0% found this document useful (0 votes)
227 views

CISSP Sari Greene

This document outlines the modules and lessons covered in a cybersecurity certification program. It includes 9 modules that cover topics such as security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, software development security, and attaining and maintaining the certification. Some of the specific lessons mentioned include professional ethics, security concepts, governance principles, risk management, threat modeling, cryptography, access control, authentication, auditing, incident response, and disaster recovery.

Uploaded by

Jack Ryan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
227 views

CISSP Sari Greene

This document outlines the modules and lessons covered in a cybersecurity certification program. It includes 9 modules that cover topics such as security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, software development security, and attaining and maintaining the certification. Some of the specific lessons mentioned include professional ethics, security concepts, governance principles, risk management, threat modeling, cryptography, access control, authentication, auditing, incident response, and disaster recovery.

Uploaded by

Jack Ryan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 1: Security and Risk Management Domain

Lesson 1: Understand, Adhere to, and Promote Professional Ethics


Lesson 2: Understand and Apply Security Concepts
Lesson 3: Evaluate and Apply Security Governance Principles
Lesson 4: Determine Compliance and Other Requirements
Lesson 5: Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
Lesson 6: Understand Requirements for Investigation Types
Lesson 7: Develop, Document, and Implement Security Policy, Standards, Procedures, and
Lesson 8: Identify, Analyze, and Prioritize Business Continuity Requirements
Lesson 9: Contribute to and Enforce Personnel Security Policies and Procedures
Lesson 10: Understand and Apply Risk Management Concepts
Lesson 11: Understand and Apply Threat Modeling Concepts and Methodologies
Lesson 12: Apply Supply Chain Risk Management Concepts
Lesson 13: Establish and Maintain a Security Awareness, Education, and Training Program

Module 2: Asset Security


Lesson 14: Identify and Classify Information and Assets
Lesson 15: Establish Information and Asset Handling Requirements
Lesson 16: Provision Resources Securely
Lesson 17: Manage Data Lifecycle
Lesson 18: Ensure Appropriate Asset Retention
Lesson 19: Determine Data Security Controls and Compliance Requirements

Module 3: Security Architecture and Engineering


Lesson 20: Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Lesson 21: Understand the Fundamental Concepts of Security Models
Lesson 22: Select Controls Based Upon System Security Requirements
Lesson 23: Understand Security Capabilities of Information Systems
Lesson 24: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Lesson 25: Select and Determine Cryptographic Solutions
Lesson 26: Understand Methods of Cryptanalytic Attacks
Lesson 27: Apply Security Principles to Site and Facility Design
Lesson 28: Design Site and Facility Security Controls

Module 4: Communication and Network Security


Lesson 29: Assess and Implement Secure Design Principles in Network Architecture
Lesson 30: Secure Network Components
Lesson 31: Implement Secure Communication Channels According to Design

Module 5: Identity and Access Management (IAM)


Lesson 32: Control Physical and Logical Access to Assets
Lesson 33: Manage Identification and Authentication of People, Devices, and Services
Lesson 34: Federated Identity with a Third-party Service
Lesson 35: Implement and Manage Authorization Mechanisms
Lesson 36: Manage the Identity and Access Provisioning Lifecycle
Lesson 37: Implement Authentication Systems
Module 6: Security Assessment and Testing
Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Lesson 39: Conduct Security Controls Testing
Lesson 40: Collect Security Process Data
Lesson 41: Analyze Test Output and Generate Report
Lesson 42: Conduct or Facilitate Security Audits

Module 7: Security Operations


Lesson 43: Understand and Comply with Investigations
Lesson 44: Conduct Logging and Monitoring Activities
Lesson 45: Perform Configuration Management
Lesson 46: Apply Foundational Security Operations Concepts
Lesson 47: Apply Resource Protection
Lesson 48: Conduct Incident Management
Lesson 49: Operate and Maintain Detective and Preventative Measures
Lesson 50: Implement and Support Patch and Vulnerability Management
Lesson 51: Understand and Participate in Change Management Process
Lesson 52: Implement Recovery Strategies
Lesson 53: Implement Disaster Recovery Processes
Lesson 54: Test Disaster Recovery Plans
Lesson 55: Participate in Business Continuity (BC) Planning and Exercises
Lesson 56: Implement and Manage Physical Security
Lesson 57: Address Personnel Safety and Security Concerns

Module 8: Software Development Security


Lesson 58: Understand and Integrate Security in the Software Development Lifecycle
Lesson 59: Identify and Apply Security Controls in Software Development Ecosystems
Lesson 60: Assess the Effectiveness of Software Security
Lesson 61: Assess the Security Impact of Acquired Software
Lesson 62: Define and Apply Secure Coding Guidelines and Standards
Module 9: Attaining and Maintaining Your CISSP
Lesson 63: Preparing for Your Examination
Lesson 64: The Certification Process

You might also like