CISSP Domain 1 Changes - 2018 vs 2015
The new exam outline has been released by (ISC)2 for the CISSP exam. I will be evaluating each domain of the 2015 & 2018 exam outline and would present you a point by point change in the course content.
New Course Content which has added in the 2018 edition will be added in the form of posts on the blog.
Here is the overall result in Domain 1: Extremely Limited Change
2015 Exam Outline
|
2018 Exam Outline
|
Understand and apply concepts of confidentiality, integrity and availability
|
Understand and apply concepts of confidentiality, integrity and availability
# No Change
|
Apply security governance principles through
|
Evaluate and apply security governance principles
# Focus now on Security Control frameworks. Due care & Due Diligence separately mentioned now.
|
Compliance
|
Determine compliance requirements
# No Change
|
Understand legal and regulatory issues that pertain to information security in a global context
|
Understand legal and regulatory issues that pertain to information security in a global context
#No Change
|
Understand professional ethics
|
Understand, adhere to, and promote professional ethics
#No Change
|
Develop, document, and implement security policy, standards, procedures, and guidelines
|
Develop, document, and implement security policy, standards, procedures, and guidelines
#No Change
|
Understand Business continuity requirements
|
Identify, analyze, and prioritize Business Continuity (BC) requirements
# No Change.
|
Contribute to personnel security policies
|
Contribute to and enforce personnel security policies and procedures
# No Change
|
Understand and apply risk management concepts
|
Understand and apply risk management concepts
# No Change
|
Understand and apply threat modeling
|
Understand and apply threat modeling concepts and methodologies
# Change is limited. The focus area remains the same. CISSP CBK 2018 can highlight newer concepts.
|
Integrate security risk considerations into acquisition strategy and practice
|
Apply risk-based management concepts to the supply chain
#Overall no change. Focus on Risks in 1st point.
|
Establish and manage information security education, training, and awareness
|
Establish and maintain a security awareness, education, and training program
# Evaluation of the effectiveness of the security program is a (welcome) addition.
|
Comments
Post a Comment