CISSP Domain Changes for 2015

CISSP Domain Changes for 2015

CISSP Domain Changes for 2015

CISSP Domain Changes for 2015

The number of domains are being reduced from ten to eight with some exciting adaptations.  It is important that the content of any certification is updated to be inline with real-world scenarios.  Last updated was in 2012 and 2015 is some major changes.  Changes in 2012 was minimal and reflected more on the naming and the weight and importance of the domains.  Here is the table with CISSP Domain Changes for 2015  with 2012 as a reference as well as some personal observations.

#20122015
1Access ControlSecurity and Risk Management
2Telecommunications and Network SecurityAsset Security
3Information Security Governance and Risk ManagementSecurity Engineering
4Software Development SecurityCommunication and N...
Read More

CISSP Boot Camp – March 2015

CISSP Boot Camp – March 2015

Time to up your personal marketability by obtaining a certification in your field.

Join me for a long term evolution on your career. Knowledge is a journey that has to be tackled everyday.   When I wrote my CISSP exam in 1997 there were very few books available to help with studies.

We will be running a instructor led CISSP Boot Camp with online lectures before and after the course with mentoring of students along the way.  This is a longterm relationship going past the boundaries of being just a student.

If you are keen to get up and running visit our CISSP information page and register at the old price and become part of the the evolution of your career.  We will have the following for old and new:

  1. Access to the eLearning site, including future enhance...
Read More

Active vs Passive Policing

Active vs Passive Policing

You may have all the boxes checked on your balance score card.  Bought the latest and greatest security software, firewalls, Intrusion Prevention Systems

cops-800x600

Police ensure that youngsters are inline with the rules

and finally have your security staff complement that you have been fighting for.  The problem you have had all along should be gone now… But is it really?

I have recently travelled to Portugal and have seen active policing in all the main cities I have travelled to.  In Lisbon you have police walking around 24-hours a day.  At night the patrol the streets alone.  Not two or more, one at a time with a radio and visible arms.  In the capital city of Madeira, Funchal, the same type of behaviour.  The end result is a much safer environment for all...

Read More

SACS Assessment Collector V1.1

SACS Assessment Collector V1.1

SACS Assessment Collector is a standalone application which assists in the collection of information on remote workstations and servers and saving this in a compressed and encrypted file which can be analysed centrally.

SACSAss

Download the application <Click Here>

Usage

  1. Copy the application to a USB or to a drive where remote users can execute it.
  2. Execute the Application – this may take a while as detailed analysis are done
  3. When the application execution is complete a .zip (compressed file) with the machine name would have been created.
  4. Send this file to the central body for import and analysis

We recommend any file that you will execute on your environment to be submitted to VirusTotal for a complete analysis on most of the malware scanning engines.

This i...

Read More

SACS CISSP Core Overview

Monday morning ‘quickie’

All 10 domains in a core overview.  Click to go to the YouTube playlist

Regards
Mervin Pearce

Read More

CISSP Domain 7 and 8 podcasts available

CISSP Domain 7 and 8 podcasts available

Another two domains have been added today looking at some podcasts for a quick review.  They are available to listen online or can be downloaded from SoundCloud

More will be added as we go along with reviews.

Read More

New online courses added

New online courses added

The ability to learn at your own pace without breaking the bank has a few advantages.  Any previous learner will get a special discount on any course.   Costs will be kept realistic as we believe electronic delivery should be much more realistic due to the usage of technology.

First courses being delivered with many in the pipeline which will the prioritised… some courses will be available at no cost and we have specials for previous SACS learners.

  1. CISSP Boot Camp – Taking what we have done over more than the last decade into a eLearning solution
  2. Penetration Testing -
  3. Barefoot IT Auditor – From crawling to Running

If  you want any additional details on any of the upcoming courses… make sure you are subscribed to the training list. Subscribe here

An extract fro...

Read More

Law and Ethics Domain Podcast available

Law and Ethics Domain Podcast available

A short podcast which is available as a download covers domain 9 in the CISSP CBK which is Law, Regulations, Investigations & Compliance and is just over 34 minutes long.  This is to cover some information and not be too ‘in-depth’

Listen on SoundCloud (Downloadable)

Read More

Corruption – how can this be stemmed?

Corruption – how can this be stemmed?

Listening to the radio one morning dropping of my son at school, there was a prank call to a lady that said she was offered a bribe by a police officer for not stopping properly at a stop sign.  The overwhelming results from the listeners in the area was phoning in, tweeting, emailing and text message sharing their experiences with corrupt traffic officers in the area.  One phoned in to complain that this has been an article in the local news paper about two years ago and NOTHING has been done to address this.

I have been stopped once and I was told I was speeding and was offered to make up my own amount to pay as the actual fine is R800 (approx $80)...

Read More

Ransomware – A Real Threat

Ransomware – a real threat

I have seen the ‘Ransomware’ increasing as a persistent threat and although there is a simple solution, in the event of the threat realisation, which is backups.   As soon as you lose access to your data, you can retrieve a backup copy.  The problem exists which

The following video is a small example of a file that came into my email and how you can use a free service such as VirusTotal to check for a possible threat.  The video is 6min long and just shows some tricks that the fraudsters use to see if they can get users to click on the file.

The ‘ransomware’ in this case was sent from an email server in Mauritius however, this most certainly is also compromised.

VirusTotal

Practice SAFE HEX!

Read More