Site icon TheCyberThrone

CISSP Chronicles Vault from PK

Advertisements

Author’s Note

Over the past 60 days, I’ve taken the time around 80 hours to publish, personal experience, mindset to have, domain-wise CISSP notes, aiming to support fellow aspirants and give back to the cybersecurity community. This effort comes not as a formality, but as a personal mission rooted in passion and dedication.

For me, CISSP is not just another certification—it’s a milestone that reflects consistent hard work, deep understanding, and commitment to the profession. Conquering CISSP is indeed a proud goal, but let’s be honest—it can also be overwhelming and mentally taxing.

Throughout my own journey, I encountered many who shared the same goal but were confused about where to start, what to study, how to plan, and when to feel prepared. The CISSP path can be unclear, especially with the abundance of materials and approaches available.

I am not claiming that my notes would be a perfect fit for everyone—because truthfully, no “one-size-fits-all” approach exists in CISSP preparation. There are many seasoned professionals and pioneers in the field who have spent years perfecting their way of delivering CISSP content.

However, the notes I’ve created are based on my personal approach, drawn from real study experiences, late-night struggles, revision strategies, and moments of clarity. I’ve tried to keep them practical, simplified, and rooted in exam-relevant understanding.

I hope is that these notes help someone take that first step, fill a gap, or gain confidence when the road feels too steep. Whether you’re just starting or reinforcing what you already know—you’re not alone in this journey.

Wishing every aspirant the clarity, focus, and resilience needed to reach their CISSP goal.

This effort is dedicated to the cybersecurity community, and I believe in learning together. If you have any suggestions or constructive feedback, please share—I’m always looking to improve and refine the work I publish.

Regards – PraveenKumar Karthikeyan, Since 1987

Beginning of the Core

To begin with, I would like to share my CISSP journey — from the preparation phase all the way through to the exam experience.

Next, I would like to shed light on the kind of mindset that every CISSP aspirant should cultivate throughout theirjourney

Now, I would like to provide in-depth insights into the CISSP certification itself. While I have already touched on some aspects in the mindset section, I will briefly cover the essential ‘need-to-know’ elements for a clearer understanding

What is CISSP?

CISSP (Certified Information Systems Security Professional) is a globally recognized certification offered by (ISC)² for information security professionals. It validates deep technical and managerial knowledge in designing, engineering, and managing an organization’s overall security posture.

CISSP Goals

Who Should Take CISSP?

CISSP Certification Requirements

CISSP Exam Overview

The 8 Domains of CISSP (2024)

  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

🧾 (ISC)² Code of Ethics

  1. Protect society, the common good, necessary public trust and confidence, and the infrastructure.
  2. Act honorably, honestly, justly, responsibly, and legally.
  3. Provide diligent and competent service to principals.
  4. Advance and protect the profession.

CISSP Domain-Wise Overview  and Quick Introductions

Over the next sections, you’ll find a quick yet meaningful overview of all 8 CISSP domains. At the end of each introduction, you’ll find a direct link to the detailed notes I’ve prepared based on my own learning journey. These are not generic summaries—they’re crafted from hours of structured study and reflection.

🛡️ Domain 1: Security and Risk Management

This foundational domain focuses on principles like confidentiality, integrity, and availability (CIA). You’ll learn about governance, compliance, policies, security roles, and risk management. Topics such as legal systems, business continuity, ethics, and security frameworks (like ISO, NIST, etc.) are central. It sets the stage for security decision-making across the entire organization.

🔗 Read Domain 1 Notes: View Domain 1 Notes »

📦 Domain 2: Asset Security

This domain centers on classifying and protecting assets—especially data—throughout its lifecycle. You’ll explore ownership, data labeling, privacy, retention, and secure disposal techniques. Key concepts include regulatory data requirements and protecting data at rest, in transit, and in use. Physical and logical protections are addressed to prevent leakage or misuse.

🔗 Read Domain 2 Notes: View Domain 2 Notes »

🏛️ Domain 3: Security Architecture and Engineering

Dive into the principles of designing secure systems, hardware, and architecture. This domain covers security models (Bell-LaPadula, Biba, etc.), cryptography, trusted computing, and secure design patterns. It explores vulnerabilities in processors, firmware, and embedded systems. You’ll also learn about system evaluation standards and security capabilities of operating systems.


🔗 Read Domain 3 Notes Part I: View Domain 3 Notes »

🔗 Read Domain 3 Notes Part II: View Domain 3 Notes »

🌐 Domain 4: Communication and Network Security

This domain is all about securing data in motion across networks. It covers protocols, secure network design, segmentation, wireless security, and layered defenses. You’ll study technologies like VPNs, firewalls, IDS/IPS, and common network attacks. Emphasis is placed on secure protocol use (TLS, IPsec, SSH) and architecture-level resilience.

🔗 Read Domain 4 Notes: View Domain 4 Notes »

🔐 Domain 5: Identity and Access Management (IAM)

IAM is the core of who can access what and how. You’ll learn about authentication methods (passwords, biometrics, multifactor), authorization models (RBAC, ABAC, DAC), and identity provisioning. It explores identity federation, SSO, directory services, and access reviews. Strong IAM controls are key to enforcing least privilege and accountability.

🔗 Read Domain 5 Notes: View Domain 5 Notes »

🧪 Domain 6: Security Assessment and Testing

Learn how to validate security controls using audits, vulnerability assessments, and penetration tests. This domain includes testing strategies, log review, metrics collection, and remediation. It emphasizes creating baselines, managing test results, and ensuring continuous improvement through control testing.

🔗 Read Domain 6 Notes: View Domain 6 Notes »

⚙️ Domain 7: Security Operations

This domain covers day-to-day security management: monitoring, incident response, forensics, and operational resilience. You’ll study disaster recovery, business continuity, change control, and physical security. Logging, SIEM tools, and escalation procedures are also covered. It’s about ensuring systems remain secure, available, and monitored in real time.

🔗 Read Domain 7 Notes Part I: View Domain 7 Notes »

🔗 Read Domain 7 Notes Part II: View Domain 7 Notes »

💻 Domain 8: Software Development Security

Focuses on integrating security throughout the software development lifecycle (SDLC). You’ll study secure coding practices, application vulnerabilities, DevOps integration, and threat modeling. Topics include CI/CD, APIs, version control, and secure architecture for applications. A must-know domain for addressing software risks early.

🔗 Read Domain 8 Notes: View Domain 8 Notes »

150 CISSP Exam Essentials

Here’s a carefully curated list of 🔑 150 important CISSP exam essentials, compiled domain-wise and optimized for exam-day revision, last-minute brushing, or checkpoint tracking. These points focus on concepts, processes, and terminology that often appear in questions, scenarios, and tricky distractors.

🛡️ Domain 1: Security and Risk Management (25 points)

  1. CIA Triad: Confidentiality, Integrity, Availability
  2. Governance drives security alignment with business goals
  3. Security Policies are mandatory, high-level directives
  4. Risk = Threat × Vulnerability × Asset Value
  5. Risk Responses: Avoid, Transfer, Mitigate, Accept
  6. Qualitative vs Quantitative Risk Analysis
  7. Risk Appetite vs Risk Tolerance
  8. Due Care = Action taken; Due Diligence = Investigation performed
  9. Threat Modeling: STRIDE (Spoofing, Tampering, Repudiation, Info Disclosure, DoS, Elevation)
  10. Security Control Types: Preventive, Detective, Corrective, Deterrent, Compensating
  11. Administrative, Technical, and Physical control categories
  12. Business Continuity Planning (BCP) vs Disaster Recovery Planning (DRP)
  13. RTO (max downtime) vs RPO (max data loss)
  14. BIA identifies critical business functions and recovery priorities
  15. Legal Systems: Civil, Common, Religious, Customary
  16. GDPR: Lawfulness, Fairness, Transparency, Data Minimization
  17. Data Breach Notification Laws vary by country
  18. Security Roles: Owner (defines), Custodian (protects), User (uses)
  19. (ISC)² Code of Ethics – 4 Canons
  20. Intellectual Property: Copyright, Trademark, Patent, Trade Secret
  21. Compliance = Adhering to legal, regulatory, and contractual obligations
  22. Security Awareness is a critical preventive control
  23. Threat Sources: Natural, Human, Environmental
  24. Risk Register tracks and monitors risks over time
  25. Asset Value influences control selection

📦 Domain 2: Asset Security (15 points)

  1. Data Lifecycle: Create → Store → Use → Share → Archive → Destroy
  2. Data Classification determines required protection
  3. Owner assigns classification; Custodian implements controls
  4. Labeling ensures data is handled correctly
  5. Asset Handling depends on sensitivity and regulatory needs
  6. PII (Personal Identifiable Info) must be protected by law
  7. Data Masking hides sensitive data in test/dev environments
  8. Data Remanence – residual data left after deletion
  9. Data Sanitization Methods: Clearing, Purging, Degaussing, Destruction
  10. Data Retention depends on legal and business requirements
  11. Physical Protection is needed for servers, drives, paper files
  12. Encryption protects data at rest and in transit
  13. Data Aggregation and Inference can reveal sensitive info
  14. Media Reuse must include sanitization
  15. Privacy Controls must be enforced at collection and use

🏛️ Domain 3: Security Architecture and Engineering (20 points)

  1. Security Models: Bell-LaPadula (Confidentiality), Biba (Integrity), Clark-Wilson (Well-formed transactions)
  2. Secure Design Principles: Least Privilege, Fail-Safe Defaults, Economy of Mechanism
  3. Reference Monitor ensures mediation of all access
  4. Trusted Computing Base (TCB) = critical components of a secure system
  5. Common Criteria (ISO 15408): EAL1–EAL7 assurance levels
  6. Side-Channel Attacks exploit timing, power, or emissions
  7. Cryptographic Goals: Confidentiality, Integrity, Authentication, Non-repudiation
  8. Symmetric Encryption: Fast, same key for encrypt/decrypt (AES, DES)
  9. Asymmetric Encryption: Uses key pairs (RSA, ECC)
  10. Hashing (SHA-2, SHA-3) provides integrity only
  11. Digital Signatures = Integrity + Authentication + Non-repudiation
  12. Key Management is the hardest part of cryptography
  13. PKI = CA + RA + Certificates + CRLs + OCSP
  14. Secure Boot ensures system integrity during startup
  15. Hardware Security: TPM, HSM, Secure Enclaves
  16. Security Boundaries separate levels of sensitivity
  17. Embedded Systems must be designed with security from the start
  18. IoT Security must consider limited device resources
  19. Fail-Secure vs Fail-Open depending on context (availability vs safety)
  20. Protocols like SSL, TLS must use strong cipher suites

🌐 Domain 4: Communication and Network Security (20 points)

  1. OSI Model: Layers 1–7 (Physical to Application)
  2. TCP/IP Model: 4 Layers (Network Access, Internet, Transport, Application)
  3. Common Ports: 80 (HTTP), 443 (HTTPS), 22 (SSH), 25 (SMTP), 3389 (RDP)
  4. IPsec Protocols: AH (integrity/auth), ESP (confidentiality)
  5. TLS provides secure application-level communication
  6. VPN Types: Remote Access, Site-to-Site
  7. Network Segmentation reduces attack surface
  8. DMZ hosts public-facing services
  9. IDS = Detects, IPS = Blocks
  10. Wireless Security: WPA3, EAP, PSK
  11. VLANs segment traffic logically within a switch
  12. NAT hides internal IP addresses
  13. SNMPv3 is secure; v1 and v2 are not
  14. DNSSEC provides authentication of DNS responses
  15. Port Security limits MAC addresses per switch port
  16. Encapsulation used to wrap data across network layers
  17. Protocol Analyzers (Wireshark) used for traffic analysis
  18. ARP Poisoning = redirecting traffic by falsifying MAC mappings
  19. MAC Filtering is weak but adds minimal control
  20. Network Topologies: Mesh, Star, Bus, Ring

🔐 Domain 5: Identity and Access Management (IAM) (20 points)

  1. AAA: Authentication, Authorization, Accounting
  2. Authentication Factors: Knowledge, Possession, Inherence, Location, Behavior
  3. MFA = at least two different factor types
  4. SSO improves user experience, introduces risk
  5. Federation enables identity across org boundaries (SAML, OAuth)
  6. RBAC: Role-Based Access Control
  7. DAC: User-controlled access (Windows NTFS)
  8. MAC: Centralized control by policy (Military)
  9. ABAC: Dynamic and context-based control
  10. Access Provisioning = Identity Creation → Access Granting
  11. Account Lifecycle = Joiner → Mover → Leaver
  12. Session Timeout, Account Lockout protect against misuse
  13. Identity Proofing verifies individual before account creation
  14. Directory Services = LDAP, Active Directory
  15. Kerberos uses tickets to manage authentication
  16. Identity Federation = Trust relationships between domains
  17. Just-in-Time Access reduces attack surface
  18. Privileged Access Management tools control high-level access
  19. Entitlement Review = Periodic access recertification
  20. Identity Governance automates compliance and audits

🧪 Domain 6: Security Assessment and Testing (15 points)

  1. Vulnerability Scanning is passive; Pen Testing is active
  2. Penetration Test Phases: Planning, Discovery, Attack, Reporting
  3. Black-box = no access; White-box = full access
  4. Static Testing = source code analysis; Dynamic = running application
  5. Security Audits evaluate compliance
  6. SIEM = Security Information and Event Management
  7. Synthetic Transactions simulate real traffic
  8. Code Review can be manual or automated
  9. Logging is required for accountability
  10. Test Environment must mirror production
  11. Regression Testing checks that changes don’t break functions
  12. Fuzz Testing sends unexpected input to find flaws
  13. Metrics: Quantify effectiveness (KPIs, KRIs)
  14. Continuous Monitoring = Real-time security telemetry
  15. Remediation must follow vulnerability findings

⚙️ Domain 7: Security Operations (20 points)

  1. Incident Response: Preparation, Detection, Response, Recovery, Lessons Learned
  2. Forensics = Preservation + Collection + Analysis + Reporting
  3. Chain of Custody preserves integrity of evidence
  4. DR Sites: Hot (ready), Warm (partial), Cold (basic)
  5. Backup Types: Full, Incremental, Differential
  6. Change Management = Approvals, Rollbacks, Version Control
  7. Monitoring = Detection; Logging = Record
  8. BCP: Ensures minimal business disruption
  9. DRP: Ensures quick recovery of IT systems
  10. Mean Time to Detect/Recover (MTTD/MTTR)
  11. Least Privilege in operations = reduce insider threats
  12. Job Rotation + Mandatory Vacations detect fraud
  13. SLA = Agreed service performance & availability
  14. Secure Disposal = Wipe, Degauss, Shred
  15. Physical Controls: Mantraps, CCTV, Locks, Guards
  16. HVAC controls temperature, humidity, dust
  17. Fire Suppression: Gas (FM-200), Water, Dry Chemicals
  18. Escalation Matrix defines contact chain
  19. SIEM correlation = detect advanced threats
  20. Outage Communication Plan is critical to BCP

💻 Domain 8: Software Development Security (15 points)

  1. SDLC Phases: Requirements → Design → Development → Testing → Deployment → Maintenance
  2. DevSecOps: Integrate security early in CI/CD pipeline
  3. Secure Coding = Input validation, error handling, least privilege
  4. OWASP Top 10: Most common web app vulnerabilities
  5. APIs must enforce authentication and rate limiting
  6. Threat Modeling in development phase (STRIDE, DFDs)
  7. Static & Dynamic Code Analysis for vulnerability detection
  8. Software Testing: Unit, Integration, Regression, Fuzz
  9. Version Control = Git, SVN
  10. Configuration Management = Consistent system state
  11. Code Signing ensures authenticity of software
  12. Input Sanitization prevents injection attacks
  13. Secure SDLC ensures quality + security
  14. Supply Chain Risk = tampered components/libraries
  15. Application Sandboxing limits impact of compromise

Final Words

Preparing for the CISSP is a journey that demands consistency, clarity, and commitment. Through these notes, I’ve aimed to simplify complex topics, highlight core concepts, and provide a structured guide for aspirants at every stage.

Remember, there’s no one perfect way to prepare—adapt what works best for you, stay focused, and keep moving forward. Whether you’re just starting or reviewing for the final time, I hope these notes serve as a valuable companion in your CISSP journey.

Wishing you success and confidence on exam day!
Let’s continue learning, sharing, and growing together in the cybersecurity community.

Exit mobile version