
CISSP Domain8 Section 5
8.5 Define and apply secure coding guidelines and standards8.5.1 Security weaknesses and vulnerabilities at the source-code level8.5.2 Security of application programming interfaces (API)8.5.3 Secure ...
16 Okt 202412min

CISSP Domain8 Section 3 and 4
8.3 Assess the effectiveness of software security8.3.1 Auditing and logging of changes8.3.2 Risk analysis and mitigation8.4 Assess security impact of acquired software8.4.1 Commercial-off-the-shelf (C...
16 Okt 202413min

CISSP Domain8 Section2
8.2 Identify & apply security controls in development environments8.2.1 Programming languages8.2.2 Libraries8.2.3 Tool sets8.2.4 Integrated Development Environment (IDE)8.2.5 Runtime8.2.6 Continuous I...
16 Okt 202411min

CISSP Domain7 Section 13, 14 and 15
7.13 Participate in Business Continuity (BC) planning and exercises7.14 Implement and manage physical security7.15 Address personnel safety and security concerns7.15.1 Travel7.15.2 Security Training &...
16 Okt 20243min

CISSP Domain7 Section 12
7.12 Test Disaster Recovery Plans7.12.1 Read-through/Checklist7.12.2 Walk-through/Tabletop7.12.3 Simulation7.12.4 Parallel7.12.5 Full Interruption7.12.6 Communications (e.g., stakeholders, test status...
16 Okt 202410min

CISSP Domain7 Section 11
7.11 Implement Disaster Recovery Process7.11.1 Response7.11.2 Personnel7.11.3 Communications7.11.4 Assessment7.11.5 Restoration7.11.6 Training & Awareness7.11.7 Lessons Learned
16 Okt 202413min

CISSP Domain7 Section 8, 9 and 10
7.8 Implement and support patch and vulnerability management7.9 Understand and participate in change management processes7.10 Implement recovery strategies7.10.1 Backup storage strategies7.10.2 Recove...
16 Okt 202411min





















