This site uses localStorage to save your study progress. No personal data is collected.

10-Week CISSP Study Plan

Group four sessions per week, covering the 40 sessions over 10 weeks.

WeekSessions & Details
Week 1
#StartEndSub-Domains
11Security Governance Through Principles and Policies1Apply Risk-Based Management Concepts to the Supply Chain1.1–1.2
21Summary2Personnel Security Policies and Procedures1.3–1.4
32Security Governance2Exam Essentials1.5–1.6
42Written Lab3Business Impact Assessment1.7
Week 2
#StartEndSub-Domains
5 3 Continuity Planning 3 Review Questions 1.8
6 4 Laws, Regulations, and Compliance 4 Summary 1.9–1.10
7 4 Exam Essentials 5 Determining Ownership 1.11
8 5 Using Security Baselines 6 Symmetric Cryptography 1.12
Week 3
#StartEndSub-Domains
9 6 Historical Milestones in Cryptography 6 Summary 2.1–2.2
10 6 Exam Essentials 7 Hash Functions 2.3–2.4
11 7 Digital Signatures 7 Summary 2.5–2.6
12 7 Exam Essentials 8 Fundamental Concepts of Security Models 3.1–3.2
Week 4
#StartEndSub-Domains
13 8 Select Controls Based On Systems Security Requirements 8 Review Questions 3.3–3.4
14 9 Security Vulnerabilities, Threats, and Countermeasures 9 Distributed Systems and Endpoint Security 3.5–3.6
15 9 Internet of Things 9 Assess Vulnerabilities in Embedded Devices 3.7
16 10 Apply Security Principles to Site and Facility Design 10 Review Questions 3.8
Week 5
#StartEndSub-Domains
17 11 Converged Protocols 11 Review Questions 3.9–3.10
18 12 Network and Protocol Security Mechanisms 12 Review Questions 4.1–4.2
19 13 Implementing Identity Management 13 Review Questions 4.3
20 14 Understanding Access Control Attacks 14 Review Questions 5.1
Week 6
#StartEndSub-Domains
21 15 Performing Vulnerability Assessments 15 Exam Essentials 5.2
22 16 Managing Security Operations 16 Review Questions 5.3
23 17 Preventing and Responding to Incidents 17 Review Questions 5.4–5.5
24 18 Disaster Recovery Planning 18 Review Questions 5.6
Week 7
#StartEndSub-Domains
25 19 Investigations 19 Review Questions 6.1–6.2
26 20 Software Development Security 20 Review Questions 6.3–6.4
27 21 Malicious Code and Application Attacks 21 Review Questions 6.5
28 21 Exam Essentials 21 Review Questions 7.1–7.2
Week 8
#StartEndSub-Domains
29 22 Building a Security Assessment and Testing Program 22 Review Questions 7.3–7.4
30 23 Managing Configuration 23 Review Questions 7.5–7.6
31 17 Logging, Monitoring, and Auditing 17 Review Questions 7.7
32 18 Recovery Plan Development 18 Review Questions 7.8
Week 9
#StartEndSub-Domains
33 24 Investigations and Ethics 24 Review Questions 7.9–7.10
34 20 Introducing Systems Development Controls 20 Review Questions 7.11
35 21 Malicious Code 21 Review Questions 7.12–7.13
36 22 Security Assessment and Testing 22 Review Questions 7.14
Week 10
#StartEndSub-Domains
37 23 Managing Security Operations 23 Review Questions 7.15
38 24 Preventing and Responding to Incidents 24 Review Questions 8.1–8.2
39 18 Disaster Recovery Planning 18 Review Questions 8.3
40 19 Investigations and Ethics 19 Review Questions 8.4