Recent Posts


CISSP Domains and Topics

Asset And Physical Security
Asset and Physical Security (5)
(Availability) Asset security is about protecting your organization's stuff: web servers, data centers, doors, backup tapes, fire extinguishers...and the most important asset of all, people. You will learn how to protect life. Fight fires. Mitigate power spikes. Practice crime prevention. Or decide if your organization requires bullet-proof windows.
Communications & Network Security
Communications & Network Security (15)
You need to make just one mistake for a hacker to get into your organization. The trick is to create such a controlled and secure network, that a hacker will need to make just one mistake in order to be discovered.
Cryptography (6)
(Confidentiality, Integrity) Cryptography creates math problems that can take longer to solver than the age of our universe. It encrypts your files, secures e-commerce, gives anonymity to anyone on the Internet, and has even changed the course of World War II. That is the power of cryptography.
Identity And Access Management
Identity and Access Management (4)
(Confidentiality, Integrity, Availability) Nobody but you should be logging into a system that nobody but you should be logging into.
Security And Risk Management
Security and Risk Management (17)
(Confidentiality, Integrity, Availability) Risk management is the core of information security. It is a process of continually identifying, evaluating, monitoring, and mitigating risks that can affect the continuation of a business.
Security Assessment And Testing
Security Assessment and Testing (3)
(Confidentiality, Integrity, Availability) The only way to know if all those fancy and expensive security controls work is to test them.
Security Engineering
Security Engineering (1)
(Confidentiality, Integrity, Availability) "I was originally supposed to become an engineer but the thought of having to expend my creative energy on things that make practical everyday life even more refined, with a loathsome capital gain as the goal, was unbearable to me" -Albert Einstein
Security Operations
Security Operations (2)
(Confidentiality, Integrity, Availability) Due diligence and due care are the essence of security operations. The only way to maintain a consistent state of security is to constantly change with the environment.
Software Development Security
Software Development Security (3)
(Confidentiality, Integrity, Availability) Treat software development like the President. Surround the code with a sea of dynamic security. Do it from even before the inauguration of the software into an organization. Start securing the code from it's very first convention.
The Endorsement Process
The Endorsement Process (5)
You passed the CISSP! Do you even know what to do with yourself now? While you figure out your next journey, begin your endorsement process to become officially certified CISSP!