Blog Archive

Multiple Readers have come back asking me to create a ready reckoner for the various topics which I have written. So here it is, an easy way to find out the various topics written by me. These topics have been grouped under the various CISSP or SSCP domains / Series / Opinions so that it is easy for
you to choose from.

If you have any feedback or want me to write about certain specific topics, drop me an email - at learningwithmayur@gmail.com.

Happy Learning :)

Exam Topics / Course Content

Domain 1: Security and Risk Management

1. What is CIA? -- https://www.mayurpahwa.com/2017/07/what-is-cia.html






7. Identification, Authentication, Authorization, and Accountability - https://www.mayurpahwa.com/2018/06/identification-authentication.html




Domain 2: Asset Security 


Domain 3: Security Architecture & Engineering 

1. Understanding Cryptography:  https://www.mayurpahwa.com/2018/12/understanding-cryptography.html

2. Symmetric and Asymmetric Cryptography: https://www.mayurpahwa.com/2018/12/symmetric-and-asymmetric-cryptography.html

3. Hybrid Cryptography: https://www.mayurpahwa.com/2018/12/hybrid-cryptography.html

4. Digital Signature: https://www.mayurpahwa.com/2019/01/digital-signature.html






10. Holy Grail of Cryptography - Homomorphic Encryption: https://www.mayurpahwa.com/2021/05/holy-grail-of-cryptography-homomorphic.html



Domain 4: Communication and Network Security

1. Understanding TCP & UDP - https://www.mayurpahwa.com/2018/10/understanding-tcp-udp.html

2. The TCP Handshake - https://www.mayurpahwa.com/2018/10/the-tcp-handshake.html

3. Asynchronous & Synchronous Communication - https://www.mayurpahwa.com/2018/10/asynchronous-synchronous-communication.html

4. Understanding NAT – Network Address Translation - https://www.mayurpahwa.com/2018/11/understanding-nat-network-address.html

5. Network Segmentation and Segregation: https://www.mayurpahwa.com/2019/07/network-segmentation-and-segregation.html

6. The Do’s and Don’ts of a Firewall:  https://www.mayurpahwa.com/2019/06/the-dos-and-donts-of-firewall.html

7. It’s the Middleman – Proxy Firewall:  https://www.mayurpahwa.com/2019/04/its-middleman-proxy-firewall.html

8. Which State are you in? I’m Stateful:  https://www.mayurpahwa.com/2019/04/which-state-are-you-in-im-stateful.html

9. This One is all about Packets: https://www.mayurpahwa.com/2019/03/this-one-is-all-about-packets.html

10. The Curious Case of Firewalls:  https://www.mayurpahwa.com/2019/03/the-curious-case-of-firewalls.html

Domain 5: Identity and Access Management

1. Access Control Models - DAC, MAC, RBAC, Rule Based & ABAC -- https://www.mayurpahwa.com/2018/08/access-control-models-dac-mac-rbac-rule.html

2. Single Sign-On & Kerberos -- https://www.mayurpahwa.com/2018/09/single-sign-on-kerberos.html

3. Understanding Security Modes - Dedicated, System high, Compartmented, Multilevel - https://www.mayurpahwa.com/2018/10/understanding-security-modes-dedicated.html

4. Crime Prevention through Environmental Design (CPTED) Approach:  https://www.mayurpahwa.com/2019/03/crime-prevention-through-environmental_16.html

Domain 6: Security Assessment and Testing

Domain 7: Security Operations


Domain 8: Software Development Security


CCSP / CCSK Exam 

Domain 1 – Cloud Computing Concepts and Architecture




Domain 2 – Governance and Enterprise Risk Management



Domain 3 – Legal Issues, Contracts and Electronic Discovery

Domain 4 – Compliance and Audit Management

Domain 5 – Information Governance

Domain 6 – Management Plane and Business Continuity

Domain 7 – Infrastructure Security

Domain 8 – Virtualization and Containers

Domain 9 – Incident Response

Domain 10 – Application Security

Domain 11 – Data Security and Encryption

Domain 12 – Identity, Entitlement, and Access Management

Domain 13 – Security as a Service

Domain 14 – Related Technologies

CISSP - General 


2.  How to Pass the CISSP Exam in First Attempt--    https://www.mayurpahwa.com/2017/06/how-to-pass-cissp-exam-in-first-attempt.html



5. Launch of CISSP Computerized Adaptive Testing (CAT) --  https://www.mayurpahwa.com/2017/12/launch-of-cissp-computerized-adaptive.html


8. CISSP Domain 2 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-2-changes-2018-vs-2015.html

9. CISSP Domain 3 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-3-changes-2018-vs-2015.html

10. CISSP Domain 4 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-4-changes-2018-vs-2015.html

11. CISSP Domain 5 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-5-changes-2018-vs-2015.html

12. CISSP Domain 6 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-6-changes-2018-vs-2015.html

13. CISSP Domain 7 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-7-changes-2018-vs-2015.html

14. CISSP Domain 8 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/05/cissp-domain-8-changes-2018-vs-2015.html

15. The Endorsement Process - CISSP, SSCP & other (ISC)2 certifications: https://www.mayurpahwa.com/2019/06/the-endorsement-process-cissp-sscp.html

SSCP - General 


2.  How to Pass SSCP Exam in the First Attempt -- https://www.mayurpahwa.com/2017/08/how-to-pass-sscp-exam-in-first-attempt.html

CyberSecurity Awareness Series

1. The Free Gift - ( Based on installing malicious software ) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-free-gift.html

2. Token of Thanks - ( Based on data theft through USB) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-token-of.html

3. The Limited Time Offer - ( Based on Smishing/ Phishing) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-limited.html


5. The Delay -- ( Based on delay in access revocation) - https://www.mayurpahwa.com/2018/02/cyber-security-awareness-series-delay.html

6. Your Credentials, Your Identity - ( Based on Sharing of Password/ Credentials) - https://www.mayurpahwa.com/2018/02/cyber-security-awareness-series-your.html

7. The Other Side - ( Based on Cyberbullying) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-other.html

8. The Whistle Man - ( Based on the Importance of Security Guard ) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-whistle.html

9.  The Fault In Our Code - ( Based on Application Security) - https://www.mayurpahwa.com/2018/03/cyber-security-awareness-series-fault.html

10. I Will Always Remember You - ( If you share something on Internet / Social Media, it remains forever) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-i-will.html

11. When George Got Whaled - ( Based on Whaling Attack) - https://www.mayurpahwa.com/2018/10/cybersecurity-awareness-series-when.html

12. The Three Little Pigs - ( Impact on business) - https://www.mayurpahwa.com/2019/10/cybersecurity-awareness-series-three.html

13. The VEC Scam - ( Phishing) - https://www.mayurpahwa.com/2019/10/cybersecurity-awareness-series-vec-scam.html

Cloud Security (General)

1. How the Cloud Service Models are Similar to Baking a Cake - https://www.mayurpahwa.com/2019/09/how-cloud-service-models-are-similar-to.html

Privacy 

1. Understanding Privacy - https://www.mayurpahwa.com/2019/09/understanding-privacy.html

General Articles

1. The Spectre of Intel’s (Past) Meltdown - ( Based on vulnerabilities codenamed “Meltdown” & “Spectre” ) - https://www.mayurpahwa.com/2018/01/the-spectre-of-intels-past-meltdown.html


3. The New Age of Social Engineering - https://www.mayurpahwa.com/2018/02/the-new-age-of-social-engineering.html

4. Take Control of Your Data - https://www.mayurpahwa.com/2018/04/take-control-of-your-data-part-1_4.html

5. Top IT Security Certifications 2018 - https://www.mayurpahwa.com/2018/04/top-it-security-certifications-2018.html

6. 8 Important Cybersecurity lessons to learn from Avengers - https://www.mayurpahwa.com/2018/05/8-important-cybersecurity-lessons-to.html

7. Security Risk Assessment in The Internet of Things - https://www.mayurpahwa.com/2018/05/security-risk-assessment-in-internet-of.html

8. Understanding the GDPR: General Data Protection Regulation - https://www.mayurpahwa.com/2018/07/understanding-gdpr-general-data.html

9. Understanding Blockchain - https://www.mayurpahwa.com/2019/01/understanding-blockchain-part-1.html

10. Building Blocks of Blockchain: https://www.mayurpahwa.com/2019/01/building-blocks-of-blockchain-part-2.html

11. What is DevSecOps? Defined, Explained & Explored - https://www.mayurpahwa.com/2019/06/what-is-devsecops-defined-explained.html

12. These Three Technologies hold the Power to Transform Cyber Security:  https://www.mayurpahwa.com/2019/06/these-three-technologies-hold-power-to.html

13. CyberSecurity @ Airports:  https://www.mayurpahwa.com/2019/06/cybersecurity-airports.html






You may also like to read...

Identification, Authentication, Authorization, and Accountability

Access Control Models - DAC, MAC, RBAC , Rule Based & ABAC

How to Pass SSCP Exam in the First Attempt

Understanding Security Modes - Dedicated , System high, Compartmented , Multilevel

Cloud Computing - The Logical Model