cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
K65hn9
Viewer II

01 May 2021 CBK for cissp exam

When will be the books for the new exam outline available.
What are the possible references one should read regarding the updated CBK.
12 Replies
rslade
Influencer II

> sg2278 (Newcomer I) posted a new reply in CISSP Study Group on 02-10-2021 07:44

> I am having trouble reading this as a book.  I feel like each sentence I need
> to stop and make a flash card.

OK, that's not necessarily a bad thing. At least you know that it's working: the
book is worth it because it is challenging you.

I'm a wee bit concerned about you saying that you need to make flash cards.
That's not necessarily a bad thing: it could be the way that you learn, and it
definitely cements the material as you consider *how* to make a flash card. But
brute memorization isn't the point. Make sure that you are understanding the
fundamental concepts as you go. (And, possibly, making flash cards might be the
way to do that ...)

======================
rslade@gmail.com rmslade@outlook.com rslade@computercrime.org
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
"Robert Slade's Guide to Computer Viruses" 0-387-94663-2
"Viruses Revealed" 0-07-213090-3
"Software Forensics" 0-07-142804-6
"Dictionary of Information Security" Syngress 1-59749-115-2
"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
CISSP refs: [Base URL]mnbksccd.htm
PC Security: [Base URL]mnvrrvsc.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
[Base URL]review.htm
Partial/recent: http://groups.yahoo.com/group/techbooks/
http://en.wikipedia.org/wiki/Robert_Slade
https://is.gd/RotlWB http://twitter.com/rslade
http://blogs.securiteam.com/index.php/archives/author/p1/

............

Other posts: https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413

This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468
Mario60540
Newcomer I

 
sg2278
Newcomer II

Mario,

 

Thank you.  You are correct.  After I thought about your answer I adjusted my thinking.  Instead of reading a sentence, paragraph, and chapter and going over every scenario that I thought they could ask a question about the content instead I asked what is the overall concept of that paragraph.  What is the main point/concept being made. 

 

I was also comparing protocols and devices used at the OSI layers from different books.  I decided to go with
"The Official (ISC)2 CISSP CBK Reference) 5th ed.  I like how this book includes the attack vectors common for each layer. 

 

If you have some questions on the OSI model layers that firewalls fit into:

 

Application Firewalls is layer 7 Application Layer

Application Firewalls could also be called Proxies "Forward and Reverse Proxies"

 

Stateful filtering firewall Layer 5

 

Packet filtering firewall is Layer 3

 

Layer 5 and Layer 7 are proxy because they can block. 

two types of Proxy Firewalls Circuit level (layer 5) and Application (Layer 7)

 

Is the above correct or do I need to go back and reread? 

 

Is there a difference between Circuit level proxy and Circuit layer firewall?

 

Thank you for any help / guidance