CISSP Domain 3 Changes - 2018 vs 2015
When a comparison is done between the two exam outlines the overall result, in this case, would also be Extremely Limited.
The topics have just been moved here and there which hardly signifies any change.
2015 Exam Outline
|
2018 Exam Outline
|
Implement and manage engineering processes using secure design principles
|
Implement and manage engineering processes using secure design principles
|
Understand the fundamental concepts of security models (confidentiality, integrity )
|
Understand the fundamental concepts of security models
|
Select controls and countermeasures based upon systems security evaluation models
|
Select controls based upon systems security requirements
|
Understand security capabilities of information systems (e.g., memory protection, trusted platform module, interfaces, fault tolerance)
|
Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
# No Change in all of the above.
|
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
|
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
#Removed Large-Scale Parallel Data Systems. Added Cloud-based systems & Internet of Things. (Most books cover these topics, hence the limited change. IoT was covered under embedded devices topic in 2015 outline)
|
Assess and mitigate vulnerabilities in web-based systems
|
Assess and mitigate vulnerabilities in web-based systems
# No Change
|
Assess and mitigate vulnerabilities in mobile systems
|
Assess and mitigate vulnerabilities in mobile systems
# No Change
|
Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems (e.g., network-enabled devices, internet of things (IoT)
|
Assess and mitigate vulnerabilities in embedded devices
# No change. However, CISSP CBK may throw a surprise here.
|
Apply cryptography
|
Apply cryptography
# No Change
|
Apply secure principles to the site and facility design
|
Apply security principles to the site and facility design
# No Change
|
Design and Implement physical security
|
Implement site and facility security controls
# No Change
|
Comments
Post a Comment