๐ง CISSP 80/20 Study Focus: Hard-to-Remember Topics Outline
๐ง CISSP 80/20 Study Focus: Hard-to-Remember Topics Outline
These are the "high cognitive load" areas — theory-heavy, abstract, and nuanced.
๐ DOMAIN 3: Security Architecture and Engineering
Spend ~25% of your time here
๐ธ Cryptography (MOST misunderstood topic)
-
Symmetric vs Asymmetric encryption (uses, speed, when to choose which)
-
Block cipher modes (CBC, ECB, GCM, CTR – when to use each)
-
PKI (X.509, CRL, OCSP, digital signatures vs certificates)
-
Key management lifecycle (generation, distribution, escrow, destruction)
-
Hashing vs Encryption vs Encoding vs Salting
-
TLS/SSL, VPN protocols (IPSec modes: tunnel vs transport)
๐ธ Security Models (more theory-based)
-
Bell-LaPadula (confidentiality-focused)
-
Biba (integrity-focused)
-
Clark-Wilson, Brewer-Nash, Graham-Denning
-
Multilevel security and MAC models
๐งฐ DOMAIN 4: Communication and Network Security
Spend ~20% of your time here
๐ธ Protocol Stack Concepts
-
OSI vs TCP/IP – mapping protocols to layers
-
Secure protocols: SSH, HTTPS, SFTP, IPSec
-
Ports and services (e.g., what runs on 443 vs 22)
๐ธ Firewalls & VPNs
-
Stateful vs stateless filtering
-
Proxy vs NAT vs packet-filtering firewalls
-
VPN tunneling (SSL vs IPSec, split tunneling concerns)
๐ DOMAIN 5: Identity and Access Management (IAM)
Spend ~10% of your time here
๐ธ Access Control Models
-
DAC, MAC, RBAC, ABAC – how they differ and when they apply
-
Federated identity vs single sign-on (SAML, OAuth, OpenID)
-
Authentication factors and attacks (replay, man-in-the-middle, phishing)
๐งฎ DOMAIN 6: Security Assessment and Testing
Spend ~10% of your time here
๐ธ Testing Types (easy to mix up)
-
Vulnerability assessment vs penetration testing
-
Static vs dynamic code analysis
-
White-box vs black-box vs gray-box testing
๐ DOMAIN 7: Security Operations
Spend ~10% of your time here
๐ธ Logging & Monitoring
-
SIEMs, log retention, incident response steps
-
BCP vs DRP vs IRP – when to use each
๐ธ Forensics Basics
-
Chain of custody
-
Order of volatility (registers > memory > disk > remote logs)
๐ DOMAIN 1 & 2: Security & Risk Management / Asset Security
Spend ~10% of your time here, but master key frameworks
๐ธ Governance & Legal Stuff
-
Data classification schemes (public, internal, confidential, etc.)
-
Due care vs due diligence
-
Privacy laws (GDPR, HIPAA, PCI-DSS, etc.)
-
Risk calculations (ALE = SLE × ARO)
⚠️ Key Memory Traps
-
Encryption protocol purpose/usage
-
Security models & frameworks
-
Access control types and acronyms
-
Key lifecycle terminology
-
Difference between security testing types
๐งฉ How to Study These Effectively:
-
Use mnemonics, flashcards, and scenario-based questions.
-
Skim easier stuff just once or twice, deep-dive repeatedly on the hard stuff.
-
Schedule short 20–30 min review sessions for just encryption, access control, and networking.
Comments
Post a Comment