Google Cybersecurity certificate covers, in the Module 2, the CISSP security domains, although it’s not a difficult topic, I found the written material on that topic to be a bit lacking in the course, so I decided to stop a little and write down some notes about the eight topics. So, in this post, we will have a quick and simple explanation of those domains.
What is the CISSP, and why these domains exist?
CISSP stands for Certified Information Systems Security Professional. It is a globally recognized certification in the field of information security, governed by the International Information System Security Certification Consortium, also known as (ISC)².
The CISSP certification exam is structured around those eight domains because they represent the key areas of knowledge and expertise required for effective information security management and governance. Each domain covers specific aspects of information security practice, and together they provide a comprehensive framework for understanding and addressing the challenges of securing information assets within organizations. These domains collectively cover a wide range of topics and skills required for information security professionals to effectively protect and defend organizations against cybersecurity threats and risks. They provide a structured framework for both the CISSP certification exam and for professionals working in the field of information security to develop their expertise and knowledge.
The security domains
- Security and Risk Management: This domain covers the principles, concepts, and frameworks of information security management, including risk management, governance, compliance, and business continuity planning.
- Asset Security: Asset Security focuses on the protection of organizational assets, including data, physical assets, and intellectual property. It covers topics such as data classification, asset inventory, and data retention policies.
- Security Architecture and Engineering: This domain involves designing, implementing, and managing security controls to ensure the confidentiality, integrity, and availability of information systems. It includes topics such as security models, cryptography, and secure design principles.
- Communication and Network Security: Communication and Network Security covers the principles and practices of securing network infrastructure and communication channels, including protocols, devices, and technologies used to transmit data.
- Identity and Access Management (IAM): IAM focuses on managing user identities, roles, and privileges to ensure that only authorized individuals have access to resources and information systems. It includes topics such as authentication, authorization, and identity federation.
- Security Assessment and Testing: This domain involves assessing and testing the effectiveness of security controls and measures to identify vulnerabilities and mitigate risks. It covers topics such as security assessments, penetration testing, and vulnerability management.
- Security Operations: Security Operations focuses on the day-to-day tasks and activities involved in managing and responding to security incidents, including monitoring, incident response, and disaster recovery planning.
- Software Development Security: This domain addresses security considerations throughout the software development lifecycle, from requirements analysis to deployment, to ensure that software applications are developed and maintained with security in mind.
Sources
- https://destcert.com/resources/domain-1-security-and-risk-management/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_TkLlatPnTMaKY2yC-oDhjICGSVbSYhmXB6w7Kp4yAWm3YNngwJaJGAaAqyiEALw_wcB
- https://destcert.com/resources/domain-2-asset-security/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_Tl8J15WT5PBBtTs-hJ8DfM2-OOVFaAyiba3K61ZekLHjmOuNmWWV-oaAhy9EALw_wcB
- https://destcert.com/resources/domain-3-security-architecture-and-engineering/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_TnZBpIEC2dbk4kv83rBAHxydctawSD5AmeMfNqJg8a23G7xKhgSXJIaAtY-EALw_wcB
- https://destcert.com/resources/cissp-domain-4-communication-and-network-security/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_TnqBw8IJJJ8gwlWcyJRCicxgbJLbSCsgGHI9pf9qFblI-pu318de6AaAlDAEALw_wcB
- https://destcert.com/resources/cissp-domain-5-identity-and-access-management-iam/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_Tl6IzmAljI3ShcnpXDHFJ3iYEmHYrveTmim_3rYxrsSmViU2TPjf9gaAk7SEALw_wcB
- https://destcert.com/resources/cissp-domain-6-security-assessment-and-testing/
- https://destcert.com/resources/cissp-domain-7-security-operations/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_TldocAe_7ANInOZjbiGdyRv-ILGhz_yMYS4d9VmigmSTQ8UVCMM7U4aAliREALw_wcB
- https://destcert.com/resources/cissp-domain-8-software-development-security/?utm_source=Google&utm_medium=cpc&utm_campaign=perfmax&gad_source=1&gclid=Cj0KCQjwqpSwBhClARIsADlZ_TmOzXyyhJZToHL25uB-tVtehSzAe5G8QjaSlO4iukBLq-ZuO5qqnUsaAu0sEALw_wcB
- https://www.itgovernance.co.uk/blog/the-8-cissp-domains-explained