CISSP Domain7 Section 5
CISSP Central16 Loka 2024

CISSP Domain7 Section 5

7.5 Apply resource protection techniques

  • 7.5.1 Media Management
  • 7.5.2 Hardware and software asset management
  • 7.5.3 Data at rest/Data in transit

Jaksot(50)

CISSP Domain4 Section 2

CISSP Domain4 Section 2

4.2 Secure Network Components4.2.1 Operation of infrastructure4.2.2 Transmission Media4.2.3 Network Access Control (NAC) devices4.2.4 Endpoint Security (e.g. host-based)

16 Loka 202410min

CISSP Domain4 Intro and Section 1

CISSP Domain4 Intro and Section 1

4.0 DOMAIN 4: COMMUNICATION AND NETWORK SECURITY4.1 Apply secure design principles in network architectures4.1.1 Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (...

16 Loka 202431min

CISSP Domain3 Section 10

CISSP Domain3 Section 10

3.10 Manage the information system lifecycle3.10.1 Stakeholder needs & requirements3.10.2 Requirements Analysis3.10.3 Architectural design3.10.4 Development / Implementation3.10.5 Integration3.10.6 Ve...

16 Loka 202412min

CISSP Domain3 Section 9

CISSP Domain3 Section 9

3.9 Design Site and Facility security controls3.9.1 Wiring closets/intermediate distribution frame3.9.2 Server rooms/data centers3.9.3 Media storage facilities3.9.4 Evidence storage3.9.5 Restricted an...

16 Loka 202416min

CISSP Domain3 Section 8

CISSP Domain3 Section 8

3.8 Apply security principles to site and facility design3.8.1 Facility Design3.8.2 Implement Site and Facility Security Controls3.8.3 Physical Security Threats3.8.4 Layered Defense Model

16 Loka 202412min

CISSP Domain3 Section 7

CISSP Domain3 Section 7

3.7 Understand methods of cryptanalytic attacks3.7.1 Brute-force3.7.2 Ciphertext only3.7.3 Known Plaintext3.7.4 Frequency Analysis3.7.5 Chosen Ciphertext3.7.6 Implementation Attacks3.7.7 Side-channel ...

16 Loka 202417min

CISSP Domain3 Section 6

CISSP Domain3 Section 6

3.6 Select and determine cryptographic solutions3.6.1 Cryptographic life cycle3.6.2 Cryptographic methods3.6.3 Public key infrastructure3.6.4 Key Management practices3.6.5 Digital Signatures and Digit...

16 Loka 202416min

CISSP Domain3 Section 5

CISSP Domain3 Section 5

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements3.5.1 Client-based systems3.5.2 Server-based systems3.5.3 Database systems3.5.4 Cryptographic Syste...

16 Loka 202422min