This section is developed to help you prepare for your CISSP exam. It should not be considered an official course, nor an alternative to the official (ISC)² CBK. It is intended to serve as a complementary guide to help you fill any gaps that you might have and put you on the straight path toward your certification.
This section is still under development. I try to publish new content regularly. If you have any suggestion or a specific subject that you want me to address, please let me know and I’ll make sure to discuss it in a future post.
Domain Review

CISSP Domain 1 Review – Security and Risk Management
This post serves as a review for the domain 1 of the CISSP. This domain covers security and risk management. […]

CISSP Domain 2 Review – Asset Security
This post serves as a review for the domain 2 of the CISSP. This domain covers asset security. Before we […]

CISSP Domain 3 Review – Security Architecture and Engineering
This post serves as a review for the domain 3 of the CISSP. This domain covers security architecture and engineering. […]

CISSP Domain 4 Review – Communication and Network Security
This post serves as a review for the domain 4 of the CISSP. This domain covers communication and network security. […]

CISSP Domain 5 Review – Identity and Access Management
This post serves as a review for the domain 5 of the CISSP. This domain covers identity and access . […]

CISSP Domain 6 Review – Security Testing
This post serves as a review for the domain 6 of the CISSP. This domain covers security testing. Before we […]

CISSP Domain 7 Review – Security Operations
This post serves as a review for the domain 7 of the CISSP. This domain covers security operations. Before we […]

CISSP Domain 8 Review – Software Development Security
This post serves as a review for the domain 8 of the CISSP. This domain covers the software development security. […]
Other CISSP posts

What is SAML? And Why is it Used?
Security Assertion Markup Language (SAML) is an open-source standard that allows separate parties to exchange authorization data between them. It […]

NIST Standards You Should Know About For CISSP Exam
If you are preparing for the CISSP exam, then you have certainly encountered some of NIST standards. They are referenced […]

COBIT – IT Governance Framework
For years, organizations have suffered from a crucial gap that existed between business objectives and IT governance. IT activities were […]

What is the CIA Triad?
The CIA Triad stands for Confidentiality, Integrity and Availability. These three concepts form the basis of information security. They are […]