Browse Articles By Tag: ccsp (isc)2 certified cloud security professional official study guide
Our mailing list is now hosted on Google Group to allow people to access it from their phone, tablet, laptop,, or any other devices. It is no longer restricted to only email. We encourage you to make use of the mailing list for all of your questions.
Categories: PMP Mailing List 
05.02.2016 · From admin
One of the site member is starting a new CISSP study group in New York city. Read the article to get all of the details.
Categories: CISSP Study Group 
30.01.2016 · From admin
This posting will give you tips and tricks on how to start your own study group in your area. Group Dynamic is always a great motivator in your studies. You learn from others and others will benefit of your knowledge as well.
Categories: CISSP Study Group 
08.12.2015 · From admin
Finally, we have more than one single choice of book to prepare for the CISSP exam. To the surprise of everyone, ISC2 has just endorsed the new book from Sybex and they recommend it for anyone getting ready to take the exam.
Categories: CISSP 2015 Study Book 
13.10.2015 · From admin
THE CCCURE 2015 CISSP® CBK® CRAM STUDY GUIDE.
Categories: Announcement 
17.05.2015 · From admin
Our mailing list is now hosted on Google Group to allow people to access it from their phone, tablet, laptop,, or any other devices. It is no longer restricted to only email. We welcome you to make use of the mailing list for all of your questions.
Categories: CISSP CBK 2015 
19.04.2015 · From admin
A cram study guide is a resume of all of the domains in about 50 to 60 pages. It is a great tool to perform a final review the night before the exam. I usually recommend you reserved 3 to 4 hours to read the cram study the night before your exam.
Categories: CISSP CBK 2015 
18.04.2015 · From admin
Updated for the CISSP CBK 2015 edition that will come into effect on the 15th of April 2015. Get your copy now.
Categories: CISSP CBK 2015  · CISSP Study Books 
29.03.2015 · From admin
Here is a great document from the PCI Data Security Standard (PCI DSS) council on Penetration Testing. It is directly applicable to the new CBK coming our on tthe 15th April 2015. I highly recommend to read this to help you with the exam.
29.03.2015 · From admin
Beginning this month, (ISC)² has a new annual continuing professional education (CPE) policy, which requires members to earn an equal number of CPEs each year within a three-year certification renewal period. This policy was updated to help our members remain current on their CPEs on an annual basis, therefore, making the comprehensive three-year certification renewal process easier for them to manage.
Categories: CISSP CPE 
28.02.2015 · From admin
Read this article to get my most important tips and tricks and also to learn how to best use our quiz engine to pass your exam on the first trial. This recipe is a proven recipe used with success by thousands of students in the past. This is a must read.
Categories: CISSP exam  · CISSP 
24.02.2015 · From admin
One of the question we get asked the most often is why someone would take training with us instead of attending the official ISC2® training. Read this very interesting posting from the ISC2® website and how they explain their training DO NOT teach to their own examinations credentials.
Categories: CISSP CBK 2015  · CISSP  · CISSP Online CBT 
23.01.2015 · From admin
The role of nation-state actors in cyber attacks was perhaps most widely revealed in February 2013 when Mandiant released the APT1 report. Today we release a new report: APT28: A Window Into Russia’s Cyber Espionage Operations? This report focuses on a threat group that we have designated as APT28. Our report details additional information exposing ongoing, focused operations that we believe indicate a government sponsor based in Moscow.
31.10.2014 · From admin
BadUSB vulnerability is considered one of the worst IT vulnerabilities ever found. Discovered a few months ago, this big security hole affects the way USB devices communicate with an operating system. BadUSB is a major security flaw that allows online criminals turn a simple USB device, for example a keyboard, into a means of sending malicious commands from the user’s computer to trigger an action or contact a server controlled by hackers.
Categories: BadUSB  · USB Security 
31.10.2014 · From admin
The forums on the site are accessible to all members, even non paying members. This is where you can ask questions and get answers quickly. You can also subscribe to the forums you like to get an email when an answer is provided.
Categories: Forums on the site 
10.10.2014 · From admin
Software Development security is an important domain on the exam. Lack of knowledge and involvement of Security in the SDLC is one of the main cause of the issues we have today with enterprise software. Look at this great article from Jeff William telling you HOW to do it properly and giving you great link to learn more.
10.10.2014 · From admin
Here is the release of my Physical Security CBT, it is 2 Hours and 35 Minutes of training. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
06.10.2014 · From admin
Here is the release of my Operations Security CBT, it is 2 Hours and 3 Minutes of training. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
06.10.2014 · From admin
Here is the release of my Software Development Security CBT, it is 52 Minutes of training available. It is the most thorough tutorial and the best tutorial you will find to get ready for the CISSP exam. This is Part 2 of 2.
Categories: CISSP  · CISSP exam  · CISSP Online CBT 
06.10.2014 · From admin
Private
Per page: