CISSP Starter Page

0903N-CISSP-社團封面

Before You Get Started!

The Strategic Role of CISSP

InfoSec Expertise Blueprint V1.2

Start Your CISSP Journey

CISSP is one of the most challenging exams ever because of its comprehensive perspectives and requirements of solid conceptual level understanding and in-depth insights to managerial and technical issues.

However, it’s reasonable for experienced professionals to pass the CISSP exam with 150 to 250 study hours. I usually suggest my friends study for 2 hours on weekdays and 4 hours on holidays and sit for the CISSP exam in 3 months, while it’s not uncommon for CISSP aspirants to crack the exam in 6 months. The keys to success are the effectiveness of your study plan, persistence, discipline, and communication with and support of your family and boss.

The CISSP exam, from my point of view, can be divided into two parts: management (Domain 1,2,5,6, and 7) and technology (Domain 3,4, and 8). It’s a body of knowledge, not a collection of discrete knowledge points.

cissp_domains-1.jpg

It’s comprehensive, and you have to think from a variety of perspectives, such as board director, senior management, CISO, auditor, legal counsel, purchasing and HR staff, engineer, developer, project and program manager, end user, attacker, and so forth. Experience or certifications of PMP, ITIL/ITSM, or CCNA help quite a bit.

cissp-perspectives-2.jpg

To start your CISSP journey, please download The CISSP Exam Outline first. Read and explain it to your friends until you can do that well and feel confident. The CISSP Official Study Guide Sybex 8th is a tutorial to help you understand the CISSP exam outline. The Official ISC2 Guide to the CISSP CBK Reference 5th explains the CISSP exam outline in details. It’s crucial to browse the CBK suggested references and read the NIST Special Publications enlisted.

onionandpeacock-e1563945740410.jpg

Do all the online practice questions companioned with the Sybex 8th to validate your essential knowledge. After that, do more practice questions, especially those with situations or scenarios that test your ability to apply the knowledge and principles. 2500 questions in total are the minimum.

Join Luke’s Facebook group, CISSP Exam Preparation – Study Notes and Theory. It helps a lot.
Kindly be reminded it’s a general approach for your reference; please adjust the practices based on your own condition. The author is not responsible for the result of your exam.


Exam Preparation Tips

Effective CISSP Preparation V2

Wuson’s CISSP Exam Prep Strategy

Resources

CISSP Exam Prep Materials

– Study Resources

  1. SNT Study Resources
  2. Thor Teaches Study resources

– Books and Videos

  1. ISC2 Official Materials
  2. CISSP All-in-One Exam Guide, Eighth Edition 8th Edition
  3. Kelly Handerhan@Cybrary
  4. CISSP Shon Harris

– My Favorite CISSP Communities

  1. CISSP Exam Preparation – Study Notes and Theory
  2. CISSP, CISM and Security+ certification training by Thor Teaches!

– Get Refreshed

  1. Benefits of being a CISSP
  2. Host Unknown presents: I’m a C I Double S P (CISSP Parody)
  3. Host Unknown presents: Accepted the Risk
  4. The Expert (Short Comedy Sketch)

My Posts

  1. Manage to Succeed in Your CISSP Exam
  2. CISSP Study Strategy
  3. Information Security (definition revised)
  4. InfoSec 101 (Cheat Sheet)
  5. Security Function
  6. Informed Decisions
  7. The Concept of Business Continuity
  8. Identity and Access Management
  9. The Reference Monitor Concept
  10. Common Criteria: PP, ST, and TOE
  11. Common Criteria: Evaluation Assurance Level
  12. Security Activities in SDLC
  13. The Evolvement of Certification and Accreditation Process
  14. Software Development Security
  15. RDBMS Table Relationships
  16. CISSP Practice Questions

Highlights


Amicliens InfoSec Conceptual Model

Wuson’s CISSP Course Overview

AmicliensInfoSecConceptualModel_20190509

Information Security

The Onion diagram is updated to emphasize that Information Security is a business issue. Security people should protect assets while always keeping business in mind, that is enabling business and delivering values. The tunnel vision and function boundary should be broken and removed.

informationsecuritydefinition-1.jpg

About The Author: Wentz Wu

wentzwu_professionalcertifications-e1563935560749.jpg

Join Effective CISSP!