CISSP Domain 1 & 2 Full Review | Security & Asset Security

Comprehensive review of CISSP Domains 1 & 2: Security & Risk Management, Asset Security. Perfect for exam prep! πŸ‘©β€πŸ’»

CISSP Domain 1 & 2 Full Review | Security & Asset Security
CyberPlatter
3.0K views β€’ Dec 29, 2025
CISSP Domain 1 & 2 Full Review | Security & Asset Security

About this video

CISSP Domain 2 Full Review | Asset Security: https://youtu.be/NgMsnV4HyE4

Welcome to CyberPlatter! πŸ‘‹ I’m Navya, and this video begins a step-by-step CISSP review series created to help you understand core security concepts, focus on exam-relevant topics, and build a strong foundation for the CISSP certification exam.

In this video, we cover CISSP Domain 1 - Security and Risk Management.

Domain 1: Security and Risk Management
1.1 - Understand, adhere to, and promote professional ethics
ISC2 Code of Professional Ethics
Organizational code of ethics
1.2 - Understand and apply security concepts
Confidentiality, integrity, and availability, authenticity, and nonrepudiation (5 Pillars of Information Security)
1.3 - Evaluate and apply security governance principles
Alignment of the security function to business strategy, goals, mission, and objectives
Organizational processes (e.g., acquisitions, divestitures, governance committees)
Organizational roles and responsibilities
Security control frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI), Federal Risk and Authorization Management Program (FedRAMP))
Due care/due diligence
1.4 - Understand legal, regulatory, and compliance issues that pertain to information security in a holistic context
Cybercrimes and data breaches
Licensing and Intellectual Property requirements
Import/export controls
Transborder data flow
Issues related to privacy (e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act, Personal Information Protection Law, Protection of Personal Information Act)
Contractual, legal, industry standards, and regulatory requirements
1.5 - Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
1.6 - Develop, document, and implement security policy, standards, procedures, and guidelines
1.7 - Identify, analyze, assess, prioritize, and implement Business Continuity (BC) requirements
Business impact analysis (BIA)
External dependencies
1.8 - Contribute to and enforce personnel security policies and procedures
Candidate screening and hiring
Employment agreements and policy driven requirements
Onboarding, transfers, and termination processes
Vendor, consultant, and contractor agreements and controls
1.9 - Understand and apply risk management concepts
Threat and vulnerability identification
Risk analysis, assessment, and scope
Risk response and treatment (e.g., cybersecurity insurance)
Applicable types of controls (e.g., preventive, detection, corrective)
Control assessments (e.g., security and privacy)
Continuous monitoring and measurement
Reporting (e.g., internal, external)
Continuous improvement (e.g., risk maturity modeling)
Risk frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Control Objectives for Information and Related Technology (COBIT), Sherwood Applied Business Security Architecture (SABSA), Payment Card Industry (PCI))
1.10 - Understand and apply threat modeling concepts and methodologies
1.11 - Apply Supply Chain Risk Management (SCRM) concepts
Risks associated with the acquisition of products and services from suppliers and providers (e.g., product tampering, counterfeits, implants)
Risk mitigations (e.g., third-party assessment and monitoring, minimum security requirements, service level requirements, silicon root of trust, physically unclonable function, software bill of materials)
1.12 - Establish and maintain a security awareness, education, and training program
Methods and techniques to increase awareness and training (e.g., social engineering, phishing, security champions, gamification)
Periodic content reviews to include emerging technologies and trends (e.g., cryptocurrency, artificial intelligence (AI), blockchain)
Program effectiveness evaluation

#CISSP #CISSPDomain1 #SecurityAndRiskManagement #CISSPFullReview #CISSPTutorial #CISSP #CISSPExam #CISSPPrep #CISSPDomain1 #CISSPStudy #CISSPCertification #ISC2 #SecurityAndRiskManagement #CISSPExamPreparation #ISC2CISSP #Cybersecurity #InformationSecurity #CyberPlatter #isc2cissp #cisspexam #cissp

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

3.0K

Likes

76

Duration

02:48:13

Published

Dec 29, 2025

User Reviews

4.5
(3)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.