Activity
Mon
Wed
Fri
Sun
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

Poster Print on Demand

2.7k members • Free

CISSP Study Group

1.8k members • Free

27 contributions to CISSP Study Group
🚨 Free Masterclass Access for Study Group Members (Again!) 🚨
If you missed it last time, May Brooks is graciously welcoming CISSP Study Group members back into her CISSP Masterclass! Completely free! This live session will be held on: Sunday, December 7th — 7:00 PM to 9:00 PM *Dubai time* (please check your time zone conversion) May is one of the most respected CISSP instructors worldwide. She’s an ISC2 Board Member, co-author of the Official CISSP Study Guide, a TEDx speaker, bestselling author (Scams, Hacking, and Cybersecurity). Having her open her masterclass to our group speaks volumes about the reputation you all have built here. Here’s what this means for you: 📚 Free Access to Mae’s Masterclass – If you’re serious about passing the CISSP, this is one of the most valuable sessions you can attend 💡 Ideal for All Levels – Whether you’re early in your studies or testing soon, Mae’s perspective will give you insights you won’t get anywhere else. 🤝 Community Recognition – May specifically wanted our study group to join because she believes in what you’re building here. See you there! Link & Access Info
Poll
41 members have voted
🚨 Free Masterclass Access for Study Group Members (Again!) 🚨
0 likes • 22d
When I realized it was Dubai time then it was out of my timeframe - ie 3am. On the login screen I tried to ask a question (which it seemed was a feature) and it tripped a server error. Would be great if there was a recording. TIA
Practice Question
The IT department is updating the budget for the following year, and they want to include enough money for a hardware refresh for some older systems. Unfortunately, there is a limited budget. Which of the following should be a top priority? A) Systems with an end-of-life (EOL) date that occurs in the following year B) Systems used for data loss prevention C) Systems used to process sensitive data D) Systems with an end-of-support (EOS) date that occurs in the following year
2 likes • May 14
D
Successfully Completed CISSP @128!
Hello Team, I’m thrilled to share that I have successfully passed the CISSP! This milestone wouldn’t have been possible without the collective effort and inspiring discussions we shared throughout our study journey in this group. Reflecting on my preparation, I found a few resources particularly valuable that I’d like to recommend: - Thoroughly reviewing official documents and guides helped build a solid foundation. *Cissp Study Guide 3rd Edition (Eric Conrad- Seth Misenar- Joshua Feldman). * ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Sybex Study Guide) *11th Hour CISSP study Guide *Certified Information Systems security Professional (CISSP) Exam guide ( Ted Jordan, Ric Daza and Hinne Hettema) * https://study.pocketprep.com/study @90%, very helpful. *CISSP-Prep (Honestly, it was not helpful, and the style of questions can easily discourage your efforts) *Andrew 50 CISSP questions :https://www.youtube.com/watch?v=qbVY0Cg8Ntw * Luke's 25 CISSP Practice: https://www.youtube.com/watch?v=MHbdNMRLafA - Watched Pete Zerger: https://www.youtube.com/@InsideCloudAndSecurity - Went through all Coffee shot per domain video of Prah (Vey important and very close to exam style question) - Fully engaged and attended study sessions - Utilizing test bank resources was instrumental in familiarizing myself with the exam format and question styles. - Leveraging research engines like Perplexity proved incredibly helpful for clarifying complex concepts quickly and efficiently. Example: Please provide me with 15 CISSP-style MCQ to help you master the differences between the following protocols: SAML,OAuth,OIDC
1 like • Apr 29
Hey Peter - with Went through all Coffee shot per domain video of Prah - is a video pack or sheets? As I get prompted to get access to Google sheets...... TIA
1 like • Apr 29
Thanks for granting access, cheers
How much to study the specifics of US laws
For example, how much do I need to know about Computer Fraud and Abuse Act? Do I need to be able to compare and contrast between Electronic Communications Policy Act, and the changes, or do I just need to know general information, such as that the CFAA outline what a computer crime is?
2 likes • Mar 27
Also handy to know what types of evidence are - parol, hearsay, documentary etc. I can bet there will be at least one question come up on that - I have seen many of these types of question on test exams and they can be tricky, personal opinion obviously.
Practice Question (Domain 4- Networking)
A global financial institution is restructuring its network infrastructure to improve security and optimize bandwidth utilization. They are migrating from a flat network to a hierarchical model with multiple subnets. Their current Class B network address is 172.16.0.0/16. The security team has mandated that each department (Accounting, Sales, Marketing, and Research) must have its own subnet. Furthermore, they require a minimum of 500 usable host addresses per subnet. The network engineers are considering several subnet mask options. Which of the following subnet masks BEST meets the organization's requirements while minimizing wasted IP addresses? a) 255.255.254.0 b) 255.255.255.0 c) 255.255.255.128 d) 255.255.255.192
0 likes • Feb 5
how are the subnet bits calculated? Do we need to rote remember each type of octet range to get the answer? Is there anything in the address that can give a clue to the answer? I have studied IP addresses as part of CISCO exams in the past so I'm not entirely new to this. TIA.
1-10 of 27
Tro Vis
3
43points to level up
@tro-vis-8559
Project Mgr for NIST/Essential 8 deployments

Active 12d ago
Joined May 8, 2024
Powered by