Our mailing list is now hosted on Google Group to allow people to access it from their phone, tablet, laptop,, or any other devices. It is no longer restricted to only email. We encourage you to make use of the mailing list for all of your questions.
One of the site member is starting a new CISSP study group in New York city. Read the article to get all of the details.
This posting will give you tips and tricks on how to start your own study group in your area. Group Dynamic is always a great motivator in your studies. You learn from others and others will benefit of your knowledge as well.
Finally, we have more than one single choice of book to prepare for the CISSP exam. To the surprise of everyone, ISC2 has just endorsed the new book from Sybex and they recommend it for anyone getting ready to take the exam.
THE CCCURE 2015 CISSP® CBK® CRAM STUDY GUIDE.
Our mailing list is now hosted on Google Group to allow people to access it from their phone, tablet, laptop,, or any other devices. It is no longer restricted to only email. We welcome you to make use of the mailing list for all of your questions.
A cram study guide is a resume of all of the domains in about 50 to 60 pages. It is a great tool to perform a final review the night before the exam. I usually recommend you reserved 3 to 4 hours to read the cram study the night before your exam.
Updated for the CISSP CBK 2015 edition that will come into effect on the 15th of April 2015. Get your copy now.
Here is a great document from the PCI Data Security Standard (PCI DSS) council on Penetration Testing. It is directly applicable to the new CBK coming our on tthe 15th April 2015. I highly recommend to read this to help you with the exam.
Beginning this month, (ISC)² has a new annual continuing professional education (CPE) policy, which requires members to earn an equal number of CPEs each year within a three-year certification renewal period. This policy was updated to help our members remain current on their CPEs on an annual basis, therefore, making the comprehensive three-year certification renewal process easier for them to manage.
Read this article to get my most important tips and tricks and also to learn how to best use our quiz engine to pass your exam on the first trial. This recipe is a proven recipe used with success by thousands of students in the past. This is a must read.
One of the question we get asked the most often is why someone would take training with us instead of attending the official ISC2® training. Read this very interesting posting from the ISC2® website and how they explain their training DO NOT teach to their own examinations credentials.
The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 report. Today we release a new report: APT28: A Window Into Russia’s Cyber Espionage Operations? This report focuses on a threat group that we have designated as APT28. Our report details additional information exposing ongoing, focused operations that we believe indicate a government sponsor based in Moscow.
BadUSB vulnerability is considered one of the worst IT vulnerabilities ever found.
Discovered a few months ago, this big security hole affects the way USB devices communicate with an operating system.
BadUSB is a major security flaw that allows online criminals turn a simple USB device, for example a keyboard, into a means of sending malicious commands from the user’s computer to trigger an action or contact a server controlled by hackers.
The forums on the site are accessible to all members, even non paying members. This is where you can ask questions and get answers quickly. You can also subscribe to the forums you like to get an email when an answer is provided.
Software Development security is an important domain on the exam. Lack of knowledge and involvement of Security in the SDLC is one of the main cause of the issues we have today with enterprise software. Look at this great article from Jeff William telling you HOW to do it properly and giving you great link to learn more.
Here is the release of my Physical Security CBT, it is 2 Hours and 35 Minutes of training. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam.
Here is the release of my Operations Security CBT, it is 2 Hours and 3 Minutes of training. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam.
Here is the release of my Software Development Security CBT, it is 52 Minutes of training available. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam. This is Part 2 of 2.