CISSP Domain7 Intro and Section 1
CISSP Central16 Loka 2024

CISSP Domain7 Intro and Section 1

7.0 DOMAIN 7: SECURITY OPERATIONS

  • 7.1 Understand and support investigations
  • 7.1.1 Evidence Collection and Handling
  • 7.1.2 Reporting and Documentation
  • 7.1.3 Investigation Techniques
  • 7.1.4 Digital forensics tools, tactics, and procedures
  • 7.1.5 Artifacts (e.g., data, computers, networks, mobile devices)

Jaksot(50)

CISSP Domain6 Section 2

CISSP Domain6 Section 2

6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...

16 Loka 202411min

CISSP Domain6 Intro and Section 1

CISSP Domain6 Intro and Section 1

6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)

16 Loka 202411min

CISSP Domain5 Intro and Section 5

CISSP Domain5 Intro and Section 5

5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...

16 Loka 202414min

CISSP Domain5 Intro and Section 4

CISSP Domain5 Intro and Section 4

5.4 Implement and manage authorization mechanisms

16 Loka 202410min

CISSP Domain5 Intro and Section 3

CISSP Domain5 Intro and Section 3

5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid

16 Loka 202412min

CISSP Domain5 Section 2

CISSP Domain5 Section 2

5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...

16 Loka 202418min

CISSP Domain5 Intro and Section 1

CISSP Domain5 Intro and Section 1

5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services

16 Loka 202416min

CISSP Domain4 Section 3

CISSP Domain4 Section 3

4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...

16 Loka 202411min