๐Ÿง  CISSP 80/20 Study Focus: Hard-to-Remember Topics Outline

๐Ÿง  CISSP 80/20 Study Focus: Hard-to-Remember Topics Outline

If you're already comfortable with most of the CISSP content, consider take a Pareto (80/20) approach: focus on the 20% of topics that tend to cause 80% of exam errors, especially for people who are already experienced professionals.

These are the "high cognitive load" areas — theory-heavy, abstract, and nuanced.


๐Ÿ” DOMAIN 3: Security Architecture and Engineering

Spend ~25% of your time here

๐Ÿ”ธ Cryptography (MOST misunderstood topic)

  • Symmetric vs Asymmetric encryption (uses, speed, when to choose which)

  • Block cipher modes (CBC, ECB, GCM, CTR – when to use each)

  • PKI (X.509, CRL, OCSP, digital signatures vs certificates)

  • Key management lifecycle (generation, distribution, escrow, destruction)

  • Hashing vs Encryption vs Encoding vs Salting

  • TLS/SSL, VPN protocols (IPSec modes: tunnel vs transport)

๐Ÿ”ธ Security Models (more theory-based)

  • Bell-LaPadula (confidentiality-focused)

  • Biba (integrity-focused)

  • Clark-Wilson, Brewer-Nash, Graham-Denning

  • Multilevel security and MAC models


๐Ÿงฐ DOMAIN 4: Communication and Network Security

Spend ~20% of your time here

๐Ÿ”ธ Protocol Stack Concepts

  • OSI vs TCP/IP – mapping protocols to layers

  • Secure protocols: SSH, HTTPS, SFTP, IPSec

  • Ports and services (e.g., what runs on 443 vs 22)

๐Ÿ”ธ Firewalls & VPNs

  • Stateful vs stateless filtering

  • Proxy vs NAT vs packet-filtering firewalls

  • VPN tunneling (SSL vs IPSec, split tunneling concerns)


๐Ÿ“œ DOMAIN 5: Identity and Access Management (IAM)

Spend ~10% of your time here

๐Ÿ”ธ Access Control Models

  • DAC, MAC, RBAC, ABAC – how they differ and when they apply

  • Federated identity vs single sign-on (SAML, OAuth, OpenID)

  • Authentication factors and attacks (replay, man-in-the-middle, phishing)


๐Ÿงฎ DOMAIN 6: Security Assessment and Testing

Spend ~10% of your time here

๐Ÿ”ธ Testing Types (easy to mix up)

  • Vulnerability assessment vs penetration testing

  • Static vs dynamic code analysis

  • White-box vs black-box vs gray-box testing


๐Ÿ›  DOMAIN 7: Security Operations

Spend ~10% of your time here

๐Ÿ”ธ Logging & Monitoring

  • SIEMs, log retention, incident response steps

  • BCP vs DRP vs IRP – when to use each

๐Ÿ”ธ Forensics Basics

  • Chain of custody

  • Order of volatility (registers > memory > disk > remote logs)


๐Ÿ› DOMAIN 1 & 2: Security & Risk Management / Asset Security

Spend ~10% of your time here, but master key frameworks

๐Ÿ”ธ Governance & Legal Stuff

  • Data classification schemes (public, internal, confidential, etc.)

  • Due care vs due diligence

  • Privacy laws (GDPR, HIPAA, PCI-DSS, etc.)

  • Risk calculations (ALE = SLE × ARO)


⚠️ Key Memory Traps

  1. Encryption protocol purpose/usage

  2. Security models & frameworks

  3. Access control types and acronyms

  4. Key lifecycle terminology

  5. Difference between security testing types


๐Ÿงฉ How to Study These Effectively:

  • Use mnemonics, flashcards, and scenario-based questions.

  • Skim easier stuff just once or twice, deep-dive repeatedly on the hard stuff.

  • Schedule short 20–30 min review sessions for just encryption, access control, and networking.


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards