CISSP exam – Domain II // Asset Security

The second domain according to the CISSP 2015 exam outline I approached during my CISSP exam preparation study is called ‘Asset Security‘. The Asset Security domain focuses on collecting, handling, and protecting information throughout its life cycle. Personally Identifiable Information (PII) is any information that can identify an individual. NIST published a guide that describes in detail the…

Read More

CISSP exam – Domain I // Security and Risk Management

The first domain according to the CISSP 2015 exam outline I approached during my CISSP exam preparation study is called ‘Security and Risk Management‘ (CISSP 2012: Information Security Governance and Risk Management). This “new” domain covers two of the domains of the CISSP 2012 exam: Information Security Governance & Risk Management (1) Legal, Regulations, Investigations and Compliance…

Read More

Webinar: Certifications that Matter: Passing the CISSP

SANS has held another webcast on October 8th, 2015 about Passing the CISSP certification. Time: Thursday, October 08, 2015, 19:00 (UTC) Overview: Having an extra certification or two can’t hurt, but investing valuable time and money can – unless the certification pays off. The CISSP certification does. Cyber-security professionals who earn the industry’s most acclaimed certification earn up to 15%…

Read More

CISSP prep in 60 days – That’s my goal

My summer goal for 2015 is to achieve the CISSP certification (Certified Information Systems Security Professional) governed by the (isc)2 consortium. They claim that the CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to…

Read More

My way to the EnCE certification

The EnCE certification (EnCase Certified Examiner) is owned by Guidance Software and is based on their forensic software EnCase, currently available in version 7. The certification is available for both public and private sector investigators. The certification proves, that you have understood and mastered the guidelines of computer investigation methodologies in combination with the use of…

Read More