You are on page 1of 2

Module 1: Security and Risk Management Domain

Lesson 1: Understand, Adhere to, and Promote Professional Ethics


Lesson 2: Understand and Apply Security Concepts
Lesson 3: Evaluate and Apply Security Governance Principles
Lesson 4: Determine Compliance and Other Requirements
Lesson 5: Understand Legal and Regulatory Issues that Pertain to Information Security in a Holistic Context
Lesson 6: Understand Requirements for Investigation Types
Lesson 7: Develop, Document, and Implement Security Policy, Standards, Procedures, and
Lesson 8: Identify, Analyze, and Prioritize Business Continuity Requirements
Lesson 9: Contribute to and Enforce Personnel Security Policies and Procedures
Lesson 10: Understand and Apply Risk Management Concepts
Lesson 11: Understand and Apply Threat Modeling Concepts and Methodologies
Lesson 12: Apply Supply Chain Risk Management Concepts
Lesson 13: Establish and Maintain a Security Awareness, Education, and Training Program

Module 2: Asset Security


Lesson 14: Identify and Classify Information and Assets
Lesson 15: Establish Information and Asset Handling Requirements
Lesson 16: Provision Resources Securely
Lesson 17: Manage Data Lifecycle
Lesson 18: Ensure Appropriate Asset Retention
Lesson 19: Determine Data Security Controls and Compliance Requirements

Module 3: Security Architecture and Engineering


Lesson 20: Research, Implement, and Manage Engineering Processes Using Secure Design Principles
Lesson 21: Understand the Fundamental Concepts of Security Models
Lesson 22: Select Controls Based Upon System Security Requirements
Lesson 23: Understand Security Capabilities of Information Systems
Lesson 24: Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements
Lesson 25: Select and Determine Cryptographic Solutions
Lesson 26: Understand Methods of Cryptanalytic Attacks
Lesson 27: Apply Security Principles to Site and Facility Design
Lesson 28: Design Site and Facility Security Controls

Module 4: Communication and Network Security


Lesson 29: Assess and Implement Secure Design Principles in Network Architecture
Lesson 30: Secure Network Components
Lesson 31: Implement Secure Communication Channels According to Design

Module 5: Identity and Access Management (IAM)


Lesson 32: Control Physical and Logical Access to Assets
Lesson 33: Manage Identification and Authentication of People, Devices, and Services
Lesson 34: Federated Identity with a Third-party Service
Lesson 35: Implement and Manage Authorization Mechanisms
Lesson 36: Manage the Identity and Access Provisioning Lifecycle
Lesson 37: Implement Authentication Systems
Module 6: Security Assessment and Testing
Lesson 38: Design and Validate Assessment, Test, and Audit Strategies
Lesson 39: Conduct Security Controls Testing
Lesson 40: Collect Security Process Data
Lesson 41: Analyze Test Output and Generate Report
Lesson 42: Conduct or Facilitate Security Audits

Module 7: Security Operations


Lesson 43: Understand and Comply with Investigations
Lesson 44: Conduct Logging and Monitoring Activities
Lesson 45: Perform Configuration Management
Lesson 46: Apply Foundational Security Operations Concepts
Lesson 47: Apply Resource Protection
Lesson 48: Conduct Incident Management
Lesson 49: Operate and Maintain Detective and Preventative Measures
Lesson 50: Implement and Support Patch and Vulnerability Management
Lesson 51: Understand and Participate in Change Management Process
Lesson 52: Implement Recovery Strategies
Lesson 53: Implement Disaster Recovery Processes
Lesson 54: Test Disaster Recovery Plans
Lesson 55: Participate in Business Continuity (BC) Planning and Exercises
Lesson 56: Implement and Manage Physical Security
Lesson 57: Address Personnel Safety and Security Concerns

Module 8: Software Development Security


Lesson 58: Understand and Integrate Security in the Software Development Lifecycle
Lesson 59: Identify and Apply Security Controls in Software Development Ecosystems
Lesson 60: Assess the Effectiveness of Software Security
Lesson 61: Assess the Security Impact of Acquired Software
Lesson 62: Define and Apply Secure Coding Guidelines and Standards
Module 9: Attaining and Maintaining Your CISSP
Lesson 63: Preparing for Your Examination
Lesson 64: The Certification Process

You might also like