Activity
Mon
Wed
Fri
Sun
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
What is this?
Less
More

Memberships

CISSP Study Group

1.3k members β€’ Free

3 contributions to CISSP Study Group
I passed!!
I provisionally passed this morning!! I had all 150 questions. This study group, Cert Mike on LinkedIn Learning, LearnZApp, and lots of prayer! Thank you everyone for the support!
1 like β€’ 19d
Congratulations Brandis πŸŽ‰
Passed the CISSP yesterday April 12. So excited !!!
I read the Destination Certification line by line first time, Second time I focused on all the lines I bookmarked while reading the first time, and also concentrated on the Highlight points in the book. Watched Dest cert mind map videos countless times, watched the Pete Zerg videos Full course, Cram and exam prep, Mike Chappelle videos, Cv Simpson videos, Cyber platter videos on YT, Tom Olzak, Think like a Manager, 2 CISSP live Boot camps. LearnzApp ( Good for testing knowledge ) Priya DW - (Udemy CISSP practice exam for exam difficulty) Pocket Prep ( Just for test of Knowledge ) OSG Wiley practice ( for Lengthy exam hours + Knowledge ) Dest Cert App ( Glossary prep exams ) Official OSG Book ( Read that but too cumbersome ) Strong emphasis on learning how to comprehend Context of questions in the exam Studied from Mid December to April, I was so close the first time in January. So yes that’s a summary of my Journey !
0 likes β€’ Apr 14
@Vikas Gupta Thank you Vikas
1 like β€’ Apr 17
@Martin Joplin 13 years and currently in DevSecOps Engineering.
Practice Question
A software development team is building a mobile banking application. The application will support biometric authentication and provide users with account management features. During the development phase, the team conducts regular static and dynamic code analysis to detect security vulnerabilities. However, after the application is deployed, several users report unauthorized transactions, leading to concerns of potential API exploitation. Which of the following should the team implement to mitigate this risk in the future? A) Conduct threat modeling to identify potential attack vectors during the design phase. B) Enable detailed application logging to monitor all API requests. C) Implement network-level monitoring and intrusion detection. D) Increase the frequency of penetration tests on production systems.
0 likes β€’ Apr 6
A
1-3 of 3
Chris Obia
2
1point to level up
@chris-obia-9037
13 Years Tech Professional in Big Data & DevSecOps

Active 9d ago
Joined Dec 31, 2024
powered by