Hello,
Congratulations on starting your journey to achieve the gold standard CISSP certification from ISC2.
If you are reading this, you already know the value of CISSP and are looking for a study plan and resources to refer.This post talks about study plan from an information security professional perspective in 2 months time frame along with the resources that you’ll need to do so. The objective of 2 months is assuming you already have good understanding of Information Security Concepts and are aware with the eight domains associated.
The study guide can be best used with converting the below table by adding columns to achieve following sequence – Date, Start Time, End Time, Total Hours Spent, Source, Domain, Module, Completion Status, Score for each Mock Test, Comments.
The above approach will help you keep track of time spent on each module and scores earned against it in each mock test.
Credits to the awesome CISSP Community & champions who have published tons of resources for any seeker. Key folks who must be mentioned are – Rob W, Adam G, Thor P, Luke A, Wentz Wu, Prabh N, Kelly H, Mike C, Larry G, Eric C, Shon H & many more…
All the best for your journey. Keep visiting for more content and domain specific notes.
PS – This post will evolve over a period of time, keep checking for updates.
Source | Domain | Module |
Nick Mitropoulos | 6 weeks study guide | Strategy, Sources |
Thor Teaches | Free Prep Guidance | Strategy, Sources |
Kelly Handerhan | Why you will Pass CISSP | Strategy |
Larry Greenblatt | CISSP 2020 Exam Tips | Strategy |
Prabh Nair | CISSP 2021 Strategy | book & exam engine, last 2 weeks |
Adam Gordon | CISSP Strategy | Getting Started with CISSP |
ISC2 | CISSP Course Outline | Curriculam Understanding |
InfoSecTrain | CISSP 2018 vs 2021 | Impact Analysis & books |
Rob Witcher | 1. Security & Risk Management | Security & Risk Management |
InfoSecTrain | 1. Security Risk & Governance | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 2. Asset Security | Asset Classification |
Rob Witcher | 2. Asset Security | Privacy |
InfoSecTrain | 2. Asset Security | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 3. Sec. Architecture & Engi. | Models & Frameworks |
Rob Witcher | 3. Sec. Architecture & Engi. | Evaluation Criteria |
Rob Witcher | 3. Sec. Architecture & Engi. | Trusted Computing Base |
Rob Witcher | 3. Sec. Architecture & Engi. | Vulnerabilities in Systems |
Rob Witcher | 3. Sec. Architecture & Engi. | Cloud |
Rob Witcher | 3. Sec. Architecture & Engi. | Cryptography |
Rob Witcher | 3. Sec. Architecture & Engi. | Digital Certs, Signatures & PKI |
Rob Witcher | 3. Sec. Architecture & Engi. | Cryptanalysis |
Rob Witcher | 3. Sec. Architecture & Engi. | Physical Security |
InfoSecTrain | 3. Sec. Architecture & Engi. | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 4. Comm & Network Security | OSI Model |
Rob Witcher | 4. Comm & Network Security | Networking |
Rob Witcher | 4. Comm & Network Security | Network Defense |
Rob Witcher | 4. Comm & Network Security | Remote Access |
InfoSecTrain | 4. Comm & Network Security | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 5. IAM | Access Control Overview |
Rob Witcher | 5. IAM | SSO & Federated Identity Mgmt |
InfoSecTrain | 5. IAM | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 6. Security Assessment & Testing | Overview |
Rob Witcher | 6. Security Assessment & Testing | VA & PT |
Rob Witcher | 6. Security Assessment & Testing | Logging & Monitoring |
InfoSecTrain | 6. Security Assessment & Testing | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 7. Security Operations | Investigations |
Rob Witcher | 7. Security Operations | Incident Response |
Rob Witcher | 7. Security Operations | Malware |
Rob Witcher | 7. Security Operations | Patching & Change Management |
Rob Witcher | 7. Security Operations | Recovery Strategies |
Rob Witcher | 7. Security Operations | Business Continuity Management |
InfoSecTrain | 7. Security Operations | |
Primary Book | ISC2 or Exam Guide | Read the book |
Rob Witcher | 8. Software Development Security | Secure Software Development |
Rob Witcher | 8. Software Development Security | Databses |
InfoSecTrain | 8. Software Development Security | |
Luke Ahmed | 8. Software Development Security | System Development Lifecycle |
Primary Book | ISC2 or Exam Guide | Read the book |
Luke Ahmed | 4. Comm & Network Security | Different types of Cabling |
Luke Ahmed | 3. Sec. Architecture & Engi. | Symmetric Key Encryption |
Luke Ahmed | 4. Comm & Network Security | Port Address Translation |
Luke Ahmed | 4. Comm & Network Security | TCP/IP Handshake |
Luke Ahmed | 4. Comm & Network Security | Firewall Deployment Architecture 1 |
Luke Ahmed | 4. Comm & Network Security | Firewall Deployment Architecture 2 |
Luke Ahmed | Internet of Things | |
Luke Ahmed | 4. Comm & Network Security | Transport Layer Security |
Luke Ahmed | 4. Comm & Network Security | OSI Model |
Luke Ahmed | 4. Comm & Network Security | Responsibilities in the Cloud |
Luke Ahmed | 4. Comm & Network Security | Public Cloud |
Luke Ahmed | New Topic | Kerberoasting |
Luke Ahmed | User & Entity Behavior Analysis | |
Practice Exams | McGraw Hill | Solve Exams |
IT Dojo | Question of the day | All domains |
Adam Gordon | Adam Gordon’s Question of the day | Read all these |
11th Hour CISSP | Revision before Exam | Read the book |
Luke Ahmed | How to think Like a Manager | Read the book |
Flashcards | Rob Witcher | Android |
Test Engine | Mock Test 1 | Mock Test |
Test Engine | Mock Test 2 | Mock Test |
Test Engine | Mock Test 3 | Mock Test |
Test Engine | Mock Test 4 | Mock Test |
Test Engine | Mock Test 5 | Mock Test |