ISC2 Certification Prep
Domain guides, practice questions, and study strategies for ISC2 credentials — CISSP, CCSP, SSCP, CSSLP, and CGRC. Built for practitioners managing security programs, cloud environments, and risk governance.
CISSP — Certified Information Systems Security Professional
The gold-standard management-level security certification, recognised globally and required for CISOs, security directors, and senior architects. The CISSP uses Computerised Adaptive Testing (CAT) — each question adapts based on your prior answers, meaning question difficulty fluctuates intentionally. You need five years of work experience in at least two of the eight domains (or four years with a qualifying degree).
The eight CISSP domains
Security and Risk Management
Security governance, compliance frameworks, legal and regulatory landscape (GDPR, HIPAA, SOX), ethics, risk identification and quantitative/qualitative risk analysis, business continuity planning, personnel security, and security awareness programme design. High weight — study this domain thoroughly.
Asset Security
Data classification schemes, ownership and custodianship roles, data retention and destruction policies, privacy protection requirements, and asset handling procedures across the information lifecycle.
Security Architecture and Engineering
Security models (Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash), trusted computing base (TCB), security evaluation criteria (Common Criteria, FIPS), cryptography (PKI, key management, algorithms), physical security design, and secure hardware architecture.
Communication and Network Security
OSI model security at each layer, network topology and segmentation, secure protocols (TLS, SSH, IPsec, DNSSEC), wireless security, content distribution networks, VPN types, and converged protocols (MPLS, VoIP, IP storage).
Identity and Access Management
Identity proofing, authentication factors and protocols (Kerberos, RADIUS, SAML, OAuth, OpenID Connect), access control models (MAC, DAC, RBAC, ABAC), directory services, federated identity management, and privileged access management.
Security Assessment and Testing
Security assessment types (vulnerability scans, penetration tests, red team exercises), code review and SAST/DAST, log auditing, SOC reports (SOC 1, SOC 2, SOC 3), and key performance indicator design for security programmes.
Security Operations
Incident management lifecycle, digital forensics (evidence handling, chain of custody), disaster recovery planning and BCP testing, patch management, change management, configuration management, and physical security operations including data centre controls.
Software Development Security
Secure SDLC integration, DevSecOps, common vulnerabilities (OWASP Top 10), code review practices, secure coding standards, acquired software supply chain security, and database security.
CISSP exam strategy — think like a manager
The CISSP is infamous for questions where multiple answers appear correct. The key differentiator is the managerial perspective: the exam expects you to think like a senior security professional advising leadership, not a hands-on technician. When in doubt, select the answer that:
- Protects the organisation first, then systems
- Involves planning, policy, or risk assessment before technical implementation
- Considers people and process before technology
- Chooses the most complete or systematic option (e.g., "conduct a risk assessment" before "implement a firewall")
CCSP — Certified Cloud Security Professional
The practitioner-level cloud security credential from ISC2. Validates expertise in cloud architecture, governance, risk, compliance, and operations. Requires five years IT experience with three years in information security and one year in cloud security. Co-developed with the Cloud Security Alliance (CSA).
Cloud Concepts, Architecture & Design
Cloud computing definitions (NIST SP 800-145), service and deployment models, key cloud characteristics, shared responsibility matrix, cloud security reference architecture (CSA CCM), cloud design patterns, and business continuity in cloud contexts.
Cloud Data Security
Data lifecycle management in cloud, data classification, encryption strategies (server-side, client-side, BYOK, HYOK), data loss prevention, data masking and tokenisation, cloud storage security, and eDiscovery considerations.
Cloud Platform & Infrastructure Security
Virtualisation security, container and Kubernetes security, serverless security, cloud network security (VPCs, security groups, NACLs), cloud workload protection, and cloud provider shared infrastructure risks.
Cloud Application Security
Cloud-native application security, software development lifecycle integration, OWASP Top 10 in cloud contexts, API security, IAM for applications (OAuth 2.0, OIDC, SAML), and secure supply chain for cloud applications.
Cloud Security Operations
Cloud SIEM and log management, incident response in cloud environments, forensics challenges in cloud (ephemeral instances, shared logs), patch management for cloud workloads, and Cloud Access Security Broker (CASB) deployment.
Legal, Risk & Compliance
International privacy and data protection regulations (GDPR, CCPA, LGPD), cloud-specific compliance frameworks (FedRAMP, ISO 27017, ISO 27018, CSA STAR), contract and vendor assurance, and jurisdictional considerations for cloud data.
SSCP — Systems Security Certified Practitioner
The practitioner-level credential for IT and security administrators responsible for the technical implementation of security controls. Requires one year of work experience in at least one domain. A good stepping stone before CISSP.
Security Operations and Administration
Security policies and procedures, security documentation, asset inventory and configuration management, change management, and the security principles of confidentiality, integrity, and availability in daily operations.
Access Controls
Authentication methods, access control models, directory service security, identity lifecycle management, privileged account management, and remote access security implementation.
Risk Identification, Monitoring & Analysis
Risk assessment methodologies, security monitoring tools, intrusion detection and prevention systems (IDS/IPS), log analysis, security testing (vulnerability scans, penetration testing basics), and risk treatment decisions.
Incident Response and Recovery
Incident response planning, detection and reporting procedures, containment and recovery actions, forensic evidence preservation, business continuity and disaster recovery planning, and backup and restore procedures.
Cryptography
Cryptographic concepts (symmetric, asymmetric, hashing), PKI and certificate management, common cryptographic algorithms and their use cases (AES, RSA, ECDSA, SHA-2), TLS/SSL, and encryption application scenarios.
Network and Communications Security
Network security fundamentals, secure protocols, wireless security, VPN implementation, firewall rule review, network segmentation, and defence-in-depth implementation for network infrastructure.
CSSLP — Certified Secure Software Lifecycle Professional
ISC2's credential for software developers, engineers, and architects responsible for integrating security throughout the software development lifecycle. Requires four years of software development lifecycle experience with at least one year in one or more of the eight domains.
Secure Software Concepts
Core software security concepts, CIA triad in software contexts, authentication and authorisation in applications, security design principles (least privilege, fail-safe defaults, economy of mechanism, separation of duties), and software vulnerability classification.
Secure Software Requirements
Security requirements elicitation, abuse case development, privacy requirements (data minimisation, consent, retention), regulatory requirements for software (PCI DSS, HIPAA, GDPR), and security acceptance criteria.
Secure Software Architecture & Design
Threat modelling (STRIDE, PASTA, DREAD, LINDDUN), secure architecture patterns, attack surface reduction, secure interface design, trust boundaries, and security patterns for cloud-native and microservices architectures.
Secure Software Implementation
Secure coding standards (CERT C/C++, OWASP, SANS CWE Top 25), input validation, output encoding, error and exception handling, memory management, cryptographic implementation pitfalls, and third-party library security.
Secure Software Testing
SAST, DAST, IAST, SCA (software composition analysis), penetration testing of applications, fuzz testing, security regression testing, bug bounty programme integration, and quality gates in CI/CD.
Secure Software Lifecycle Management
DevSecOps pipeline security, security in Agile and Scrum, third-party and open-source component security (SBOM), end-of-life software handling, security metrics for software programmes, and continuous improvement.
CGRC — Certified in Governance, Risk & Compliance
Validates the skills required to authorise and maintain information systems within a risk management framework. Aligned to NIST RMF. Particularly valued in U.S. federal government and defence contractor environments. Requires two years of experience in one or more of the seven domains.
Information Security Risk Management Program
Risk management frameworks (NIST RMF, ISO 31000), organisational risk tolerance, programme governance, and the relationship between security and business objectives.
Scope of the Information System
System boundary definition, information type identification, categorisation using FIPS 199 and NIST SP 800-60, overlays, and security impact analysis.
Selection and Approval of Security Controls
NIST SP 800-53 control selection, tailoring, scoping, common controls, compensating controls, and the system security plan (SSP) development.
Implementation of Security Controls
Control implementation documentation, configuration management baselines, security control implementation evidence, and integration with enterprise architecture.
Assessment of Security Controls
Security assessment planning, assessment procedures (NIST SP 800-53A), security assessment report (SAR), findings classification, and remediation planning.
Authorization of Information System
Plan of action and milestones (POA&M), risk acceptance decision, authorisation to operate (ATO), authorisation boundaries, and interconnection agreements.
Continuous Monitoring
Continuous monitoring strategy, ongoing assessment cadence, security status reporting, configuration and change control monitoring, and ongoing authorisation.
Practice Questions — CISSP
CISSP questions require a management mindset. When you see multiple plausible answers, select the one that demonstrates the most comprehensive and risk-informed thinking.
1. A company is planning to outsource its payroll processing to a third-party provider. Which of the following should be the security team's FIRST action?
2. Which security model is primarily concerned with preventing unauthorised disclosure of information and enforces a "no read up, no write down" policy?
3. An organisation has suffered a ransomware attack that encrypted its production database. The incident response team has contained the attack. What should be the NEXT step?
4. A security manager is developing a business case for a new security tool. Which calculation correctly quantifies whether the investment is financially justified?
5. An organisation's PKI root CA certificate is set to expire in 6 months. What is the MOST critical risk if no action is taken?
6. A CISO is presenting a request to the board for additional security budget. Which framing is MOST effective from a CISSP management perspective?
7. An organisation stores highly classified research data. The security team must choose an access control model that ensures access decisions are made by the system based on data labels and subject clearances — not by data owners. Which model applies?
8. During a penetration test, the tester finds that they can read another user's data by changing a numeric ID in the URL: /api/invoices/1042 → /api/invoices/1043. Which OWASP vulnerability does this represent?
CISSP Study Plan for Working Professionals
CISSP is a marathon, not a sprint. Most successful candidates report 300–500 hours of study. This plan runs 16 weeks at ~20 hours/week (weekday evenings + weekend study blocks).
Weeks 1–4: Foundational domains (high weight)
- Domain 1 — Security & Risk Management (2 weeks)
- Domain 3 — Security Architecture & Engineering (1 week)
- Domain 5 — Identity & Access Management (1 week)
Weeks 5–8: Operational and technical domains
- Domain 4 — Communication & Network Security (1.5 weeks)
- Domain 7 — Security Operations (1.5 weeks)
- Domain 6 — Security Assessment & Testing (1 week)
Weeks 9–11: Remaining domains
- Domain 2 — Asset Security (0.5 weeks)
- Domain 8 — Software Development Security (1 week)
- Complete first full read-through of all study materials
Weeks 12–16: Practice, review & mindset
- Week 12: 1,000-question bank round 1 — flag all incorrect answers
- Week 13: Study incorrect answers; review weak domains in depth
- Week 14: 1,000-question bank round 2; target ≥ 75%
- Week 15: Full-length CAT-style timed practice exams
- Week 16: Final review; managerial mindset drills; exam strategy
Free & reputable CISSP resources
- Official blueprint: ISC2 CISSP exam outline PDF — download and use as your primary study checklist
- Free video: Destination Certification YouTube (Rob Witcher) — free domain-level videos with visual mind maps; consistently cited in r/cissp pass posts
- Free video: Kelly Handerhan's CISSP on Cybrary (free account) — the canonical "managerial mindset" explanation
- Free practice questions: ISC2 official self-assessment quiz — official questions from the exam body
- Free entry credential: ISC2 Certified in Cybersecurity (CC) — free exam & training — covers Domains 1, 4, 7 deeply; excellent warm-up
- Community: r/cissp and the ISC2 Community — read the weekly "I passed" posts; they include real study breakdowns
Flashcards & Term-Matching Game
Active recall beats passive reading for long-term retention. Use the flashcards to drill definitions and the matching game to reinforce connections between concepts. Shuffle to mix domains and reset to start fresh. Keyboard navigation supported on flashcards.
Flashcard Deck — Key Terms
Loading flashcards… ensure JavaScript is enabled.
Term-Matching Game
Click a term on the left, then click its matching definition on the right. Correct pairs lock in green; wrong pairs flash red. Complete all pairs to advance to the next round.
Loading matching game… ensure JavaScript is enabled.
Speed Round — True or False
You have 10 seconds per statement. Answer TRUE or FALSE before the timer runs out. Build a combo multiplier for consecutive correct answers and beat your session high score.
Loading speed round… ensure JavaScript is enabled.
Fill in the Blank
Read the clue and type the missing term. One typo is forgiven for longer answers. Use the hint button if you're stuck — but it costs half the question's points.
Loading fill-in-the-blank… ensure JavaScript is enabled.
Domain Sprint — Categorise the Term
A term appears — click the correct exam domain it belongs to. Correct selections score 100 pts; wrong selections deduct 25 pts. Master domain knowledge before exam day.
Loading domain sprint… ensure JavaScript is enabled.
Explore other certification tracks
Practice Questions — CCSP
CCSP questions test cloud security architecture and operations judgment. Many questions present scenarios where multiple answers look correct — select the answer that addresses the most critical risk or applies the most comprehensive control.
1. An organisation is moving a regulated workload to a public cloud provider. Which control is MOST important for ensuring data sovereignty compliance?
2. In the cloud shared responsibility model for IaaS, which component is the cloud provider ALWAYS responsible for?
3. An organisation uses a multi-cloud strategy with workloads in AWS and Azure. Which cloud deployment model does this represent?
4. A security architect is designing a cloud key management strategy. Which approach provides the strongest protection against cloud provider access to customer data?
Practice Questions — SSCP
SSCP (Systems Security Certified Practitioner) is the technical practitioner-level ISC2 credential — designed for security operations, network security analysts, and system administrators with hands-on security responsibilities. Unlike CISSP, SSCP focuses on implementation rather than management.
1. A security analyst is reviewing firewall logs and notices repeated connection attempts from a single external IP on TCP ports 22, 3389, 445, and 5900. What does this activity MOST likely represent?
2. Which type of access control assigns permissions based on attributes of the user, resource, and environment (such as time of day or location)?
3. A user reports they cannot decrypt an email sent by a colleague. The colleague used PGP and confirms the email was correctly encrypted. What is the MOST likely cause?
4. A SOC analyst observes that a workstation is making DNS queries every 30 seconds to a domain with high entropy (random-looking characters). What does this BEST indicate?
5. Which authentication factor is BEST described by a hardware token generating a one-time password every 30 seconds?
Practice Questions — CSSLP
CSSLP (Certified Secure Software Lifecycle Professional) addresses secure SDLC across all phases. It is one of the few credentials specifically targeting application security architects, secure development lifecycle leaders, and software security engineers.
1. During requirements gathering for a new web application, the security team is conducting threat modelling. Which framework systematically identifies threats across Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege?
2. A development team must select tools for their secure SDLC pipeline. Which combination provides the MOST comprehensive coverage?
3. An application stores user passwords. Which storage approach is RECOMMENDED?
4. An application allows users to upload profile pictures. Which control set BEST prevents file upload attacks?
ISC2 Certification FAQ
How many questions are on the CISSP exam?
The CISSP uses Computerised Adaptive Testing (CAT). You will see between 125 and 175 questions in 4 hours. The exam stops when it is statistically confident you are above or below the passing standard. Receiving more questions is not an indicator of failure — many passing candidates answer all 175 questions.
Can I sit the CISSP exam before meeting the experience requirement?
Yes. You can take and pass the exam before you have the required five years of experience. Upon passing, you become an Associate of ISC2 and have six years to accumulate the required experience and earn endorsement from an ISC2 member. This is a popular path for career-changers and recent graduates entering security.
Is CCSP harder than CISSP?
Most candidates who have passed CISSP find CCSP comparable in difficulty but narrower in scope — it covers cloud security across six domains. Having CISSP first provides a significant foundation. Both use CAT format with 125–175 questions. CCSP requires three years of cumulative paid work experience in information technology with one year in cloud security.
What is the CISSP managerial mindset?
CISSP questions are designed to assess senior security management judgment. When you see multiple technically correct answers, select the one that a risk-informed senior security executive would choose — prioritising risk management, policy, and process over technical implementation. "Ensure policy exists" typically outranks "implement a technical control" on management-level questions.
Interactive Practice Exam — CISSP
Twenty CISSP-style items spanning all eight CBK domains. Each item is written in the "best/MOST appropriate" management style that CISSP rewards, with detailed rationale explaining the managerial mindset and authoritative references to NIST, ISO, IETF, and ISC2 source material.
Loading the interactive practice exam… If it does not load, ensure JavaScript is enabled.
Practice Exam #2 — CISSP
A second 20-question practice exam with all-new scenarios spanning all eight CISSP domains. Covers vendor risk assessment, data classification, Bell-LaPadula, TLS 1.3, SAML, forensic order of volatility, RTO/RPO, SQL injection, BGP hijacking, and more. Written in the 'MOST appropriate' management mindset CISSP rewards.
Loading practice exam… If it does not load, ensure JavaScript is enabled.
Real-World Walkthrough: The 2020 SolarWinds SUNBURST Supply-Chain Attack
SolarWinds is the textbook example of every CISSP domain converging in one incident — risk management, asset security, secure SDLC, identity federation, network architecture, security operations, and software supply-chain assurance. Use this incident to convert abstract CBK material into vivid mental models.
Timeline
- September 2019: Nation-state actors (US government attributes to APT29 / Cozy Bear / Russian SVR) gain access to SolarWinds' internal build environment.
- March – June 2020: SUNBURST malicious code is inserted into Orion Platform updates between builds 2019.4 HF5 and 2020.2.1 HF1. The compromise is invisible because the malicious DLL is digitally signed by SolarWinds' valid code-signing certificate — the trust anchor itself is poisoned.
- March – December 2020: ~18,000 customers install the trojanised update. Attackers selectively activate the backdoor against ~100 high-value targets (US Treasury, Commerce, State, DHS, FireEye, Microsoft, Mimecast, Cisco). They use forged SAML tokens (the Golden SAML technique) to mint authentication tokens against federated identity providers.
- December 8, 2020: FireEye discloses theft of its red-team tools and traces the intrusion to Orion. Investigation reveals the broader supply-chain compromise.
- 2021 onwards: Executive Order 14028 mandates Software Bills of Materials (SBOM) for federal procurement. NIST SP 800-218 (SSDF) becomes binding. Microsoft, CISA, and ISC2 publish post-mortems used in CISSP study material.
Map to CISSP CBK domains
- Domain 1 (Risk): Third-party / supply-chain risk was the entire attack surface. Vendor risk assessments must include build-pipeline integrity, not just SOC 2 reports.
- Domain 3 (Architecture): Trust anchors (code-signing certificates, root CAs) became the single point of failure. Defence in depth must NOT depend on any single trust source.
- Domain 4 (Network): SUNBURST used DNS-based C2 to subdomains of avsvmcloud.com — egress filtering, DNS sinkholing, and outbound proxying with categorisation would have blunted exfiltration.
- Domain 5 (Identity): Golden SAML forged tokens directly against ADFS. Mitigations: token issuer key in HSM, conditional access with device compliance, continuous token-issuance anomaly detection.
- Domain 6 (Assessment): Software composition analysis (SCA) and SBOM are now baseline expectations — Domain 8 also reinforces this.
- Domain 7 (Operations): The dwell time (months) exposed monitoring blind spots. Behavioural detection on identity providers, EDR with cloud-native telemetry, and threat-hunting programs are CISSP-grade controls.
- Domain 8 (SDLC): Build pipeline became the attack surface. SLSA framework, signed and reproducible builds, hermetic build environments, isolated build hosts, and separation of duties between developers and release engineers are direct lessons.
- Domain 2 (Asset): Inventory of every signed binary plus its provenance is essential to detect anomalous releases.
Study technique for CISSP: for every incident you read about, write three sentences mapping the technical detail to each CBK domain. The exam frequently asks "what would PREVENT this risk?" — train yourself to answer at the policy/governance/architecture layer first, technical control second.
Helpful Materials — CISSP
CISSP candidates routinely waste hundreds of hours on the wrong study material. Every resource below is free and authoritative — the most effective study combines official sources, free video, and a strong community.
Official & primary sources (all free)
- ISC2 CISSP exam outline — the authoritative blueprint (PDF download)
- NIST SP 800 series — risk, controls, IR, supply chain, IAM — freely downloadable PDFs; focus on 800-53 Rev 5, 800-61r2, 800-145
- NIST SP 800-53 Rev 5 control catalogue — the standard behind CISSP Domain 1 and 3 questions
- NIST SP 800-61r2 — Incident Response guide (free PDF)
- CISA free cybersecurity services and tools catalogue
Free video & audio
- Pete Zerger — YouTube domain mind-map reviews (free) — domain-by-domain deep dives, consistently rated top free CISSP resource
- Destination Certification — Rob Witcher's free YouTube CISSP playlist — concise concept explanations with visual mind maps
- Cybrary — Kelly Handerhan's CISSP course (free with account) — the managerial mindset explained by one of the most cited CISSP instructors
- r/cissp — "I passed" posts with real study breakdowns — read the top posts from the last year; candidates post which resources actually worked
Free practice questions
- ISC2 official CISSP self-assessment quiz (free, no signup) — official questions from ISC2 itself
- Quizlet CISSP community flashcard sets (free tier) — large community-maintained question banks covering all 8 CBK domains
- LearnZapp CISSP — 100 free sample questions
Free ISC2 entry credential
- ISC2 Certified in Cybersecurity (CC) — currently free exam and training — ISC2's free entry-level credential; excellent CISSP primer covering Domains 1, 4, 7
Process & eligibility
CISSP Cheatsheet
High-frequency CISSP facts. The exam is concept-heavy — these definitions repeat in many disguises.
Security models
- Bell-LaPadula — confidentiality; no read up, no write down (NRU / NWD).
- Biba — integrity; no read down, no write up (NRD / NWU).
- Clark-Wilson — integrity via well-formed transactions and separation of duties.
- Brewer-Nash (Chinese Wall) — prevents conflicts of interest.
- Take-Grant / Graham-Denning / Harrison-Ruzzo-Ullman — formal access-control models.
Risk management formulas
- Single Loss Expectancy (SLE) = Asset Value × Exposure Factor
- Annual Loss Expectancy (ALE) = SLE × Annualised Rate of Occurrence (ARO)
- Cost-benefit: control is worthwhile if (ALE before − ALE after) > annual cost of control
- Treatments: Avoid, Transfer, Mitigate, Accept
BIA & recovery objectives
- RPO — data-loss tolerance (past)
- RTO — time-to-restore (future)
- MTD / MTPD — maximum tolerable downtime / disruption
- WRT — work recovery time (after RTO, before normal)
Common evaluation criteria
- TCSEC (Orange Book) — historical, replaced by CC
- ITSEC — European predecessor
- Common Criteria (ISO/IEC 15408) — EAL1 (functionally tested) … EAL7 (formally verified design and tested)
- Protection Profile (PP) — class of products; Security Target (ST) — specific product
Identity protocols
- SAML 2.0 — XML assertions; SSO between IdP and SP
- OAuth 2.0 — delegated authorisation (NOT authentication)
- OpenID Connect (OIDC) — authentication layer on top of OAuth 2.0; uses ID Token (JWT)
- Kerberos — symmetric-key SSO; KDC, AS, TGS, TGT, ST
- SCIM — provisioning protocol
IR & BCP cycles
- IR (NIST SP 800-61): Preparation → Detection & Analysis → Containment / Eradication / Recovery → Post-incident
- BCP: Project init → BIA → Strategy → Plan dev → Test & maintain
- Change management: Request → Review → Approve → Test → Implement → Document → Review