Comprehensive Guide to CISSP: A Review of “CISSP All-in-One Exam Guide, Ninth Edition” by Shon Harris and Fernando Maymi

Rating: ★★★★★

The Certified Information Systems Security Professional (CISSP) certification is a prestigious credential sought after by professionals in the field of cybersecurity. To navigate the complexities of the CISSP exam, candidates often turn to trusted study resources. “CISSP All-in-One Exam Guide, Ninth Edition” by Shon Harris and Fernando Maymi has long been considered a go-to reference for CISSP aspirants. In this comprehensive review, we will explore the book’s content chapter by chapter.

Chapter 1: Introduction to the CISSP Certification The authors kick off the book by providing an overview of the CISSP certification and the domains it covers. They explain the exam format and set the stage for the journey ahead.

Chapter 2: Security and Risk Management This chapter delves into fundamental concepts of security and risk management. Harris and Maymi do an excellent job explaining key principles and frameworks, such as confidentiality, integrity, availability (CIA), and risk assessment.

Chapter 3: Asset Security The authors explore the protection of assets in this chapter, covering topics like data classification, ownership, and data retention policies. They also discuss physical security measures and the importance of asset management.

Chapter 4: Security Architecture and Engineering This section provides insights into security architecture, system design, and secure development practices. It’s a critical chapter for those wanting to understand the design principles of secure systems.

Chapter 5: Communication and Network Security Communication and network security are crucial in today’s interconnected world. Harris and Maymi guide readers through the essentials of network security, including protocols, devices, and best practices.

Chapter 6: Identity and Access Management Access control is a fundamental aspect of cybersecurity. This chapter explores identity management, authentication, authorization, and access control models in depth.

Chapter 7: Security Assessment and Testing For a secure system, continuous testing is essential. This chapter covers various assessment and testing methodologies, including vulnerability assessment and penetration testing.

Chapter 8: Security Operations This section delves into security operations, incident response, disaster recovery, and business continuity planning. It provides a holistic view of how organizations should handle security incidents and maintain business continuity.

Chapter 9: Software Development Security Secure software development is a key concern in the digital age. The authors discuss secure coding practices, secure development life cycles, and common software vulnerabilities.

Chapter 10: Security and Risk Management The final chapter revisits the security and risk management domain, summarizing key concepts and emphasizing their importance in the CISSP exam.

Appendices and Additional Resources The book also includes valuable appendices that provide supplemental information, such as a glossary, exam tips, and practice questions. It’s a great resource for reinforcing your knowledge.

In conclusion, “CISSP All-in-One Exam Guide, Ninth Edition” by Shon Harris and Fernando Maymi is a comprehensive and well-structured resource for CISSP aspirants. The chapter-by-chapter breakdown ensures that readers can approach each domain with clarity and depth. The authors’ expertise shines through in their clear explanations and practical insights. However, it’s important to note that this book is an excellent study guide but should be supplemented with real-world experience and additional practice exams. If you are serious about earning your CISSP certification, this book should be a key component of your study plan.

Basic Linux Commands

  1. ls – List files and directories in the current directory. Example: ls Explanation: This command will display a list of files and directories in the current location.
  2. pwd – Print working directory. Example: pwd Explanation: This command shows the path of the current directory you are in.
  3. cd – Change directory. Example: cd /home/user/documents Explanation: This command changes the current directory to “/home/user/documents”.
  4. mkdir – Make directory. Example: mkdir new_folder Explanation: This command creates a new directory named “new_folder” in the current directory.
  5. rmdir – Remove directory. Example: rmdir empty_folder Explanation: This command deletes an empty directory named “empty_folder” from the current directory.
  6. cp – Copy files or directories. Example: cp file.txt /path/to/destination Explanation: This command copies “file.txt” to the specified destination path.
  7. mv – Move or rename files or directories. Example 1: mv file.txt /path/to/destination Explanation 1: This command moves “file.txt” to the specified destination path. Example 2: mv old_file.txt new_file.txt Explanation 2: This command renames “old_file.txt” to “new_file.txt”.
  8. rm – Remove files or directories. Example 1: rm file.txt Explanation 1: This command deletes the file named “file.txt”. Example 2: rm -r folder Explanation 2: This command deletes the “folder” directory and all its contents recursively.
  9. touch – Create an empty file or update the file’s timestamp. Example 1: touch new_file.txt Explanation 1: This command creates a new empty file named “new_file.txt”. Example 2: touch existing_file.txt Explanation 2: This command updates the timestamp of the “existing_file.txt” without changing its content.
  10. cat – Concatenate and display the content of files. Example: cat file.txt Explanation: This command displays the content of “file.txt” on the terminal.
  11. more / less – Display the content of files page by page. Example: less large_file.txt Explanation: This command allows you to view the content of “large_file.txt” page by page, making it easier to read large files.
  12. head – Display the beginning of a file. Example: head file.txt Explanation: This command shows the first few lines of “file.txt”.
  13. tail – Display the end of a file. Example: tail file.txt Explanation: This command shows the last few lines of “file.txt”.
  14. grep – Search for a pattern in files. Example: grep "keyword" file.txt Explanation: This command searches for the word “keyword” in “file.txt” and displays matching lines.
  15. echo – Print a message or value to the terminal. Example: echo "Hello, World!" Explanation: This command prints the message “Hello, World!” to the terminal.
  16. chmod – Change file permissions. Example: chmod +x Explanation: This command adds the executable permission to “”, allowing it to be run as a script.
  17. chown – Change file ownership. Example: chown user:group file.txt Explanation: This command changes the owner and group of “file.txt” to the specified user and group.
  18. ps – Display the currently running processes. Example: ps aux Explanation: This command shows a list of all running processes on the system along with additional details.
  19. kill – Terminate a process. Example: kill PID Explanation: This command sends a termination signal to the process with the specified PID (Process ID).
  20. top – Display dynamic real-time information about running processes. Example: top Explanation: This command provides a live view of the system’s processes, updating regularly.

These are just some of the most basic Linux commands. The Linux command line offers a plethora of powerful utilities and options to explore and master.

Top 5 Open Source Vulnerability Security Scanning Tools

  1. Nmap: Nmap is a powerful open source network exploration and security auditing tool that can help identify vulnerabilities in a system. It is widely used for port scanning, version detection, and network mapping. Nmap can also be used for vulnerability scanning by detecting known vulnerabilities in software and services running on a system.
  2. OpenVAS: OpenVAS is an open source vulnerability scanner that can be used to scan for known vulnerabilities in software and services on a network. It is a powerful tool that can perform comprehensive scans of networks, identify vulnerabilities, and generate reports.
  3. Metasploit Framework: Metasploit is a popular open source penetration testing framework that can be used to identify and exploit vulnerabilities in systems. It can also be used for vulnerability scanning by running exploit modules that detect known vulnerabilities in software and services.
  4. Nikto: Nikto is an open source web server scanner that can be used to identify vulnerabilities in web servers and web applications. It can perform comprehensive scans of web servers, identify vulnerabilities, and generate reports.
  5. Lynis: Lynis is an open source security auditing tool that can be used to scan for security vulnerabilities in Linux and Unix systems. It can identify vulnerabilities in the system configuration, installed software, and system security settings. Lynis is lightweight and easy to use, making it a popular choice for security professionals.

These tools are popular among security professionals because they are open source, free to use, and can be customized to meet specific security needs. They are also regularly updated by their communities, which ensures that they are kept up-to-date with the latest threats and vulnerabilities. Additionally, they are user-friendly and come with detailed documentation and tutorials, making them accessible even to non-experts.

The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)

A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target.  The main goal of the Sock Puppet is to not have the profile linked back to the investigator.

This is vital as to provide operational security (OPSEC) to protect the investigator from retaliation or to prevent bringing awareness to the target that they are being investigated by a specific entity.

Maintaining and managing a sock puppet also requires a detailed understanding of the many different platforms the investigator will used to create accounts for the fake persona.  As these policies change, so can the information that is disclosed or shared publicly.

To effectively create and use a functional sock puppet here are a few recommendations:

  1. To anonymize the account so that it does not record the original IP address or location, the use of a VPN or TOR while creating the account is highly recommended. In addition, it is recommended doing so from a public Wi-Fi connection.
  2. Certain social media platforms such as Facebook may prevent individuals from creating an account from a VPN or TOR connect. In that case, using a public Wi-Fi is recommended.
  3. When logging to the sock account, be sure to always use a VPN, TOR or public Wi-Fi, under no circumstances should the creator use a direct IP address that may link back to them.
  4. Make the account as legitimate as possible by producing daily activities, using it for a long period of time and making online connections.
  5. When creating a name for the account, it is recommended using a fake name generator. In doing so, the investigator will be provided with an identity of a person that has never existed.  The identity will have a name, address, mother’s maiden name, weight, height, date of birth, in addition to many other useful information need to create a person.  Female accounts then to have more success when creating a sock puppet.
  6. Now that an identity has been created, providing an image is highly recommended. The creator has two options, using a cartoon avatar or providing an image of a human that does not exist through the use of artificial intelligence.  Never use a real person’s face as individuals can use tools such as Google identify the photo’s original owner.
  7. When creating an email account for the sock puppet, it is recommended using any email provider such as, or to name a few. As previously stated, be sure the IP address cannot be link to the creator.
  8. Obtain a burner cell phone and SIM card that can be used account verification. Be sure to not have the phone linked back to the investigator by paying with cash or a privacy-based credit card.
  9. Having more than one sock puppet is highly recommended in case something goes wrong, the investigator will have an active back-up.

Sock Puppets are important for the protection of the investigator, things change fast in the online world, and it is important the investigator keep up with the changes.

The Open-Source Intelligence (OSINT) Cycle

Open-source intelligence, or OSINT, refers to the process of collecting information from public and legal data sources to serve a specific function. Some open sources components might include social media, videos, blogs, news, and the web (surface, Deep and Dark Web).

OSINT encompasses 5 phases in its process. The following diagram shows the OSINT cycle.

  1. Source Identification – It is the initial phase of the OSINT process. The OSINT investigator (Black Hat or White Hat) identifies the potential sources from which information will be gathered.
  2. Data harvesting – In this phase, the OSINT investigator collects and harvests information from the select sources and other sources that are discovered.
  3. Data processing and information- During this phase, the OSINT investigator processes the harvest information for actionable observation by searching for information that may assist in the enumeration.
  4. Data analysis – In this phase, the OSINT Investigator performs data analysis of the processed information using OSINT analysis tools and techniques.
  5. Results delivery – It is the final phase in the OSINT analysis and findings are reported to the stake holders.

Benefits of STEM Summer Camps

STEM summer camps can make summer learning fun and exciting by teaching kids about science, technology, engineering, and math.  The camps can give children an opportunity to continue learning more about a concept they were introduced to during the school year or event explore different STEM concepts they may not learn about in their classrooms. In just one summer, kids discover not only their passion for learning but perhaps even their future career path.

Learn Basic STEM Skills

Instead of forgetting the STEM concepts they’ve learned at school, kids can practice those concepts and apply them in hands-on activities and real-life scenarios.  For example, using robotics to implement a manufacturing solution, implementing code to sort through data or conducting a chemical experience to determine the acidity.

In addition to the STEM activities, participant of the camo will start developing soft skills like communication, critical thinking, and problem-solving.  These skills will help them in their future careers and lives by working together, using their imagination, and enhancing their communication skills while solving multiple challenges.

How to Find a STEAM Summer Camp for Kids?

There are many schools and institutions offering STEM summer camps for kids and each of them may use different programs and approaches. To choose the right one, consider the following factors.

Your budget

How much are you willing to spend on this year’s summer camp? It’s no secret that summer camps can be pricey especially if you are enrolling more than one child and if the program requires them to live on the campus. That’s why it’s important to consider your budget for everything, including lodging, transportation, and food. Do your research first, then pick the one that suits your budget and other requirements at the same time.

You and your children’s preferences

Are you okay with the kids staying at the camp? Will they be able to take care of themselves if you are not around? Are they old enough to join a sleep-away camp? These are some of the questions you need to ask before enrolling them to STEM summer camp for kids. Think about these things very well while researching to select one that works for your family.


You want to know what kinds of activities, classes, workshops they are going to do during the camp. These vary from institution to institution, so compare them carefully. You also want to find out how many kids are going to be there per class. More often, small classes are better because teachers can provide individualized attention and kids get to know each other more.

The camp learning environment

If the camp offers open houses, grab this opportunity to take a tour. Make sure to take your child with you. Surveying the place before sending your kids is a must. It gives you an opportunity to speak with the staff, directors, and counselors and get to know more about their experience.