(ISC)2 CISSP MindMaps 2015 (New CBK – Effective April 15, 2015)To support students preparing the (ISC)2 CISSP certification, I made a MindMap for each domain of the CBK using FreeMind v1.0. These files should be used in conjunction with the ISC2 Official Student Guide and the Official (ISC)²® Guide to the CISSP® CBK®, Fourth Edition.
Below you will find the Adobe Flash version to online visualization (requires Flash and JavaScript) and the FreeMind version (.mm) to be downloaded. Enjoy!
Domain Flash Version FrEEMIND VERSION
Domain 01. Security and Risk Management Download
Domain 02. Asset Security Download
Domain 03. Security Engineering Download
Domain 04. Communication and Network Security Download
Domain 05. Identity and Access Management Download
Domain 06. Security Assessment and Testing Download
Domain 07. Security Operations Download
Domain 08. Software Development Security Download
(ISC)2 CISSP MindMaps 2014 (Old CBK)
Domain Flash Version FreeMind Version Domain 01: Access Control Download Domain 02: Telecommunication and Network Security Download Domain 03: Information Security Governance and Risk Management Download Domain 04: Software Development Security Download Domain 05: Cryptography Download Domain 06: Security Architecture and Design Download Domain 07: Operations Security Download Domain 08: Business Continuity and Disaster Recovery Planning Download Domain 09: Legal Regulations Investigations and Compliance Download Domain 10: Physical (Environmental) Security Download -
Name Description Download Search.sh This is a VERY SIMPLE script in bash to find patterns using REGEX (Regular Expressions). It could be useful if you need to perform a credit card numbers search, for example. Feel free to modify and customize it according with your needs. Download SPICE Simple PCIDSS Information and Configuration Extractor (SPICE) is a VERY SIMPLE console-based program for Microsoft Windows operating systems, designed to collect and export configuration data related with PCI DSS controls, aiming to QSA, ISA or administrators to review it offline in order to validate the application of settings described in the system hardening standard (req. 2.2). It is portable and does not need neither installation nor additional software to run (DLL, installers, compilers or interpreters). It performs basic validation rutines in specific variables with fixed values (password lenght, password expiration, password complexity and so on) Download