All 8 domains covered in depth. Practice questions, cheat sheets, and flashcards — aligned to the official ISC² exam outline and Sybex Study Guide. Free, forever.
| # | Domain | Weight | Distribution |
|---|---|---|---|
| D1 | Security & Risk Management | 16% | |
| D2 | Asset Security | 10% | |
| D3 | Security Architecture & Engineering | 13% | |
| D4 | Communication & Network Security | 13% | |
| D5 | Identity & Access Management (IAM) | 13% | |
| D6 | Security Assessment & Testing | 12% | |
| D7 | Security Operations | 13% | |
| D8 | Software Development Security | 10% |
The largest domain. Covers foundational security concepts, risk frameworks, legal/regulatory compliance, personnel security, and business continuity. Think like a CISO.
▲ 16% of exam · Updated 2024The three foundational pillars of information security.
Identifying, assessing and responding to risks using qualitative or quantitative methods.
Aligning security with business strategy through policies, standards, and oversight.
Planning to maintain business operations during and after a significant disruption.
Laws, regulations, IP frameworks, and the ISC² Code of Ethics.
People-focused controls from hiring through termination to reduce insider threats.
Classifying information, determining ownership, handling data throughout its lifecycle, and applying appropriate protection measures.
10% of examLabeling data based on sensitivity to determine protection levels.
Roles and responsibilities for managing data throughout its lifecycle.
The three states data exists in and appropriate protection for each.
Methods for permanently and verifiably destroying data.
Protecting personal information in compliance with global privacy regulations.
Secure design principles, security models, cryptography, physical security, and vulnerability assessment. The most technically deep domain.
13% of examCore principles every security architect must apply.
Formal frameworks defining rules for access control and data protection.
Symmetric, asymmetric, and hashing algorithms — the backbone of security.
Infrastructure for managing digital certificates and public/private key pairs.
Protecting physical assets, facilities, and personnel.
Network architecture, protocols, secure communications, and protection against network attacks. Know the OSI model cold.
13% of examLayered networking models that define how data moves across networks.
Wireless protocols from WEP (broken) to WPA3 (current standard).
Systems that monitor network traffic to detect and optionally block attacks.
Common attacks targeting network infrastructure and communications.
Essential ports every CISSP candidate must know.
How users, devices, and services are identified, authenticated, and granted access. The first line of defense.
13% of examThe three fundamental steps of access control.
The categories of evidence used to prove identity.
Frameworks governing how access decisions are made.
Using physical or behavioral characteristics for authentication.
Technologies enabling single sign-on and cross-org identity trust.
Validating security controls through assessments, audits, vulnerability scanning, penetration testing, and logging.
12% of examTwo complementary approaches to finding security weaknesses.
Quantitative measures to track security program effectiveness.
Formal evaluations of security controls, policies, and compliance.
Structured adversarial exercises to test and improve security.
Day-to-day management: incident response, disaster recovery, change management, and investigations. The most procedural domain.
13% of examThe structured 6-phase NIST SP 800-61 incident response process.
Scientifically collecting digital evidence for legal proceedings.
Technical plans to restore IT systems after a disaster.
Centralized team monitoring and responding to security events 24/7.
Integrating security throughout the SDLC. Secure coding, software vulnerabilities, and third-party software security.
▼ 10% of exam · Updated 2024Embedding security at every phase of the development lifecycle.
The most prevalent and dangerous software security weaknesses.
Application security testing methodologies.
Integrating security into DevOps CI/CD pipelines.