Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.7k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

Memberships

CyberMAYnia Club

57 members • Free

642 contributions to CISSP Study Group
🚨 Free Masterclass Access for Study Group Members (Again!) 🚨
If you missed it last time, May Brooks is graciously welcoming CISSP Study Group members back into her CISSP Masterclass! Completely free! This live session will be held on: Sunday, December 7th — 7:00 PM to 9:00 PM *Dubai time* (please check your time zone conversion) May is one of the most respected CISSP instructors worldwide. She’s an ISC2 Board Member, co-author of the Official CISSP Study Guide, a TEDx speaker, bestselling author (Scams, Hacking, and Cybersecurity). Having her open her masterclass to our group speaks volumes about the reputation you all have built here. Here’s what this means for you: 📚 Free Access to Mae’s Masterclass – If you’re serious about passing the CISSP, this is one of the most valuable sessions you can attend 💡 Ideal for All Levels – Whether you’re early in your studies or testing soon, Mae’s perspective will give you insights you won’t get anywhere else. 🤝 Community Recognition – May specifically wanted our study group to join because she believes in what you’re building here. See you there! Link & Access Info
Poll
10 members have voted
🚨 Free Masterclass Access for Study Group Members (Again!) 🚨
Join us! (Archived post)
https://www.skool.com/cybersecurity-study-group/calendar?eid=476eaa3719bc42eca0344b3e8b76508a
Join us! (Archived post)
1 like • 31m
@Shradhanjali Barik ill see what I can dig up
CISSP Exam Pass Today 😎
I am excited to share that I have provisionally passed the CISSP exam today It took a while, months of effort and discipline, including overcoming a previous failed attempt. Thanks to my family, friends and CISSP Study Group Community, i could have not done this without any of you! @Vincent Primiani thanks for putting together this wonderful community of liked minded people, with a common goal of achieving the much sought after CISSP certification. I'm not going anywhere, i am still going to be a member of this community and help where i can, and of course onto the next one ......
0 likes • 21h
A+ member! Huge congratulations
CISSP Practice Question – Security Architecture & Engineering (Post-Quantum Risk & Long-Term Data Confidentiality)
A pharmaceutical company stores decades of proprietary research data in encrypted archives. Recent threat intelligence reports warn that several nation-state actors are collecting large volumes of encrypted data today (“harvest-now, decrypt-later”) in preparation for future quantum decryption capabilities. The company currently uses RSA-2048 for key exchange and AES-256 for bulk encryption. What is the MOST critical action to take to protect the long-term confidentiality of this archived data? A. Increase RSA key length to 4096 bits to delay quantum-based decryption timelines. B. Migrate to a hybrid post-quantum key-establishment scheme (e.g., classical + lattice-based) for future encryptions and begin re-encrypting high-value archives. C. Deploy quantum-random number generators (QRNGs) to improve entropy for new cryptographic keys. D. Implement HSM-protected symmetric keys with annual rotation to strengthen present-day cryptographic hygiene.
CISSP Practice Question – Domain 6: Security Assessment & Testing
A large financial services company is updating its security testing program. The red team reports that modern AI-driven attack tools can automatically craft polymorphic payloads, evade signature-based controls, and generate targeted spear-phishing content indistinguishable from human-written messages.The CISO wants to ensure that the organization’s security testing program can accurately measure resilience against these new capabilities. Which testing approach MOST effectively validates the organization’s defenses against AI-augmented attack techniques? A. Perform quarterly vulnerability scans using updated threat signatures and CVE databases. B. Conduct adversarial machine learning (AML) evaluations to measure susceptibility to model poisoning and evasion attacks. C. Integrate AI-enabled BAS (Breach and Attack Simulation) tools that continuously replicate evolving attacker TTPs across email, endpoint, and network layers. D. Run annual red-team exercises focused on social engineering and spear-phishing campaigns executed manually by trained personnel.
1 like • 24h
@Idris Onimole Correct Answer: C. Integrate AI-enabled BAS (Breach and Attack Simulation) tools that continuously replicate evolving attacker TTPs across email, endpoint, and network layers. Explanation (CISSP logic): The question is about validating resilience against AI-augmented attack techniques — polymorphic payloads, adaptive phishing, and evasive behavior.CISSP wants you to choose the testing method that continuously mirrors real attacker capabilities, not something periodic, narrow, or academic. AI-enabled BAS platforms: - Continuously simulate attacker behaviors (not just signature-based exploits). - Evolve campaigns with the same adaptive logic adversarial AI uses. - Test multiple layers: email, endpoint, identity, network, and cloud. - Provide ongoing assurance, not one-time validation. That perfectly matches the scenario. Why the other options are wrong: A. Quarterly vulnerability scans❌ Signature-based.❌ Cannot adapt or generate polymorphic variants.❌ Does not match the threat model described. B. Adversarial machine learning (AML) evaluations❌ Important, but focuses on AI models you own, not real attack simulation.This is about protecting your ML models, not testing your environment against AI-powered attackers. D. Annual manual red-teaming❌ Valuable, but not scalable or adaptive.❌ Human-only red teams cannot match the volume, speed, or polymorphism of AI attack tools.❌ Annual testing is too infrequent given how fast AI attack tooling evolves. Think like a manager (CISSP mentality): Modern threat validation programs must be continuous, automated, and representative of real attacker capability, especially with AI in the mix.This is exactly what modern BAS tools deliver — ongoing, adversary-aware assurance at enterprise scale.
1-10 of 642
Vincent Primiani
7
5,628points to level up
Cybersecurity. The Study Group Guy.

Active 3m ago
Joined Apr 29, 2024
New York, NY
Powered by