Blog Archive

you to choose from.
If you have any feedback or want me to write about certain specific topics, drop me an email - at learningwithmayur@gmail.com.
Happy Learning :)
Exam Topics / Course Content
Domain 1: Security and Risk Management1. What is CIA? -- https://www.mayurpahwa.com/2017/07/what-is-cia.html
2. Understanding Vulnerability, Threat & Risk -- https://www.mayurpahwa.com/2018/05/understanding-vulnerability-threat-risk.html
3. Understanding Risk Assessment -- https://www.mayurpahwa.com/2018/05/understanding-risk-assessment_19.html
4. Demystifying Risk Management -- https://www.mayurpahwa.com/2018/05/demystifying-risk-management.html
5. Risk Analysis Approaches -- https://www.mayurpahwa.com/2018/05/risk-analysis-approaches.html
6. Risk Assessment Methodology -- https://www.mayurpahwa.com/2018/05/risk-assessment-methodology.html
7. Identification, Authentication, Authorization, and Accountability - https://www.mayurpahwa.com/2018/06/identification-authentication.html
8. How to write a Security Policy? : https://www.mayurpahwa.com/2022/07/security-policy-how-to-write-one.html
Domain 2: Asset Security
Domain 3: Security Architecture & Engineering
1. Understanding Cryptography: https://www.mayurpahwa.com/2018/12/understanding-cryptography.html
2. Symmetric and Asymmetric Cryptography: https://www.mayurpahwa.com/2018/12/symmetric-and-asymmetric-cryptography.html
3. Hybrid Cryptography: https://www.mayurpahwa.com/2018/12/hybrid-cryptography.html
4. Digital Signature: https://www.mayurpahwa.com/2019/01/digital-signature.html
1. Understanding Cryptography: https://www.mayurpahwa.com/2018/12/understanding-cryptography.html
2. Symmetric and Asymmetric Cryptography: https://www.mayurpahwa.com/2018/12/symmetric-and-asymmetric-cryptography.html
3. Hybrid Cryptography: https://www.mayurpahwa.com/2018/12/hybrid-cryptography.html
4. Digital Signature: https://www.mayurpahwa.com/2019/01/digital-signature.html
5. Block Ciphers Part 1: https://www.mayurpahwa.com/2020/01/block-ciphers-mode-of-operation-part-1.html
6. Block Ciphers Part 2: https://www.mayurpahwa.com/2020/01/block-ciphers-mode-of-operation-part-2.html
7. What is Public Key Infrastructure: https://www.mayurpahwa.com/2020/04/what-is-public-key-infrastructure-pki.html
8. The Workings of PKI: https://www.mayurpahwa.com/2020/04/the-workings-of-pki.html
9. Understanding the Trusted Platform Module: https://www.mayurpahwa.com/2020/04/understanding-trusted-platform-module.html
10. Holy Grail of Cryptography - Homomorphic Encryption: https://www.mayurpahwa.com/2021/05/holy-grail-of-cryptography-homomorphic.html
11. The Birthday Paradox: https://www.mayurpahwa.com/2020/01/understanding-birthday-paradox.html
12. Cryptographic Hash Explained: https://www.mayurpahwa.com/2020/01/cryptographic-hash-function-explained.html
Domain 4: Communication and Network Security
1. Understanding TCP & UDP - https://www.mayurpahwa.com/2018/10/understanding-tcp-udp.html
2. The TCP Handshake - https://www.mayurpahwa.com/2018/10/the-tcp-handshake.html
3. Asynchronous & Synchronous Communication - https://www.mayurpahwa.com/2018/10/asynchronous-synchronous-communication.html
4. Understanding NAT – Network Address Translation - https://www.mayurpahwa.com/2018/11/understanding-nat-network-address.html
5. Network Segmentation and Segregation: https://www.mayurpahwa.com/2019/07/network-segmentation-and-segregation.html
6. The Do’s and Don’ts of a Firewall: https://www.mayurpahwa.com/2019/06/the-dos-and-donts-of-firewall.html
7. It’s the Middleman – Proxy Firewall: https://www.mayurpahwa.com/2019/04/its-middleman-proxy-firewall.html
8. Which State are you in? I’m Stateful: https://www.mayurpahwa.com/2019/04/which-state-are-you-in-im-stateful.html
9. This One is all about Packets: https://www.mayurpahwa.com/2019/03/this-one-is-all-about-packets.html
10. The Curious Case of Firewalls: https://www.mayurpahwa.com/2019/03/the-curious-case-of-firewalls.html
Domain 5: Identity and Access Management
1. Access Control Models - DAC, MAC, RBAC, Rule Based & ABAC -- https://www.mayurpahwa.com/2018/08/access-control-models-dac-mac-rbac-rule.html
2. Single Sign-On & Kerberos -- https://www.mayurpahwa.com/2018/09/single-sign-on-kerberos.html
3. Understanding Security Modes - Dedicated, System high, Compartmented, Multilevel - https://www.mayurpahwa.com/2018/10/understanding-security-modes-dedicated.html
4. Crime Prevention through Environmental Design (CPTED) Approach: https://www.mayurpahwa.com/2019/03/crime-prevention-through-environmental_16.html
1. Understanding TCP & UDP - https://www.mayurpahwa.com/2018/10/understanding-tcp-udp.html
2. The TCP Handshake - https://www.mayurpahwa.com/2018/10/the-tcp-handshake.html
3. Asynchronous & Synchronous Communication - https://www.mayurpahwa.com/2018/10/asynchronous-synchronous-communication.html
4. Understanding NAT – Network Address Translation - https://www.mayurpahwa.com/2018/11/understanding-nat-network-address.html
5. Network Segmentation and Segregation: https://www.mayurpahwa.com/2019/07/network-segmentation-and-segregation.html
6. The Do’s and Don’ts of a Firewall: https://www.mayurpahwa.com/2019/06/the-dos-and-donts-of-firewall.html
7. It’s the Middleman – Proxy Firewall: https://www.mayurpahwa.com/2019/04/its-middleman-proxy-firewall.html
8. Which State are you in? I’m Stateful: https://www.mayurpahwa.com/2019/04/which-state-are-you-in-im-stateful.html
9. This One is all about Packets: https://www.mayurpahwa.com/2019/03/this-one-is-all-about-packets.html
10. The Curious Case of Firewalls: https://www.mayurpahwa.com/2019/03/the-curious-case-of-firewalls.html
Domain 5: Identity and Access Management
1. Access Control Models - DAC, MAC, RBAC, Rule Based & ABAC -- https://www.mayurpahwa.com/2018/08/access-control-models-dac-mac-rbac-rule.html
2. Single Sign-On & Kerberos -- https://www.mayurpahwa.com/2018/09/single-sign-on-kerberos.html
3. Understanding Security Modes - Dedicated, System high, Compartmented, Multilevel - https://www.mayurpahwa.com/2018/10/understanding-security-modes-dedicated.html
4. Crime Prevention through Environmental Design (CPTED) Approach: https://www.mayurpahwa.com/2019/03/crime-prevention-through-environmental_16.html
Domain 6: Security Assessment and Testing
Domain 7: Security Operations
1. The TOCTOU Attack: https://www.mayurpahwa.com/2021/06/the-tocttou-attack.html
Domain 8: Software Development Security
CCSP / CCSK Exam
Domain 1 – Cloud Computing Concepts and Architecture
1. Defining Cloud Computing: https://www.mayurpahwa.com/2020/06/defining-cloud-computing.html
2. Abstraction & Orchestration in the Cloud: https://www.mayurpahwa.com/2020/06/abstraction-and-orchestration-in-cloud.html
3. Cloud Computing - The Logical Model: https://www.mayurpahwa.com/2020/07/cloud-computing-logical-model.html
Domain 2 – Governance and Enterprise Risk Management
1. Governance & Risk Management in the Cloud: https://www.mayurpahwa.com/2021/01/governance-risk-management-in-cloud.html
2. Data Security Life Cycle 2.0: https://www.mayurpahwa.com/2021/06/data-security-lifecycle-20.html
Domain 3 – Legal Issues, Contracts and Electronic Discovery
Domain 4 – Compliance and Audit Management
Domain 5 – Information Governance
Domain 6 – Management Plane and Business Continuity
Domain 7 – Infrastructure Security
Domain 8 – Virtualization and Containers
Domain 9 – Incident Response
Domain 10 – Application Security
Domain 11 – Data Security and Encryption
Domain 12 – Identity, Entitlement, and Access Management
Domain 13 – Security as a Service
Domain 14 – Related Technologies
CISSP - General
1. Quick Tips for the CISSP exam-- https://www.mayurpahwa.com/2017/06/quick-tips-for-cissp-exam.html
2. How to Pass the CISSP Exam in First Attempt-- https://www.mayurpahwa.com/2017/06/how-to-pass-cissp-exam-in-first-attempt.html
3. CISSP vs SSCP Exam -- https://www.mayurpahwa.com/2017/07/cissp-vs-sscp-certification.html
4. What to expect in CISSP exam? -- https://www.mayurpahwa.com/2017/08/what-to-expect-in-cissp-exam.html
5. Launch of CISSP Computerized Adaptive Testing (CAT) -- https://www.mayurpahwa.com/2017/12/launch-of-cissp-computerized-adaptive.html
6. The CISSP CAT Exam Experience -- https://www.mayurpahwa.com/2018/02/the-cissp-cat-exam-experience.html
7. CISSP Domain 1 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-1-changes-2018-vs-2015.html
7. CISSP Domain 1 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-1-changes-2018-vs-2015.html
8. CISSP Domain 2 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-2-changes-2018-vs-2015.html
9. CISSP Domain 3 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-3-changes-2018-vs-2015.html
10. CISSP Domain 4 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-4-changes-2018-vs-2015.html
11. CISSP Domain 5 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-5-changes-2018-vs-2015.html
12. CISSP Domain 6 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-6-changes-2018-vs-2015.html
13. CISSP Domain 7 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/04/cissp-domain-7-changes-2018-vs-2015.html
14. CISSP Domain 8 Changes - 2018 vs 2015 -- https://www.mayurpahwa.com/2018/05/cissp-domain-8-changes-2018-vs-2015.html
15. The Endorsement Process - CISSP, SSCP & other (ISC)2 certifications: https://www.mayurpahwa.com/2019/06/the-endorsement-process-cissp-sscp.html
SSCP - General
1. Quick Tips for SSCP Exam -- https://www.mayurpahwa.com/2017/07/quick-tips-for-sscp-exam.html
2. How to Pass SSCP Exam in the First Attempt -- https://www.mayurpahwa.com/2017/08/how-to-pass-sscp-exam-in-first-attempt.html
3. What to expect in SSCP exam? -- https://www.mayurpahwa.com/2017/08/what-to-expect-in-sscp-exam.html
CyberSecurity Awareness Series
1. The Free Gift - ( Based on installing malicious software ) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-free-gift.html
2. Token of Thanks - ( Based on data theft through USB) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-token-of.html
3. The Limited Time Offer - ( Based on Smishing/ Phishing) - https://www.mayurpahwa.com/2018/01/cybersecurity-awareness-series-limited.html
4. The Magic Card - ( Based on ATM fraud) - https://www.mayurpahwa.com/2018/01/cyber-security-awareness-series-magic.html
5. The Delay -- ( Based on delay in access revocation) - https://www.mayurpahwa.com/2018/02/cyber-security-awareness-series-delay.html
6. Your Credentials, Your Identity - ( Based on Sharing of Password/ Credentials) - https://www.mayurpahwa.com/2018/02/cyber-security-awareness-series-your.html
7. The Other Side - ( Based on Cyberbullying) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-other.html
8. The Whistle Man - ( Based on the Importance of Security Guard ) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-whistle.html
9. The Fault In Our Code - ( Based on Application Security) - https://www.mayurpahwa.com/2018/03/cyber-security-awareness-series-fault.html
10. I Will Always Remember You - ( If you share something on Internet / Social Media, it remains forever) - https://www.mayurpahwa.com/2018/03/cybersecurity-awareness-series-i-will.html
11. When George Got Whaled - ( Based on Whaling Attack) - https://www.mayurpahwa.com/2018/10/cybersecurity-awareness-series-when.html
12. The Three Little Pigs - ( Impact on business) - https://www.mayurpahwa.com/2019/10/cybersecurity-awareness-series-three.html
11. When George Got Whaled - ( Based on Whaling Attack) - https://www.mayurpahwa.com/2018/10/cybersecurity-awareness-series-when.html
12. The Three Little Pigs - ( Impact on business) - https://www.mayurpahwa.com/2019/10/cybersecurity-awareness-series-three.html
Cloud Security (General)
1. How the Cloud Service Models are Similar to Baking a Cake - https://www.mayurpahwa.com/2019/09/how-cloud-service-models-are-similar-to.htmlPrivacy
1. Understanding Privacy - https://www.mayurpahwa.com/2019/09/understanding-privacy.htmlGeneral Articles
1. The Spectre of Intel’s (Past) Meltdown - ( Based on vulnerabilities codenamed “Meltdown” & “Spectre” ) - https://www.mayurpahwa.com/2018/01/the-spectre-of-intels-past-meltdown.html
2. Your Own Fingerprint could be your Enemy - https://www.mayurpahwa.com/2018/02/your-own-fingerprint-could-be-your-enemy.html
3. The New Age of Social Engineering - https://www.mayurpahwa.com/2018/02/the-new-age-of-social-engineering.html
4. Take Control of Your Data - https://www.mayurpahwa.com/2018/04/take-control-of-your-data-part-1_4.html
5. Top IT Security Certifications 2018 - https://www.mayurpahwa.com/2018/04/top-it-security-certifications-2018.html
6. 8 Important Cybersecurity lessons to learn from Avengers - https://www.mayurpahwa.com/2018/05/8-important-cybersecurity-lessons-to.html
7. Security Risk Assessment in The Internet of Things - https://www.mayurpahwa.com/2018/05/security-risk-assessment-in-internet-of.html
8. Understanding the GDPR: General Data Protection Regulation - https://www.mayurpahwa.com/2018/07/understanding-gdpr-general-data.html
9. Understanding Blockchain - https://www.mayurpahwa.com/2019/01/understanding-blockchain-part-1.html
10. Building Blocks of Blockchain: https://www.mayurpahwa.com/2019/01/building-blocks-of-blockchain-part-2.html
11. What is DevSecOps? Defined, Explained & Explored - https://www.mayurpahwa.com/2019/06/what-is-devsecops-defined-explained.html
12. These Three Technologies hold the Power to Transform Cyber Security: https://www.mayurpahwa.com/2019/06/these-three-technologies-hold-power-to.html
13. CyberSecurity @ Airports: https://www.mayurpahwa.com/2019/06/cybersecurity-airports.html
4. Take Control of Your Data - https://www.mayurpahwa.com/2018/04/take-control-of-your-data-part-1_4.html
5. Top IT Security Certifications 2018 - https://www.mayurpahwa.com/2018/04/top-it-security-certifications-2018.html
6. 8 Important Cybersecurity lessons to learn from Avengers - https://www.mayurpahwa.com/2018/05/8-important-cybersecurity-lessons-to.html
7. Security Risk Assessment in The Internet of Things - https://www.mayurpahwa.com/2018/05/security-risk-assessment-in-internet-of.html
8. Understanding the GDPR: General Data Protection Regulation - https://www.mayurpahwa.com/2018/07/understanding-gdpr-general-data.html
9. Understanding Blockchain - https://www.mayurpahwa.com/2019/01/understanding-blockchain-part-1.html
10. Building Blocks of Blockchain: https://www.mayurpahwa.com/2019/01/building-blocks-of-blockchain-part-2.html
11. What is DevSecOps? Defined, Explained & Explored - https://www.mayurpahwa.com/2019/06/what-is-devsecops-defined-explained.html
12. These Three Technologies hold the Power to Transform Cyber Security: https://www.mayurpahwa.com/2019/06/these-three-technologies-hold-power-to.html
13. CyberSecurity @ Airports: https://www.mayurpahwa.com/2019/06/cybersecurity-airports.html
14: Zero Trust Architecture: https://www.mayurpahwa.com/2020/07/zero-trust-model-present-necessity.html
15. Cryptoshredding & Right to be Forgotten: https://www.mayurpahwa.com/2021/06/crypto-shredding-is-not-panacea-for.html
16. Horizon Scanning - A beginner's Guide: https://www.mayurpahwa.com/2021/06/horizon-scanning-beginners-guide.html
17. The Must Have Skills for Cybersecurity: https://www.mayurpahwa.com/2022/07/the-must-have-skills-for-cybersecurity.html
18. Email Best Practices: https://www.mayurpahwa.com/2019/10/6-best-practices-for-email-security.html
19. Tips for Preventing Ransomware: https://www.mayurpahwa.com/2019/10/dont-be-held-for-ransom-tips-for.html