CISSP Domain7 Section 8, 9 and 10
CISSP Central16 Loka 2024

CISSP Domain7 Section 8, 9 and 10

7.8 Implement and support patch and vulnerability management

7.9 Understand and participate in change management processes

7.10 Implement recovery strategies

  • 7.10.1 Backup storage strategies
  • 7.10.2 Recovery site strategies
  • 7.10.3 Multiple processing sites
  • 7.10.4 System resilience, high availability (HA), Quality of Service (QoS), and fault tolerance (FT)

Jaksot(50)

CISSP Domain6 Section 2

CISSP Domain6 Section 2

6.2 Conduct Security Control Testing6.2.1 Vulnerability Assessment6.2.2 Penetration Testing6.2.3 Log Reviews6.2.4 Synthetic Transaction6.2.5 Code review and testing6.2.6 Misuse case testing6.2.7 Cover...

16 Loka 202411min

CISSP Domain6 Intro and Section 1

CISSP Domain6 Intro and Section 1

6.0 DOMAIN 6: SECURITY ASSESSMENT AND TESTING6.1 Design and Validate assessment, test, and audit strategies6.1.1 Internal6.1.2 External6.1.3 Third-party6.1.4 Location (e.g. on-premises, cloud, hybrid)

16 Loka 202411min

CISSP Domain5 Intro and Section 5

CISSP Domain5 Intro and Section 5

5.5 Manage the identity and access provisioning lifecycle5.5.1 Account access review (e.g., user, system, service)5.5.2 Provisioning and deprovisioning (e.g., on/off boarding & transfers)5.5.3 Role de...

16 Loka 202414min

CISSP Domain5 Intro and Section 4

CISSP Domain5 Intro and Section 4

5.4 Implement and manage authorization mechanisms

16 Loka 202410min

CISSP Domain5 Intro and Section 3

CISSP Domain5 Intro and Section 3

5.3 Federated identity with a third-party service5.3.1 On-Premises5.3.2 Cloud5.3.3 Hybrid

16 Loka 202412min

CISSP Domain5 Section 2

CISSP Domain5 Section 2

5.2 Design identification and authentication Strategy (e.g., people, devices, and services)5.2.1 Groups and Roles5.2.2 Authentication, Authorization and Accounting (AAA) (e.g., MFA, password-less auth...

16 Loka 202418min

CISSP Domain5 Intro and Section 1

CISSP Domain5 Intro and Section 1

5.0 DOMAIN 5: IDENTITY & ACCESS MANAGEMENT (IAM)5.1 Control physical and logical access to assets5.1.1 Information5.1.2 Systems5.1.3 Devices5.1.4 Facilities5.1.5 Applications5.1.6 Services

16 Loka 202416min

CISSP Domain4 Section 3

CISSP Domain4 Section 3

4.3 Implement secure communication channels according to design4.3.1 Voice, video, and collaboration (e.g., conferencing, Zoom rooms)4.3.2 Remote access (e.g., network administrative functions)4.3.3 D...

16 Loka 202411min