
CISSP Domain8 Section 5
8.5 Define and apply secure coding guidelines and standards8.5.1 Security weaknesses and vulnerabilities at the source-code level8.5.2 Security of application programming interfaces (API)8.5.3 Secure ...
16 Loka 202412min

CISSP Domain8 Section 3 and 4
8.3 Assess the effectiveness of software security8.3.1 Auditing and logging of changes8.3.2 Risk analysis and mitigation8.4 Assess security impact of acquired software8.4.1 Commercial-off-the-shelf (C...
16 Loka 202413min

CISSP Domain8 Section2
8.2 Identify & apply security controls in development environments8.2.1 Programming languages8.2.2 Libraries8.2.3 Tool sets8.2.4 Integrated Development Environment (IDE)8.2.5 Runtime8.2.6 Continuous I...
16 Loka 202411min

CISSP Domain8 Intro and Section 1
8.1 Understand and integrate security in the software development lifecycle8.1.1 Development Methodologies8.1.2 Maturity Models (e.g., Capability Maturity Model (CMM), Software Assurance Maturity Mode...
16 Loka 202413min

CISSP Domain7 Section 13, 14 and 15
7.13 Participate in Business Continuity (BC) planning and exercises7.14 Implement and manage physical security7.15 Address personnel safety and security concerns7.15.1 Travel7.15.2 Security Training &...
16 Loka 20243min

CISSP Domain7 Section 12
7.12 Test Disaster Recovery Plans7.12.1 Read-through/Checklist7.12.2 Walk-through/Tabletop7.12.3 Simulation7.12.4 Parallel7.12.5 Full Interruption7.12.6 Communications (e.g., stakeholders, test status...
16 Loka 202410min

CISSP Domain7 Section 11
7.11 Implement Disaster Recovery Process7.11.1 Response7.11.2 Personnel7.11.3 Communications7.11.4 Assessment7.11.5 Restoration7.11.6 Training & Awareness7.11.7 Lessons Learned
16 Loka 202413min

