability Engineer (SRE), We Keep The Lights On 24/7
Product Management in The Trenches for a Cloud Service
Overview of Data and Analytics Essentials and Foundations
Predictive Analytics
Feature Engineering for IoT
Master of Technology in Software Engineering
Master of Technology in Enterprise Business Analytics
Diagnosing Complex Problems Using System Archetypes
Satisfying the ‘-ilities’ of an Enterprise Cloud Service

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced Soft Computing BINUS July 2025.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
GamePlan Trading System Review: Professional Trader's Honest Take
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
Advanced Soft Computing BINUS July 2025.pdf

CISSP Preview - For the next generation of Security Leaders

  • 2. OVERVIEW OF 8 DOMAINS A look into the 8 domains in the CISSP CBK
  • 3. 3 CISSP 8 Domains 1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) 2. Asset Security (Protecting Security of Assets) 3. Security Engineering (Engineering and Management of Security) 4. Communications and Network Security (Designing and Protecting Network Security) 5. Identity and Access Management (Controlling Access and Managing Identity) 6. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) 7. Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) 8. Software Development Security (Understanding, Applying, and Enforcing Software Security) Effective April 15, 2015
  • 4. 4 CISSP Domain & Weights Domains Weight 1. Security and Risk Management 16% 2. Asset Security 10% 3. Security Engineering 12% 4. Communication and Network Security 12% 5. Identity and Access Management 13% 6. Security Assessment and Testing 11% 7. Security Operations 16% 8. Software Development Security 10% Total 100%
  • 5. 5 Security & Risk Management The Security and Risk Management provides you with the framework and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets and to assess the effectiveness of that protection. It includes issues of governance, organizational behavior, and security awareness.
  • 6. 6 Security & Risk Management • Understand and apply concepts of confidentiality, integrity and availability • Apply security governance principles • Compliance • Understand legal and regulatory issues that pertain to information security in a global context • Understand professional ethics • Develop and implement documented security policy, standards, procedures, and guidelines
  • 7. 7 Security & Risk Management • Understand business continuity requirements • Contribute to personnel security policies • Understand and apply risk management concepts • Understand and and apply threat modeling • Integrate security risk considerations into acquisition strategy and practice • Establish and manage information security education, training, and awareness
  • 8. 8 Asset Security The Asset Security domain provides you with the concepts, principles, structures, and standards used to monitor and secure assets and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • 9. 9 Asset Security • Classify information and supporting assets • Determine and maintain ownership • Protect privacy • Ensure appropriate retention • Determine data security controls • Establish handling requirements
  • 10. 10 Security Engineering The Security Engineering domain provides you with the concepts, principles, structures, and standards used to design, implement, monitor, and secure operating systems, equipment, networks, applications, and those controls used to enforce various levels of confidentiality, integrity, and availability.
  • 11. 11 Security Engineering • Implement and manage engineering processes using secure design principles • Understand the fundamental concepts of security models • Select controls and countermeasures based upon systems security evaluation models • Understand security capabilities of information systems • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • 12. 12 Security Engineering • Assess and mitigate the vulnerabilities in web-based systems • Assess and mitigate vulnerabilities in mobile systems • Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems • Apply cryptography • Apply secure principles to site and facility design • Design and implement physical security
  • 13. 13 Communications & Network Security The Communications and Network Security domain provides you with an understanding of network security related to structures, methods, formats, and measures for the transmission of information.
  • 14. 14 Communications & Network Security • Apply secure design principles to network architecture • Secure network components • Design and establish secure communication channels • Prevent or mitigate network attacks
  • 15. 15 Identity and Access Management The Identity and Access Management domain provides the basis for the understanding how access management works, why it is a key security discipline, and how each individual component to be discussed in this chapter relates to the overall access management universe. The most fundamental and significant concept to master is a precise definition of the term “access control”.
  • 16. 16 Identity and Access Management • Control physical and logical access to assets • Manage identification and authentication of people and devices • Integrate identity as a service • Integrate third-party identity services • Implement and manage authorization mechanisms • Prevent or mitigate access control attacks • Manage the identity and access provisioning lifecycle
  • 17. 17 Security Assessment and Testing The Security Assessment and Testing domain provides you with the knowledge to assist in managing the risks involved in developing, producing, operating, and sustaining systems and capabilities.
  • 18. 18 Security Assessment and Testing • Design and validate assessment and test strategies • Conduct security control testing • Collect security process data • Analyze and report test outputs • Understand the vulnerabilities of security architectures
  • 19. 19 Security Operations The Security Operations domain covers operations security and security operations. Operations security is primarily concerned with the protection and control of information processing assets in centralized and distributed environments. Security operations is primarily concerned with the daily tasks required to keep security services operating reliably and efficiently.
  • 20. 20 Security Operations • Understand and support investigations • Understand requirements for investigation types • Conduct logging and monitoring activities • Secure the provisioning of resources • Understand and apply foundational security operations concepts • Employ resource protection techniques • Conduct incident management • Operate and maintain preventative measures
  • 21. 21 Security Operations • Implement and support patch and vulnerability management • Participate in and understand change management processes • Implement recovery strategies • Implement disaster recovery processes • Test disaster recover plans • Participate in business continuity planning and exercises • Implement and manage physical security • Participate in addressing personnel safety concerns
  • 22. 22 Software Security Development The Software Security Development domain provides you with the abilities required to ensure that the focus of the enterprise security architecture includes application development, since many information security incidents involve software vulnerabilities in one form or another.
  • 23. 23 Software Development Security • Understand and apply security in the software development lifecycle • Enforce security controls in development environments • Assess the effectiveness of software security • Assess security impact of acquired software
  • 24. 24 CISSP Exam • 250 Questions – 225 questions are graded • Multiple choice questions – One answer is correct or is the “BEST” answer • 6 hours given to complete the exam • Passing grade is 700 out of 1000 points
  • 26. 26 (ISC)² Education Official (ISC)² Education Products Official (ISC)² Guide to the CISSP CBK Textbook Official (ISC)² CISSP Study Guide CISSP for Dummies CISSP Practice Tests Official Study App Exam Outline Official (ISC)² Training Interactive Flashcards For details: https://www.isc2.org/cissp-exam-prep/
  • 27. 27 CISSP Exam Preparation • Self-Study Tools – CISSP Exam Outline – Official (ISC)² Guide to the CISSP CBK, 4th Edition – Official (ISC)² CISSP Study Guide, 7th Edition – CISSP for Dummies, 5th Edition – Official (ISC)² CISSP Practice Tests – Official CISSP Study App – Official (ISC)² CISSP Flash Cards
  • 28. 28 CISSP Exam Preparation • Training Methods – Classroom-based – Private, On-site – Live OnLine – OnDemand
  • 29. 29 Download the Exam Outline • Provides a comprehensive overview of the domains and key areas of knowledge • Examination qualification requirements • Includes a suggested reference list • Download >> www.isc2.org/exam-outline
  • 30. 30 Official (ISC)² Guide to the CISSP CBK, Fourth Edition • Aligns with the 8 domains • Real work examples • Glossary with over 400 terms • End of domain review questions • Only textbook endorsed by (ISC)² • Available in hard cover, iTunes, and Kindle • Learn more >> www.isc2.org/official-isc2-textbooks
  • 31. 31 Official (ISC)² Training Seminar • Official (ISC)² courseware • Taught by an authorized (ISC)² instructor • Student handbook • Real-world learning activities and scenarios • Interactive and engaging learning techniques • Available online, in classroom, or private on-site • Learn more >> www.isc2.org/cissprevsem
  • 32. 32 Official Training Provider Find your nearest official training provider: www.isc2.org/educationaffiliates.aspx