Explore Courses
course iconScrum AllianceCertified ScrumMaster (CSM) Certification
  • 16 Hours
Best seller
course iconScrum AllianceCertified Scrum Product Owner (CSPO) Certification
  • 16 Hours
Best seller
course iconScaled AgileLeading SAFe 6.0 Certification
  • 16 Hours
Trending
course iconScrum.orgProfessional Scrum Master (PSM) Certification
  • 16 Hours
course iconScaled AgileSAFe 6.0 Scrum Master (SSM) Certification
  • 16 Hours
course iconScaled Agile, Inc.Implementing SAFe 6.0 (SPC) Certification
  • 32 Hours
Recommended
course iconScaled Agile, Inc.SAFe 6.0 Release Train Engineer (RTE) Certification
  • 24 Hours
course iconScaled Agile, Inc.SAFe® 6.0 Product Owner/Product Manager (POPM)
  • 16 Hours
Trending
course iconKanban UniversityKMP I: Kanban System Design Course
  • 16 Hours
course iconIC AgileICP Agile Certified Coaching (ICP-ACC)
  • 24 Hours
course iconScrum.orgProfessional Scrum Product Owner I (PSPO I) Training
  • 16 Hours
course iconAgile Management Master's Program
  • 32 Hours
Trending
course iconAgile Excellence Master's Program
  • 32 Hours
Agile and ScrumScrum MasterProduct OwnerSAFe AgilistAgile CoachFull Stack Developer BootcampData Science BootcampCloud Masters BootcampReactNode JsKubernetesCertified Ethical HackingAWS Solutions Artchitct AssociateAzure Data Engineercourse iconPMIProject Management Professional (PMP) Certification
  • 36 Hours
Best seller
course iconAxelosPRINCE2 Foundation & Practitioner Certificationn
  • 32 Hours
course iconAxelosPRINCE2 Foundation Certification
  • 16 Hours
course iconAxelosPRINCE2 Practitioner Certification
  • 16 Hours
Change ManagementProject Management TechniquesCertified Associate in Project Management (CAPM) CertificationOracle Primavera P6 CertificationMicrosoft Projectcourse iconJob OrientedProject Management Master's Program
  • 45 Hours
Trending
course iconProject Management Master's Program
  • 45 Hours
Trending
PRINCE2 Practitioner CoursePRINCE2 Foundation CoursePMP® Exam PrepProject ManagerProgram Management ProfessionalPortfolio Management Professionalcourse iconAWSAWS Certified Solutions Architect - Associate
  • 32 Hours
Best seller
course iconAWSAWS Cloud Practitioner Certification
  • 32 Hours
course iconAWSAWS DevOps Certification
  • 24 Hours
course iconMicrosoftAzure Fundamentals Certification
  • 16 Hours
course iconMicrosoftAzure Administrator Certification
  • 24 Hours
Best seller
course iconMicrosoftAzure Data Engineer Certification
  • 45 Hours
Recommended
course iconMicrosoftAzure Solution Architect Certification
  • 32 Hours
course iconMicrosoftAzure Devops Certification
  • 40 Hours
course iconAWSSystems Operations on AWS Certification Training
  • 24 Hours
course iconAWSArchitecting on AWS
  • 32 Hours
course iconAWSDeveloping on AWS
  • 24 Hours
course iconJob OrientedAWS Cloud Architect Masters Program
  • 48 Hours
New
course iconCareer KickstarterCloud Engineer Bootcamp
  • 100 Hours
Trending
Cloud EngineerCloud ArchitectAWS Certified Developer Associate - Complete GuideAWS Certified DevOps EngineerAWS Certified Solutions Architect AssociateMicrosoft Certified Azure Data Engineer AssociateMicrosoft Azure Administrator (AZ-104) CourseAWS Certified SysOps Administrator AssociateMicrosoft Certified Azure Developer AssociateAWS Certified Cloud Practitionercourse iconAxelosITIL 4 Foundation Certification
  • 16 Hours
Best seller
course iconAxelosITIL Practitioner Certification
  • 16 Hours
course iconPeopleCertISO 14001 Foundation Certification
  • 16 Hours
course iconPeopleCertISO 20000 Certification
  • 16 Hours
course iconPeopleCertISO 27000 Foundation Certification
  • 24 Hours
course iconAxelosITIL 4 Specialist: Create, Deliver and Support Training
  • 24 Hours
course iconAxelosITIL 4 Specialist: Drive Stakeholder Value Training
  • 24 Hours
course iconAxelosITIL 4 Strategist Direct, Plan and Improve Training
  • 16 Hours
ITIL 4 Specialist: Create, Deliver and Support ExamITIL 4 Specialist: Drive Stakeholder Value (DSV) CourseITIL 4 Strategist: Direct, Plan, and ImproveITIL 4 Foundationcourse iconJob OrientedData Science Bootcamp
  • 6 Months
Trending
course iconJob OrientedData Engineer Bootcamp
  • 289 Hours
course iconJob OrientedData Analyst Bootcamp
  • 6 Months
course iconJob OrientedAI Engineer Bootcamp
  • 288 Hours
New
Data Science with PythonMachine Learning with PythonData Science with RMachine Learning with RPython for Data ScienceDeep Learning Certification TrainingNatural Language Processing (NLP)TensorflowSQL For Data Analyticscourse iconIIIT BangaloreExecutive PG Program in Data Science from IIIT-Bangalore
  • 12 Months
course iconMaryland UniversityExecutive PG Program in DS & ML
  • 12 Months
course iconMaryland UniversityCertificate Program in DS and BA
  • 31 Weeks
course iconIIIT BangaloreAdvanced Certificate Program in Data Science
  • 8+ Months
course iconLiverpool John Moores UniversityMaster of Science in ML and AI
  • 750+ Hours
course iconIIIT BangaloreExecutive PGP in ML and AI
  • 600+ Hours
Data ScientistData AnalystData EngineerAI EngineerData Analysis Using ExcelDeep Learning with Keras and TensorFlowDeployment of Machine Learning ModelsFundamentals of Reinforcement LearningIntroduction to Cutting-Edge AI with TransformersMachine Learning with PythonMaster Python: Advance Data Analysis with PythonMaths and Stats FoundationNatural Language Processing (NLP) with PythonPython for Data ScienceSQL for Data Analytics CoursesAI Advanced: Computer Vision for AI ProfessionalsMaster Applied Machine LearningMaster Time Series Forecasting Using Pythoncourse iconDevOps InstituteDevOps Foundation Certification
  • 16 Hours
Best seller
course iconCNCFCertified Kubernetes Administrator
  • 32 Hours
New
course iconDevops InstituteDevops Leader
  • 16 Hours
KubernetesDocker with KubernetesDockerJenkinsOpenstackAnsibleChefPuppetDevOps EngineerDevOps ExpertCI/CD with Jenkins XDevOps Using JenkinsCI-CD and DevOpsDocker & KubernetesDevOps Fundamentals Crash CourseMicrosoft Certified DevOps Engineer ExperteAnsible for Beginners: The Complete Crash CourseContainer Orchestration Using KubernetesContainerization Using DockerMaster Infrastructure Provisioning with Terraformcourse iconTableau Certification
  • 24 Hours
Recommended
course iconData Visualisation with Tableau Certification
  • 24 Hours
course iconMicrosoftMicrosoft Power BI Certification
  • 24 Hours
Best seller
course iconTIBCO Spotfire Training
  • 36 Hours
course iconData Visualization with QlikView Certification
  • 30 Hours
course iconSisense BI Certification
  • 16 Hours
Data Visualization Using Tableau TrainingData Analysis Using Excelcourse iconEC-CouncilCertified Ethical Hacker (CEH v12) Certification
  • 40 Hours
course iconISACACertified Information Systems Auditor (CISA) Certification
  • 22 Hours
course iconISACACertified Information Security Manager (CISM) Certification
  • 40 Hours
course icon(ISC)²Certified Information Systems Security Professional (CISSP)
  • 40 Hours
course icon(ISC)²Certified Cloud Security Professional (CCSP) Certification
  • 40 Hours
course iconCertified Information Privacy Professional - Europe (CIPP-E) Certification
  • 16 Hours
course iconISACACOBIT5 Foundation
  • 16 Hours
course iconPayment Card Industry Security Standards (PCI-DSS) Certification
  • 16 Hours
course iconIntroduction to Forensic
  • 40 Hours
course iconPurdue UniversityCybersecurity Certificate Program
  • 8 Months
CISSPcourse iconCareer KickstarterFull-Stack Developer Bootcamp
  • 6 Months
Best seller
course iconJob OrientedUI/UX Design Bootcamp
  • 3 Months
Best seller
course iconEnterprise RecommendedJava Full Stack Developer Bootcamp
  • 6 Months
course iconCareer KickstarterFront-End Development Bootcamp
  • 490+ Hours
course iconCareer AcceleratorBackend Development Bootcamp (Node JS)
  • 4 Months
ReactNode JSAngularJavascriptPHP and MySQLcourse iconPurdue UniversityCloud Back-End Development Certificate Program
  • 8 Months
course iconPurdue UniversityFull Stack Development Certificate Program
  • 9 Months
course iconIIIT BangaloreExecutive Post Graduate Program in Software Development - Specialisation in FSD
  • 13 Months
Angular TrainingBasics of Spring Core and MVCFront-End Development BootcampReact JS TrainingSpring Boot and Spring CloudMongoDB Developer Coursecourse iconBlockchain Professional Certification
  • 40 Hours
course iconBlockchain Solutions Architect Certification
  • 32 Hours
course iconBlockchain Security Engineer Certification
  • 32 Hours
course iconBlockchain Quality Engineer Certification
  • 24 Hours
course iconBlockchain 101 Certification
  • 5+ Hours
NFT Essentials 101: A Beginner's GuideIntroduction to DeFiPython CertificationAdvanced Python CourseR Programming LanguageAdvanced R CourseJavaJava Deep DiveScalaAdvanced ScalaC# TrainingMicrosoft .Net Frameworkcourse iconSalary Hike GuaranteedSoftware Engineer Interview Prep
  • 3 Months
Data Structures and Algorithms with JavaScriptData Structures and Algorithms with Java: The Practical GuideLinux Essentials for Developers: The Complete MasterclassMaster Git and GitHubMaster Java Programming LanguageProgramming Essentials for BeginnersComplete Python Programming CourseSoftware Engineering Fundamentals and Lifecycle (SEFLC) CourseTest-Driven Development for Java ProgrammersTypeScript: Beginner to Advanced

CISSP Common Body of Knowledge - (ISC)² CBK An Overview

By Abhresh Sugandhi

Updated on Jul 01, 2022 | 11 min read

Share:

As the world becomes reliant on technology, the need for security has become just as high. It only makes sense to get the knowledge of security and pursue a career in that direction. By familiarizing yourself with the material in the CISSP CBK, you can make sure that you have a strong foundation on which to build your career in security and join the league of cybersecurity professionals.

The ISC2 CBK is essential for anyone working or planning to work in the information security field. It helps you stay up to date on the latest developments in the field and benefit your career potential. In this blog, we’ll be providing you with an overview of the CISSP Common body of knowledge and explaining what makes the latest edition better than its previous edition. Let’s begin. 

Know more about CISSP Domains

The Official (ISC)² CISSP CBK Reference

The official book on CISSP is a comprehensive framework of all the knowledge, skills, and abilities required to perform effectively in the field of information security. It has been designed by (ISC)² - a leading global provider of information security certification - and is used by organizations around the world to ensure that their employees have the necessary skills and knowledge to protect their systems and data.

It is an essential resource for security enthusiasts enrolling in the CISSP prep course. The official ISC2 guide to the CISSP CBK can be used as a study aid for the CISSP exam, and it can also be used as a reference for day-to-day work. Many professionals consider it to stay up-to-date on the latest trends and technologies. 

Whether you are just starting out in your security career or you are a seasoned professional, this book is an essential part of your library. 

Get to know more about CEH vs CISSP. 

How Has the Material Changed from the Previous Edition?

The changes made to the (ISC)2 CISSP CBK Reference guide were based on community feedback and expert input received during the development process. The goal of the update was to provide individuals with more comprehensive coverage of the topics included in the CBK.

The updated reference guide provides individuals with more information related to the eight domains of the Common Body of Knowledge. 

1. Security & Risk Management

The Security and Risk Management domain is the foundation of the CISSP CBK. It covers the essential concepts of security management, including risk assessment and management, security controls, and security policies.

The goal of this domain is to ensure that organizations have the ability to identify, assess, and mitigate risks to their information assets. By understanding and applying the principles of this domain, organizations can protect themselves from a variety of threats, including cyber-attacks, natural disasters, and malicious insiders.

In addition, this domain also covers compliance with laws and regulations related to security. By ensuring that their security posture aligns with relevant laws and regulations, organizations can reduce their exposure to liability in the event of a security incident. 

2. Asset Security

The Asset Security domain focuses on the protection of an organization's assets, which can include everything from information and databases to buildings and equipment. This domain covers topics such as security risks, classification schemes, and data handling procedures.

The CBK CISSP also includes guidelines for physical security, as well as asset disposal and recovery. In order to effectively protect an organization's assets, it is essential to have a clear understanding of the value of those assets and the potential risks they face. With that knowledge in hand, effective security measures can be put in place to safeguard against loss or damage. 

3. Security Engineering

The security engineering domain of the (ISC)² CBK addresses the engineering processes required to develop, select, implement and maintain security measures that protect information systems. The security engineering domain focuses on technology-related solutions and how they can be used to mitigate security risks.

The domain includes information on security models, design strategies and methodologies, as well as technical controls such as access control mechanisms, cryptographic solutions and intrusion detection systems. In addition, the security engineering domain covers topics related to supply chain risk management, software development security and system lifecycle management.

By understanding the principles of security engineering and earning cybersecurity training certification, you can effectively select and implement security solutions that meet the ever-changing needs of organizations. 

4. Communications & Network Security

The Communications and Network Security domain of the CISSP CBK addresses the security controls and architectures used to protect communications systems, including the components of those systems, from interception, tampering, and denial of service attacks. 

It includes topics such as cryptography, secure communications protocols, vulnerability management, and incident response. This domain is important for CISSP candidates to understand because it forms the foundation for many of the other security domains, such as Application Security and Industrial Control Systems Security.

Furthermore, attacks on communications systems are becoming more sophisticated and widespread, making it critical for organizations to have strong defenses in this area. Given the importance of this domain, CISSP candidates should ensure that they have a solid understanding of the concepts covered before taking the exam. 

5. Identity & Access Management

Identity and access management is a critical part of security for any organization. Properly managing user access helps to ensure that only authorized users have access to sensitive data and systems. It can also help to prevent data breaches by unauthorized users.

The CISSP CBK covers all the essential concepts and technologies involved in identity and access management. When studying for the CISSP exam, you must be prepared to manage user access in any organization. 

6. Security Assessment and Testing

The security Assessment and Testing domain of the CBK CISSP is concerned with the tools and techniques used to assess an organization's security posture. This includes both active and passive testing methods, as well as physical and logical security assessments.

Active testing methods are those in which the tester actively interacts with the system under test, in order to gather information about its security posture. Passive testing methods, on the other hand, involve simply observing the system under test without interacting with it.

Physical security assessments focus on the physical components of a system, such as its hardware and facilities, while logical security assessments focus on the system's software and data. Both types of assessment are important in order to get a complete picture of an organization's security posture. 

7. Security Operations

CISSP Security Operations domain covers the management and maintenance of security controls to protect organizational assets, such as system boundary defenses, patch management, device hardening, media and device controls, HR security awareness and training program.

The aim is to ensure that the systems are available when needed and resistant to attack. All changes to the organization's systems need to be carefully evaluated for potential impact on security before they are implemented.

Building and maintaining secure systems require continuous monitoring and improvement of security controls. To be effective, these processes must be automated where possible and supported by detailed policies and procedures.

8. Software Development Security

The Final domain: Software Development Security of the CISSP CBK covers the processes and tools used to secure software applications throughout the software development life cycle.

In order to effectively secure software applications, it is important to understand the threat landscape and common vulnerabilities. The Software Development Security domain helps practitioners to identify these threats and vulnerabilities, as well as mitigation strategies.

In addition, this domain covers secure coding practices, application security testing, and incident response. By understanding the concepts in this domain, practitioners can build more secure software applications and better defend against attacks. 

Each of these domains covers a different area of expertise, and each domain is further divided into smaller sub-topics. The ISC2 CBK is the authoritative guide to all the topics covered. It is an essential resource for anyone preparing for the CISSP exam or seeking to develop their knowledge and understanding of information security.

What makes this book a good choice?

The Official (ISC)2 CISSP CBK Reference) 11 November 2021 is a great choice for individuals who want to get certified in information security. The book is extremely comprehensive, covering all of the topics that are tested on the CISSP exam.

In addition, the book is updated to reflect the latest changes in the information security field. As a result, it is an ideal resource for both new and experienced CISSP candidates. It also includes a practice exam, which can be extremely helpful in preparing for the actual test. Overall, the book is an excellent choice for anyone who wants to become certified in information security. 

How to study for the CISSP certification?

The CISSP is a highly respected and recognized security certification, and as such, it is not an easy exam to pass. In order to increase your chances of success, it is important to prepare thoroughly for the exam.

The best way to study for the exam is to first purchase a reputable study guide and review the material carefully. In addition, there are a number of practice exams available online which can help you gauge your understanding of the material.

Finally, find a study partner or rely on the Knowledgehut CISSP prep course to stay on track and motivated. By following these simple steps, you can give yourself the best possible chance of passing the CISSP exam. 

Conclusion

CISSP is a difficult certification to obtain, but the knowledge and skills you gain are invaluable. The exam covers a vast array of cybersecurity topics, so it's important to have a good understanding of the CBK before attempting to take the test.

One of the CISSP CBK's key objectives is to create a global body of knowledge around which practitioners can build skills and careers in cybersecurity. However, don’t be intimidated by its size or scope – we’ve provided an overview that will help you get started. In the meantime, good luck studying for your CISSP exam!

Master Right Skills & Boost Your Career

Avail your free 1:1 mentorship session

Frequently Asked Questions (FAQs)

1. What does CISSP CBK stand for?

2. What are the 8 domains of the CISSP CBK?

3. Can you pass CISSP without experience?

4. Is CISSP open book?

Abhresh Sugandhi

Abhresh Sugandhi

78 articles published

Get Free Consultation

By submitting, I accept the T&C and
Privacy Policy

Suggested Blogs

blog-card

What is PCI Compliance? Scope, Importance, Purpose

In today’s digital-first world, protecting sensitive payment information is more critical than ever. With cyber threats on the rise, businesses handling card transactions must prioritize security to safeguard customer data. This is where the Payment Card Industry Data Security Standard (PCI DSS) comes in. PCI DSS is a globally recognized framework designed to protect cardholder data and

06 Mar 2025 | 4 min read

blog-card

Chief Information Security Officer (CISO) Salary in 2025: Complete Guide

In today's digital era, data has emerged as a critical asset for businesses. With the widespread adoption of digitization, companies are entrusted with vast volumes of sensitive information, encompassing details about their employees, partners, and much more. A significant portion of this invaluable data now resides in the cloud, providing a convenient and scalable storage solution. However, th

06 Feb 2025 | 10 min read

blog-card

Latest Ethical hacking Projects 2025: 15 Projects to Become an Expert

The modern, tech-driven world continually attracts millions of new users and cyberattacks, eventually emphasizing the need for cybersecurity. We are in a constantly evolving era, where everything is digitized and exposed to cyberspace dangers. Ethical hacking is the process of legally accessing computer systems to detect potential vulnerabilities and weaknesses, which pave the way for hackers t

05 Feb 2025 | 8 min read

blog-card

Top It-security Certification Courses in Demand As of 2025

The field of information technology seems a bit of isolated and saturated when it comes to any innovation in that regard. This is not the case at present, though it seems a bit monotonous there are several IT security certification courses that you can do to not only boost your income but also to make sure that you excel in your department. With a lot of security breaches happening in th

05 Feb 2025 | 3 min read