HTTP/2 302
server: nginx
date: Wed, 15 Oct 2025 23:03:24 GMT
content-type: text/plain; charset=utf-8
content-length: 0
x-archive-redirect-reason: found capture at 20120502074039
location: https://web.archive.org/web/20120502074039/https://packtlib.packtpub.com/library/cissp-21-days
server-timing: captures_list;dur=0.504456, exclusion.robots;dur=0.019459, exclusion.robots.policy;dur=0.009764, esindex;dur=0.009743, cdx.remote;dur=18.658403, LoadShardBlock;dur=258.797863, PetaboxLoader3.datanode;dur=197.260704, PetaboxLoader3.resolve;dur=47.332956
x-app-server: wwwb-app212
x-ts: 302
x-tr: 304
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
set-cookie: wb-p-SERVER=wwwb-app212; path=/
x-location: All
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
HTTP/2 200
server: nginx
date: Wed, 15 Oct 2025 23:03:26 GMT
content-type: text/html; charset=utf-8
x-archive-orig-server: nginx
x-archive-orig-expires: Sun, 19 Nov 1978 05:00:00 GMT
x-archive-orig-cache-control: store, no-cache, must-revalidate, post-check=0, pre-check=0
x-archive-orig-x-packt-clean: 1
x-archive-orig-x-cache-version: 1
x-archive-orig-content-length: 15264
x-archive-orig-accept-ranges: bytes
x-archive-orig-date: Wed, 02 May 2012 07:40:39 GMT
x-archive-orig-x-varnish: 1706898985
x-archive-orig-age: 0
x-archive-orig-via: 1.1 varnish
x-archive-orig-connection: close
x-archive-orig-x-packt-v: 0
x-archive-orig-x-country-code: US
x-archive-guessed-content-type: text/html
x-archive-guessed-charset: utf-8
memento-datetime: Wed, 02 May 2012 07:40:39 GMT
link:
; rel="original", ; rel="timemap"; type="application/link-format", ; rel="timegate", ; rel="first memento"; datetime="Wed, 02 May 2012 07:40:39 GMT", ; rel="memento"; datetime="Wed, 02 May 2012 07:40:39 GMT", ; rel="next memento"; datetime="Sat, 06 Oct 2012 04:13:19 GMT", ; rel="last memento"; datetime="Wed, 13 Aug 2014 03:49:07 GMT"
content-security-policy: default-src 'self' 'unsafe-eval' 'unsafe-inline' data: blob: archive.org web.archive.org web-static.archive.org wayback-api.archive.org athena.archive.org analytics.archive.org pragma.archivelab.org wwwb-events.archive.org
x-archive-src: alexa20120503-22/52_27_20120502073810_crawl101.arc.gz
server-timing: captures_list;dur=0.559436, exclusion.robots;dur=0.021204, exclusion.robots.policy;dur=0.009226, esindex;dur=0.011483, cdx.remote;dur=29.924966, LoadShardBlock;dur=78.954905, PetaboxLoader3.datanode;dur=89.310821, load_resource;dur=1666.388163, PetaboxLoader3.resolve;dur=1637.178840
x-app-server: wwwb-app212
x-ts: 200
x-tr: 1855
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
x-location: All
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
content-encoding: gzip
PacktLib - CISSP in 21 Days
PacktLib: CISSP in 21 Days
CISSP in 21 Days
Credits
About the Author
About the Reviewer
Preface
Introduction to CISSP
Eligibility requirements for the CISSP exam and certification
The (ISC)² CBK security domains
Approach
Summary
Day1: Information Security and Risk Management
Knowledge requirements
The approach
Security management practices
Control environment
Standards and guidelines
Security posture
Asset classification and control
Summary
Practice questions
Day 2: Information Security and Risk Management
Security awareness and training
Risk assessment and management
Summary
Practice questions
Day 3: Physical (Environmental) Security
Knowledge requirements
The approach
Threats, vulnerabilities, and countermeasures for physical security
Physical security design
Perimeter security
Interior security
Summary
Practice questions
Day 4: Physical (Environmental) Security
Operations/Facility security
Protecting and securing equipments
Summary
Practice questions
Day 5: Access Control
Knowledge requirements
The approach
Access control concepts, methodologies, and techniques
Access control and authentication
Access control attacks and countermeasures
Summary
Practice questions
Day 6: Access Control
Vulnerability assessment
Penetration testing
Common myths about vulnerability assessment and penetration testing
CVE and CVSS
Summary
Practice questions
Day 7: Cryptography
Key areas of knowledge
The approach
Methods of encryption
Types of encryption
Key length and security
Summary of encryption types
Application and use of cryptography
Summary
Practice questions
Day 8: Cryptography
Public key infrastructure
Methods of cryptanalytic attacks
Cryptographic standards
Summary
Practice questions
Day 9: Operations Security
Knowledge requirements
The approach
Operations procedure and responsibilities
Incident management and reporting
Summary
Practice questions
Day 10: Operations Security
Administrative management and control
Other controls
System evaluation standards
Summary
Practice questions
Day 11: Application Security
Knowledge requirements
The approach
Systems engineering
Software Development Life Cycle
Summary
Practice questions
Day 12: Application Security
Introduction to Information Technology systems
Threats and vulnerabilities to application systems
Web application security
Application controls
Summary
Practice questions
Day 13: Telecommunications and Network Security
Knowledge requirements
The approach
Network architecture, protocols, and technologies
Summary
Practice questions
Day 14: Telecommunications and Network Security
Transport layer
Network or Internet layer
Link layer
Summary
Practice questions
Day 15: Security Architecture and Design
Knowledge requirements
The approach
Computer architecture
Summary
Practice questions
Day 16: Security Architecture and Design
Assurance
Certification and accreditation
Information security models
Summary
Practice questions
Day 17: Business Continuity and Disaster Recovery Planning
Knowledge requirements
The approach
Business Continuity Planning (BCP)
Summary
Practice questions
Day 18: Business Continuity and Disaster Recovery Planning
Disaster Recovery Planning (DRP)
Summary
Practice questions
Day 19: Legal, Regulations, Compliance, and Investigations
Knowledge requirements
The approach
Computer crimes
Cyber crime
Computer crime related incidents
Summary
Practice questions
Day 20: Legal, Regulations, Compliance, and Investigations
Legal and regulatory frameworks
Computer investigations
Ethical usage of information systems
Summary
Practice questions
Day 21: Mock Test Paper
Questions
Answers
References