{"id":9064,"date":"2024-01-17T22:16:00","date_gmt":"2024-01-17T22:16:00","guid":{"rendered":"https:\/\/sajinshivdas.com\/cybersecurity\/?p=9064"},"modified":"2024-09-19T10:28:29","modified_gmt":"2024-09-19T10:28:29","slug":"cissp-interactive-mindmap-domain-3-security-architecture-engineering","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/","title":{"rendered":"CISSP Interactive Mindmap &#8211; Domain 3: Security Architecture &#038; Engineering"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Table of Contents<\/span><\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Concepts and Terminology\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Concepts and Terminology<\/span><\/a><\/li>\n<li><a href=\"#Key Terms &amp; Definitions\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Terms &amp; Definitions<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#Key Areas\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Key Areas<\/span><\/a><\/li>\n<li><a href=\"#Security Architecture &amp; Engineering_Mindmap\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Security Architecture &amp; Engineering_Mindmap<\/span><\/a><\/li>\n<li><a href=\"#Domain 03: Practise Tests\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Domain 03_Practise Tests<\/span><\/a><\/li>\n<li><a href=\"#Domain 03: Flashcard\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Domain 03_Flashcard<\/span><\/a><\/li>\n<li><a href=\"#Resources\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Resources<\/span><\/a><\/li>\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"#credits\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Credits &amp; Disclaimer<\/span><\/a><\/li>\n<li><a href=\"#Contribution\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Contribution<\/span><\/a><\/li>\n<li><a href=\"#Related Mindmaps\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Related Mindmaps<\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h1>CISSP Mindmap &#8211; Domain 03<\/h1>\n[\/vc_column_text][vc_column_text]A comprehensive CISSP Mindmap Series will include all 8 Domains. This collection is designed to equip prospective CISSP professionals with essential resources for exam preparation, training and reference.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-396569e96b8f892c9\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-396569e96b8f892c9 uvc-6350 \" data-hspacer=\"line_with_icon\" data-hline_width=\"auto\" data-hicon_type=\"selector\" data-hborder_style=\"solid\" data-hborder_height=\"3\" data-hborder_color=\"#000000\" data-icon_width=\"32\" data-hfixer=\"10\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-396569e96b8f892c9 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"desktop:2px;\"}' ><h3 style=\"font-weight:bold;color:#3452ff;margin-bottom:5px;\">CISSP Mindmap - Domain 03<\/h3><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-396569e96b8f892c9 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;margin-top:10px;margin-bottom:5px;\">\n<h5>CISSP Interactive Mindmap<\/h5>\n<\/div><div class=\"uvc-heading-spacer line_with_icon\" style=\"margin-top:5px;height:32px;\"><div class=\"ult-just-icon-wrapper  \"><div class=\"align-icon\" style=\"text-align:center;\">\n<div class=\"aio-icon none \"  style=\"font-size:32px;display:inline-block;\">\n\t<i class=\"awesome-book\"><\/i>\n<\/div><\/div><\/div><\/div><\/div>[image_with_animation image_url=&#8221;9319&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Concepts and Terminology&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-372569e96b8f892f1\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-372569e96b8f892f1 uvc-4533 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-372569e96b8f892f1 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_03: Key Concepts and Terminology<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div><div id=\"advanced-tabs-desc-wrap-2984\" class=\"ult_tabs \" style=\" \" data-tabsstyle=\"style1\"\r\n data-titlebg=\"#e7ecea\" data-titlecolor=\"#74777b\" data-fullheight=\"off\"\r\n data-titlehoverbg=\"#4f90d1\" data-titlehovercolor=\"#ffffff\"\r\n data-rotatetabs=\"0\" data-responsivemode=\"Both\" data-animation=\"Slide\"\r\ndata-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#4f90d1\"  data-respmode=\"Tabs\" data-respwidth=\"400\" data-scroll = \"on\" data-activeindex=\"1\"><ul id=advanced-tabs-wrap-6831 class=\"ult_tabmenu style1 Style_6\" style=\"color:transparent;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-width:0px;\"><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;border-top-left-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#1726740860847-10\" id=\"1726740860847-10\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Security Models and Architecture<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740861072-1\" id=\"1726740861072-1\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Secure Design Principles<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740861313-6\" id=\"1726740861313-6\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">System Security<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740861634-9\" id=\"1726740861634-9\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Cryptography<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740861871-6\" id=\"1726740861871-6\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Network Security<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740862161-3\" id=\"1726740862161-3\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Security Assessment<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740862408-1\" id=\"1726740862408-1\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Cloud Security<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;\">\r\n\t\t\t\t\t<a href=\"#1726740862638-9\" id=\"1726740862638-9\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Emerging Technologies<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><li class=\"ult_tab_li ult_tab_style_6  \" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\" style=\"background-color:#e7ecea;border-top-right-radius:8px;\">\r\n\t\t\t\t\t<a href=\"#1726740862873-3\" id=\"1726740862873-3\" style=\"color:#74777b;;border-color:#333333;  \" class=\"ult_a \">\r\n\t\t\t\t\t   <span class=\"ult_tab_main  Both \">\r\n\t\t\t\t\t    <span class=\"ult_tab_section\">\r\n\t\t\t\t\t  \t\t<span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult-responsive\" style=\"\">Secure System Engineering<\/span>\r\n\t\t\t\t\t\t   \t<span class=\"aio-icon none ult_tab_iconright\" style=\"color:#74777b;font-size:15px;\">\r\n\t\t\t\t\t\t   \t<i class=\"   ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t\t   <\/span>\r\n\t\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <\/span>\r\n\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<\/li><\/ul><div  data-ultimate-target='#advanced-tabs-desc-wrap-2984 .ult_tabcontent .ult_tab_min_contain  p'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' class=\"ult_tabcontent ult-responsive style1\" style=\"border-style:none; border-radius:3px;color:#74777b;\"><div class=\"ult_tab_min_contain \" >\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Confidentiality Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Examples include Bell-LaPadula (focused on data confidentiality and preventing unauthorized data access).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Integrity Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Examples include Biba and Clark-Wilson (focused on maintaining data integrity and preventing unauthorized modification).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Access Control Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>State Machine Model<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> A system is considered secure if it starts in a secure state and transitions between secure states.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Least Privilege<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Users and systems should only have the permissions needed to perform their tasks.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Separation of Duties<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Prevents conflict of interest by dividing responsibilities among individuals or systems.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Defense in Depth<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Implementing multiple layers of security controls to protect resources.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Fail-Safe Defaults<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> By default, deny access unless explicitly granted.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Through Obscurity<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Hiding system details to protect from threats (not recommended as a primary security mechanism).<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Trusted Computing Base (TCB)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The combination of hardware, software, and controls that work together to enforce a security policy.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Perimeter<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The boundary that separates the TCB from the untrusted environment.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Reference Monitor<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> An abstract machine that mediates all access to objects, ensuring access controls are enforced.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Kernel<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Core part of an operating system responsible for managing system resources and security controls.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Symmetric Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Uses a single key for both encryption and decryption (e.g., AES, DES).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asymmetric Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Uses a pair of keys (public and private) for encryption and decryption (e.g., RSA, ECC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Hash Functions<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Generates a fixed-size output (hash) from input data (e.g., SHA-256).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Digital Signatures<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Provides authentication, integrity, and non-repudiation.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Firewalls<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Act as a barrier between trusted and untrusted networks, controlling traffic based on pre-defined rules.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>VPN (Virtual Private Network)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Encrypts data transmitted over the internet to provide secure access.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Intrusion Detection Systems (IDS)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Monitors network traffic for suspicious activities and alerts.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Intrusion Prevention Systems (IPS)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Monitors network traffic and actively blocks threats.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Vulnerability Assessment<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Scanning systems for known security weaknesses.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Penetration Testing<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Simulating an attack to identify potential vulnerabilities.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Threat Modeling<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Identifying potential threats and vulnerabilities to design effective security measures.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>IaaS, PaaS, SaaS<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding the differences in service models and the shared responsibility model.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Serverless Computing<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Security considerations for serverless environments where the cloud provider manages infrastructure.<\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri; font-size: 11pt; color: #000000;\"><strong>Data Portability and Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"><span style=\"color: #000000;\"> Importance of encrypting data in transit and at rest within cloud<\/span> <\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Internet of Things (IoT)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding the security implications of interconnected devices.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Artificial Intelligence (AI)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Security considerations for AI-driven systems.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Blockchain<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Decentralized ledger technology providing secure, immutable transactions.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div>\n\t\t\t<div  class=\"ult_tabitemname\"  >\n\t\t\t\t<div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Architecture<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Design and structure of systems to align with security policies and requirements.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>System Assurance<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The level of confidence that a system is free from vulnerabilities and functions as intended.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\n\t\t\t<\/div><\/div><\/div><\/div><div class=\"ult_acord advanced-tabs-desc-wrap-2984\">\r\n   <div class=\"ult-tabto-accordion \" style=\"width:;\"\r\n    data-titlecolor=\"#74777b\"  data-titlebg=\"#e7ecea\"\r\n     data-titlehoverbg=\"#4f90d1\" data-titlehovercolor=\"#ffffff\" data-animation=\"Slide\"\r\n     data-activetitle=\"#ffffff\" data-activeicon=\"\" data-activebg=\"#4f90d1\" data-scroll = \"on\" data-activeindex=\"1\" >\r\n     <dl><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740860847-10\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740860847-10\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Security Models and Architecture<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Confidentiality Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Examples include Bell-LaPadula (focused on data confidentiality and preventing unauthorized data access).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Integrity Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Examples include Biba and Clark-Wilson (focused on maintaining data integrity and preventing unauthorized modification).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Access Control Models<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>State Machine Model<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> A system is considered secure if it starts in a secure state and transitions between secure states.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740861072-1\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740861072-1\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Secure Design Principles<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Least Privilege<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Users and systems should only have the permissions needed to perform their tasks.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Separation of Duties<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Prevents conflict of interest by dividing responsibilities among individuals or systems.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Defense in Depth<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Implementing multiple layers of security controls to protect resources.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Fail-Safe Defaults<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> By default, deny access unless explicitly granted.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Through Obscurity<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Hiding system details to protect from threats (not recommended as a primary security mechanism).<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740861313-6\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740861313-6\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >System Security<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Trusted Computing Base (TCB)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The combination of hardware, software, and controls that work together to enforce a security policy.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Perimeter<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The boundary that separates the TCB from the untrusted environment.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Reference Monitor<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> An abstract machine that mediates all access to objects, ensuring access controls are enforced.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Kernel<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Core part of an operating system responsible for managing system resources and security controls.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740861634-9\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740861634-9\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Cryptography<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Symmetric Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Uses a single key for both encryption and decryption (e.g., AES, DES).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Asymmetric Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Uses a pair of keys (public and private) for encryption and decryption (e.g., RSA, ECC).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Hash Functions<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Generates a fixed-size output (hash) from input data (e.g., SHA-256).<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Digital Signatures<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Provides authentication, integrity, and non-repudiation.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740861871-6\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740861871-6\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Network Security<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Firewalls<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Act as a barrier between trusted and untrusted networks, controlling traffic based on pre-defined rules.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>VPN (Virtual Private Network)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Encrypts data transmitted over the internet to provide secure access.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Intrusion Detection Systems (IDS)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Monitors network traffic for suspicious activities and alerts.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Intrusion Prevention Systems (IPS)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Monitors network traffic and actively blocks threats.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740862161-3\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740862161-3\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Security Assessment<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Vulnerability Assessment<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Scanning systems for known security weaknesses.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Penetration Testing<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Simulating an attack to identify potential vulnerabilities.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Threat Modeling<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Identifying potential threats and vulnerabilities to design effective security measures.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740862408-1\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740862408-1\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Cloud Security<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>IaaS, PaaS, SaaS<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding the differences in service models and the shared responsibility model.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Serverless Computing<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Security considerations for serverless environments where the cloud provider manages infrastructure.<\/span><\/span><\/li>\n<li><span style=\"font-family: Calibri; font-size: 11pt; color: #000000;\"><strong>Data Portability and Encryption<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"><span style=\"color: #000000;\"> Importance of encrypting data in transit and at rest within cloud<\/span> <\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740862638-9\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740862638-9\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Emerging Technologies<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Internet of Things (IoT)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Understanding the security implications of interconnected devices.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Artificial Intelligence (AI)<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Security considerations for AI-driven systems.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Blockchain<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Decentralized ledger technology providing secure, immutable transactions.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd><dt class=\"\">\r\n        \t<a class=\"ult-tabto-actitle withBorder ult_a\" id=\"1726740862873-3\" style=\"color:#74777b;border-color:#333333;;background-color:#e7ecea;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;border-bottom-color:transparent;border-bottom-width:0px;border-bottom-style:solid;\" href=\"#1726740862873-3\">\r\n        \t\t<i class=\"accordion-icon\"><\/i>\r\n        \t\t\t<span class=\"ult_tab_main ult_ac_mainBoth\">\r\n\t\t\t\t\t   <span  data-ultimate-target='#advanced-tabs-wrap-6831 .ult-span-text'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"\"}'  class=\"ult-span-text ult_acordian-text ult-responsive\" style=\";color:inherit \" >Secure System Engineering<\/span>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t\t   <div class=\"aio-icon none \" style=\"color:#74777b;font-size:15px;\" data-iconcolor=\"#74777b\" data-iconhover=\"#ffffff\">\r\n\t\t\t\t\t   <i class=\"    ult_tab_icon\"  ><\/i>\r\n\t\t\t\t\t   <\/div>\r\n\t\t\t\t\t<\/a><\/dt>\r\n            \t\t<dd class=\"ult-tabto-accordionItem ult-tabto-accolapsed\">\r\n\t\t\t            <div class=\"ult-tabto-acontent\" style=\"border-style:none; border-radius:3px;color:#74777b;\">\r\n\t\t\t               <div class=\"nectar-fancy-ul\" data-list-icon=\"icon-salient-thin-line\" data-animation=\"false\" data-animation-delay=\"0\" data-color=\"accent-color\" data-spacing=\"default\" data-alignment=\"left\"> \n<ul>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>Security Architecture<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> Design and structure of systems to align with security policies and requirements.<\/span><\/span><\/li>\n<li><span style=\"color: #000000;\"><span style=\"font-family: Calibri; font-size: 11pt;\"><strong>System Assurance<\/strong>:<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> The level of confidence that a system is free from vulnerabilities and functions as intended.<\/span><\/span><\/li>\n<\/ul>\n <\/div>\r\n\t\t\t            <\/div>\r\n        \t<\/dd>\r\n    \t<\/dl>\r\n    <!--<div class=\"extraborder\" style=\"background-color:#4f90d1\"><\/div>-->\r\n<\/div>\r\n\r\n<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Terms &amp; Definitions&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_wp_custommenu][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;]<div id=\"ultimate-heading-655569e96b8f8a4b3\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-655569e96b8f8a4b3 uvc-6525 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-655569e96b8f8a4b3 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_03: Key Terms &amp; Definitions<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cryptology: The science of secure communication<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cryptography: Secret Writing. Creating messages whose meaning is hidden<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cryptanalysis: The science of breaking encrypted messages (recovering their meaning).<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cipher: A cryptographic algorithm<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Encryption: Process by which plaintext is converted to ciphertext with a key, using a cipher. (Encipher)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Decryption: Process by which ciphertext is converted to plaintext (with the key) by the use of a cipher. (Decipher)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Kerckhoff\u2019s Principle: Only the key should be kept secret. Algorithms should be publicly known.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Algorithm: Set of mathematical rules used in encryption and decryption<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Key: Secret sequence of bits and instructions that governs the act of encryption and decryption<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Work factor: Estimated time, effort, and resources necessary to break a cryptosystem<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Diffusion: The order of the plaintext is dispersed in the ciphertext<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Confusion: Creating a random relationship between the plaintext and the ciphertext<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Substitution: Replaces one character with another, which provides diffusion<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Permutation (Transposition): Provides confusion by rearranging the plaintext characters (like an anagram)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Modular Math: Shows what remains Y=25th letter. C=3rd letter. Y+C=B (b\/c 25+3=28. 28-26=2 B=2nd letter)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">XOR (Exclusive Or): Combining a key with a plaintext via XOR creates ciphertext (0+0=0 0+1=1 1+1=0 1+0=1)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Monoalphabetic Cipher: Uses ONE alphabet (A becomes X)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">PolyAlphabetic Cipher: Uses two or more alphabets (A becomes X) (X becomes M) \u2026<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Running Key Cipher (Book Cipher): Substitution cipher using books, or some other<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">known source. Agree on the source, then note the page#, line#, and word offset. Uses whole words at each position.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Scytale Cipher: Spartans. Wrap cloth around a rod and write down all the strips of cloth. Unwind to encrypt.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Caesar Cipher (Rotation Cipher): Monoalphabetic rotation cipher. Key is # of places to shift in alphabet (3: A=D)<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Vigenere Cipher: Polyalphabetic cipher. Alphabet repeated 26 times in a Vigenere Square.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">One-Time Pad (Vernam Cipher): Unbreakable cipher. Key is as many bits as message. Key Mgmt issues.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Steganography: Hiding or embedding data (not encrypting) in an image.<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Digital Signature: A hash value encrypted with a private key<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Digital Certificate: A public key signed with a digital signature<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Key Areas&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-724869e96b8f8a4cf\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-724869e96b8f8a4cf uvc-6081 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-724869e96b8f8a4cf h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain_03: Key Areas<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cryptography<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Concepts of secure design principles<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Security models fundamental principles<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Security capabilities of information system<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Cryptography: Concepts, methodologies, and practices<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Physical security<\/li>\n<li style=\"font-family: Calibri; font-size: 11pt;\">Secure protocol and design components<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Security Architecture &amp; Engineering_Mindmap&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-302869e96b8f8a4e6\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-302869e96b8f8a4e6 uvc-2716 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-302869e96b8f8a4e6 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 03 - Security Architecture &amp; Engineering_Mindmap<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_raw_html]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[\/vc_raw_html][nectar_btn size=&#8221;small&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;Accent-Color&#8221; icon_family=&#8221;none&#8221; text=&#8221;Full Screen&#8221; url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp_mindmap_domain-03\/&#8221;]\r\n\t\t\t<div class=\"ult_dual_button  ult-adjust-bottom-margin to-center  \"  data-response=\"on\" id=\"ult_btn_3991954904\">\r\n\r\n\t\t\t<div id=\"dualbtn-8426\" class=\"ulitmate_dual_buttons ult-dual-btn ult_main_dualbtn \" data-bcolor=\"#333333\"data-bhcolor=\"\">\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template bt1 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/Domain_03_Manual_pdf.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-before with-text place-template ult_dual1\" style=\";margin-right:px;;background-color:#ffffff !important;; border-color:#333333;border-style:;border-width:0px;border-radius:px;;\">\r\n\t\t\t<span class=\"ult-dual-btn-1 Style 1\" style=\"\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"icon-simple icon-left1 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;\">\n\t<i class=\"Defaults-file-pdf-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<span class=\"text-btn ult-dual-button-title ult-responsive\"  data-ultimate-target='#dualbtn-8426 .ult-dual-button-title'  data-responsive-json-new='{\"font-size\":\"desktop:15px;\",\"line-height\":\"desktop:15px;\"}'  style=\"font-weight:normal;color:#333333;\">Download PDF Format<\/span>\r\n\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><span class=\"middle-text\" style=\"line-height: 1.8em;color:#ffffff;background-color:#333333;border-width:0px;\">\r\n\t\t\t<span class=\"middle-inner\"  >or<\/span>\r\n\t\t\t<\/span>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<div class=\"ult_dualbutton-wrapper btn-inline place-template btn2 \"><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/Domain_03_Manual_Img.zip\" target=\"_blank\" rel=\"noopener\"  class=\"ult_ivan_button round-square with-icon icon-after with-text place-template ult_dual2\"  style=\";background-color:#ffffff !important;;margin-left:px;;border-color:#333333;border-style:;border-width:0px;border-radius:px;\">\r\n\t\t\t<span class=\"ult-dual-btn-2 Style 1\"  data-bgcolor=\"#ffffff\" data-bghovercolor=\"#bcbcbc\" data-icon_color=\"#333333\" data-icon_hover_color=\"#333333\" data-textcolor=\"#333333\" data-texthovercolor=\"#333333\" data-iconbgcolor=\"transperent\" data-iconbghovercolor=\"transperent\" data-iconborder=\"transperent\" data-iconhoverborder=\"transperent\" >\r\n\t\t\t<span class=\"text-btn ult-dual-button-title\" style=\"font-weight:normal;color:#333333;\">Download JPG Format<\/span>\r\n\r\n\t\t\t<span class=\"icon-simple icon-right2 ult_btn1span \"  style=\"; \">\n<span class=\"aio-icon btn1icon none \"  style=\"color:#333333;font-size:32px;display:inline-block;\">\n\t<i class=\"Defaults-file-image-o file-photo-o file-picture-o\" ><\/i>\n<\/span><\/span>\r\n\t\t\t<\/span>\r\n\t\t\t<\/a><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Domain 03: Practise Tests&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69e96b8f8a562\" data-id=\"69e96b8f8a562\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-848669e96b8f8a575\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-848669e96b8f8a575 uvc-473 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-848669e96b8f8a575 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 03: Practise Tests<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><a href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp_practice-questions-option_03\/\" target=\"_blank\" rel=\"noopener\">CISSP Practice Set_01: Security Architecture &amp; Engineering<\/a><\/li>\n<\/ul>\n[\/vc_column_text][image_with_animation image_url=&#8221;10545&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;][image_with_animation image_url=&#8221;10555&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;]<div class=\" ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-large \" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp_practice-questions-option_03\/\" target=\"_blank\" rel=\"noopener\" ><button type=\"button\" id=\"ubtn-9512\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-large ubtn-no-hover-bg  ulta-pulse  ubtn-center   tooltip-69e96b8f8a5a0\"  data-hover=\"\" data-border-color=\"\" data-bg=\"#3452ff\" data-hover-bg=\"\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-9512'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Ubuntu&#039;;font-weight:700;border:none;background: #3452ff;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:\"><\/span><span class=\"ubtn-data ubtn-text \" >Practice Set 01<\/span><\/button><\/a><\/div>[divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Domain 03: Flashcard&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69e96b8f8a5e6\" data-id=\"69e96b8f8a5e6\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-731769e96b8f8a5f7\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-731769e96b8f8a5f7 uvc-1058 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-731769e96b8f8a5f7 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Domain 03: Flashcard<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><a href=\"https:\/\/sajinshivdas.com\/cissp-flashcard_domain_03-security-architecture-and-engineering\/\">CISSP Flashcard Set_01: Security Architecture &amp; Engineering<\/a><\/li>\n<\/ul>\n[\/vc_column_text][image_with_animation image_url=&#8221;10553&#8243; image_size=&#8221;medium_large&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;center&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;100%&#8221; max_width_mobile=&#8221;default&#8221;]<div class=\" ubtn-ctn-center \"><a class=\"ubtn-link ult-adjust-bottom-margin ubtn-center ubtn-large \" href=\"https:\/\/sajinshivdas.com\/cissp-flashcard_domain_03-security-architecture-and-engineering\/\" target=\"_blank\" rel=\"noopener\" ><button type=\"button\" id=\"ubtn-3160\"  class=\"ubtn ult-adjust-bottom-margin ult-responsive ubtn-large ubtn-no-hover-bg  ulta-pulse  ubtn-center   tooltip-69e96b8f8a61e\"  data-hover=\"\" data-border-color=\"\" data-bg=\"#3452ff\" data-hover-bg=\"\" data-border-hover=\"\" data-shadow-hover=\"\" data-shadow-click=\"none\" data-shadow=\"\" data-shd-shadow=\"\"  data-ultimate-target='#ubtn-3160'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-family:&#039;Ubuntu&#039;;font-weight:700;border:none;background: #3452ff;color: #ffffff;\"><span class=\"ubtn-hover\" style=\"background-color:\"><\/span><span class=\"ubtn-data ubtn-text \" >Flashcard Set 01<\/span><\/button><\/a><\/div>[divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Resources&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69e96b8f8a655\" data-id=\"69e96b8f8a655\" data-height=\"10\" data-height-mobile=\"10\" data-height-tab=\"10\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div id=\"ultimate-heading-220869e96b8f8a666\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-220869e96b8f8a666 uvc-3080 \" data-hspacer=\"line_only\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-220869e96b8f8a666 h3'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h3 style=\"font-weight:bold;color:#3452ff;\">Resources<\/h3><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>(ISC)2 CISSP Official Study Guide (OSG) 9th Edition<\/strong>\u00a0by Mike Chapple, James Michael Stewart, and Darril Gibson<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Chapter 06 &#8211; Chapter10, Pg219-489<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>CISSP All-in-One Exam Guide, Ninth Edition <\/strong>by Fernando Maymi and Shon Harris<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Part III, Pg283-417<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Eleventh Hour CISSP\u00ae Study Guide, Third Edition <\/strong>by Eric Conrad, Seth Misenar, Joshua Feldma<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-03, Pg47-93<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Destination Certification &#8211; A Concise Guide <\/strong>by Rob Witcher, John Berti, Lou Hablas, Nick Mitropoulos<\/span>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-03, Pg97-235<\/span><\/li>\n<\/ul>\n<\/li>\n<li>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><strong>The Official (ISC)2 CISSP CBK Reference, 6th Edition<\/strong> by Arthur Deane and Aaron Kraus<\/p>\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Domain-03, Pg147-281<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n[\/vc_column_text]<div id=\"ultimate-heading-759369e96b8f8a67c\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-759369e96b8f8a67c uvc-2607 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-759369e96b8f8a67c h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Books Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div><div id=\"ultimate-heading-76169e96b8f8a690\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-76169e96b8f8a690 uvc-5040 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-76169e96b8f8a690 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Practice Tests Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>(ISC)2 CISSP Official Practice Tests <\/strong>by Mike Chapple and David Seidl<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>How to Think Like a Manager for the CISSP Exam <\/strong>by Luke Ahmed<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Boson Practice Exam<\/strong><\/span><\/li>\n<li><a href=\"https:\/\/www.studynotesandtheory.com\/signup\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Study Notes and Theory (SNT) by Luke Ahmed<\/strong><\/span><\/a><\/li>\n<\/ul>\n[\/vc_column_text]<div id=\"ultimate-heading-687269e96b8f8a6a3\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-687269e96b8f8a6a3 uvc-4910 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-687269e96b8f8a6a3 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Videos Reference<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Mike Chapple\u2019s <\/strong>CISSP Cert Prep on LinkedIn Learning.<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Kelly Handerhan\u2019s <\/strong>CISSP Prep Course on Cybrary<\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Destination CISSP <a href=\"https:\/\/www.youtube.com\/watch?v=hf5NwUSEkwA&amp;list=PLZKdGEfEyJhLd-pJhAD7dNbJyUgpqI4pu\">Mindmap Video<\/a><\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Pete Zerger&#8217;s <a href=\"https:\/\/www.youtube.com\/playlist?list=PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD\">CISSP Exam Cram<\/a>\u00a0<\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Prabh\u2019s <a href=\"https:\/\/www.youtube.com\/playlist?list=PL0hT6hgexlYx6ofKAChVOeQCi4AkV8YXL\">Coffee Shots<\/a><\/strong><\/span><\/li>\n<li><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"><strong>Luke Ahmed&#8217;s <a href=\"https:\/\/www.studynotesandtheory.com\/signup\">Study Notes and Theory (SNT)\u00a0<\/a><\/strong><\/span><\/li>\n<\/ul>\n[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;credits&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-278169e96b8f8a6b6\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-278169e96b8f8a6b6 uvc-9206 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-278169e96b8f8a6b6 h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Credits &amp; Disclaimer<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We express our gratitude to the below-mentioned authors, creators, and sources which have been referred for the creation of our Interactive CISSP Mindmap &#8211; <\/span><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mike Chapple and David Seidl (OSG), Luke Ahmed (SNT), Pete Zerger (Exam Cram), Prashant Mohan (Memory Palace) , Prabh (Coffee shots), Rob Witcher (destcert.com\/)\u00a0 and M. Waleed Khaliq (CISSP Concepts Guide).<\/span><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">This Mindmap has been meticulously created to ensure that information is shared effectively. This Mindmap aims to offer a thorough grasp of essential concepts with a dedication to assist enhanced learning experiences. We hope that this resource helps people absorb information more thoroughly, which will lead to a broader understanding of each CISSP domains and is freely available for all.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Contribution&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div id=\"ultimate-heading-970069e96b8f8a6ca\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-970069e96b8f8a6ca uvc-3321 \" data-hspacer=\"line_only\"  data-halign=\"left\" style=\"text-align:left\"><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-970069e96b8f8a6ca h4'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h4 style=\"font-weight:bold;color:#3452ff;\">Contribution<\/h4><\/div><div class=\"uvc-heading-spacer line_only\" style=\"topheight:2px;\"><span class=\"uvc-headings-line\" style=\"border-style:solid;border-bottom-width:2px;border-color:#000000;width:autopx;\"><\/span><\/div><\/div>[vc_column_text]<span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">We have already included some reference images and short notes for most of the topics so that users can more effectively refer to the content in the mindmap. If you have any information, images, or notes that can make the mindmap more effective, please feel free to share them.<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/tree\/main\/CISSP_Domain_03\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/tree\/main\/CISSP_Domain_03<\/span><\/a><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">For issues and concern please feel free to raise a issue in Github link <a href=\"https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/issues\">https:\/\/github.com\/sajinshivdas\/CISSP_Interactive_Mindmap\/issues<\/a><\/span><\/p>\n<p><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Connect with me <a href=\"http:\/\/www.linkedin.com\/in\/sajin-shivdas\">www.linkedin.com\/in\/sajin-shivdas<\/a><\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;]<div class=\"ult-spacer spacer-69e96b8f8a6e1\" data-id=\"69e96b8f8a6e1\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><div style='display:none;' class='shareaholic-canvas' data-app='follow_buttons' data-title='CISSP Interactive Mindmap - Domain 3: Security Architecture &amp; Engineering' data-link='https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/' data-app-id='28704193'><\/div>\n[\/vc_column_text]<div class=\"ult-spacer spacer-69e96b8f8a743\" data-id=\"69e96b8f8a743\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div>[\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Related Mindmaps&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;.vc_custom_1706288241725{margin-bottom: 50px !important;}&#8221;]\n<h3 style=\"text-align: center;\">Related Mindmaps<\/h3>\n<p style=\"text-align: center;\"><em>\u00a0Find the related mindmaps of CISSP Domains below.<\/em><\/p>\n[\/vc_column_text][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1504187365562{margin-bottom: 2% !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-shield&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-domain-1\/&#8221;]\n<h5>CISSP Domain_01<\/h5>\n<p><em>Security And Risk Management.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-book&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mindmap-asset-security\/&#8221;]\n<h5>CISSP Domain_02<\/h5>\n<p><em>Asset Security.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-microchip&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/&#8221;]\n<h5>CISSP Domain_03<\/h5>\n<p><em>Security Architecture &amp; Engineering.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;steadysets&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/domain-4-communication-and-network-security\/&#8221; icon_steadysets=&#8221;steadysets-icon-connection-75&#8243;]\n<h5>CISSP Domain_04<\/h5>\n<p><em>Communication and Network Security.<\/em>[\/fancy_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; css=&#8221;.vc_custom_1504187365562{margin-bottom: 2% !important;}&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-address-card&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-5-identity-and-access-management\/&#8221;]\n<h5>CISSP Domain_05<\/h5>\n<p><em>Identity and Access Management.<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-user-secret&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-6-security-assessment-and-testing\/&#8221;]\n<h5>CISSP Domain_06<\/h5>\n<p><em>Security Assessment and Testing<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_fontawesome=&#8221;fa fa-user&#8221; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/cissp-mnemonic-memorization\/&#8221;]\n<h5>CISSP Mindmap<\/h5>\n<p><em>Mnemonic &amp; Memory Mindmap<\/em>[\/fancy_box][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/4&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][fancy_box box_style=&#8221;color_box_hover&#8221; icon_family=&#8221;fontawesome&#8221; link_new_tab=&#8221;true&#8221; color=&#8221;accent-color&#8221; color_box_hover_overlay_opacity=&#8221;default&#8221; box_alignment=&#8221;center&#8221; enable_border=&#8221;true&#8221; border_radius=&#8221;default&#8221; image_loading=&#8221;default&#8221; min_height=&#8221;120&#8243; icon_size=&#8221;25&#8243; link_url=&#8221;https:\/\/sajinshivdas.com\/cybersecurity\/threats-countermeasures\/&#8221; icon_fontawesome=&#8221;fa fa-bug&#8221;]\n<h5>CISSP Mindmap<\/h5>\n<p><em>Threats &amp; Countermeasures<\/em>[\/fancy_box][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;padding-2-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;left-right&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; centered_text=&#8221;true&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_gradient_text heading_tag=&#8221;h5&#8243; color=&#8221;extra-color-gradient-2&#8243; gradient_direction=&#8221;horizontal&#8221; text=&#8221;Complete Mindmaps&#8221; margin_bottom=&#8221;10&#8243;][vc_custom_heading text=&#8221;Complete list of Mindmaps related to Cybersecurity&#8221; font_container=&#8221;tag:h2|font_size:52|text_align:center|line_height:52px&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221;][vc_custom_heading text=&#8221;Cybersecurity Mindmaps&#8221; font_container=&#8221;tag:p|text_align:center|color:rgba(0%2C0%2C0%2C0.7)&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1707775606373{margin-top: 10px !important;margin-bottom: 10px !important;}&#8221;][nectar_btn size=&#8221;jumbo&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;regular&#8221; button_color_2=&#8221;extra-color-gradient-2&#8243; icon_family=&#8221;default_arrow&#8221; url=&#8221;https:\/\/sajinshivdas.com\/sajins-mind-maps\/&#8221; text=&#8221;Find More&#8221; css_animation=&#8221;zoomIn&#8221; margin_top=&#8221;30&#8243;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9319,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":{"0":"post-9064","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-documents-and-reference"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas<\/title>\n<meta name=\"description\" content=\"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas\" \/>\n<meta property=\"og:description\" content=\"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T22:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-19T10:28:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"CISSP Interactive Mindmap &#8211; Domain 3: Security Architecture &#038; Engineering\",\"datePublished\":\"2024-01-17T22:16:00+00:00\",\"dateModified\":\"2024-09-19T10:28:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/\"},\"wordCount\":6659,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/sajin_cissp_thumbnail_03.png\",\"articleSection\":[\"Documents and Reference\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/\",\"name\":\"CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/sajin_cissp_thumbnail_03.png\",\"datePublished\":\"2024-01-17T22:16:00+00:00\",\"dateModified\":\"2024-09-19T10:28:29+00:00\",\"description\":\"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/sajin_cissp_thumbnail_03.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/sajin_cissp_thumbnail_03.png\",\"width\":940,\"height\":788,\"caption\":\"CISSP Interactive Mindmap_thumbnail_03\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISSP Interactive Mindmap &#8211; Domain 3: Security Architecture &#038; Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas","description":"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/","og_locale":"en_US","og_type":"article","og_title":"CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas","og_description":"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2024-01-17T22:16:00+00:00","article_modified_time":"2024-09-19T10:28:29+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png","type":"image\/png"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"CISSP Interactive Mindmap &#8211; Domain 3: Security Architecture &#038; Engineering","datePublished":"2024-01-17T22:16:00+00:00","dateModified":"2024-09-19T10:28:29+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/"},"wordCount":6659,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png","articleSection":["Documents and Reference"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/","name":"CISSP Interactive Mindmap-Domain 3 | Sajin Shivdas","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png","datePublished":"2024-01-17T22:16:00+00:00","dateModified":"2024-09-19T10:28:29+00:00","description":"CISSP Interactive Mindmap Series is a collection designed to equip CISSP professionals with essential resources for exam","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2024\/01\/sajin_cissp_thumbnail_03.png","width":940,"height":788,"caption":"CISSP Interactive Mindmap_thumbnail_03"},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/cissp-interactive-mindmap-domain-3-security-architecture-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"CISSP Interactive Mindmap &#8211; Domain 3: Security Architecture &#038; Engineering"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/9064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=9064"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/9064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/9319"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=9064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=9064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=9064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}