DiscoverCISSP CentralCISSP Domain3 Section 5
CISSP Domain3 Section 5

CISSP Domain3 Section 5

Update: 2024-10-16
Share

Description

3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements

  • 3.5.1 Client-based systems
  • 3.5.2 Server-based systems
  • 3.5.3 Database systems
  • 3.5.4 Cryptographic Systems
  • 3.5.5 Operational Technology / Industrial Control Systems (ICS)
  • 3.5.6 Cloud-based Systems
  • 3.5.7 Distributed Systems
  • 3.5.8 Internet of Things (IOT)
  • 3.5.9 Microservices
  • 3.5.10 Containerization
  • 3.5.11 Serverless Computing
  • 3.5.12 Embedded systems
  • 3.5.13 High-Performance Computing systems
  • 3.5.14 Edge Computing Systems
  • 3.5.15 Virtualized systems

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

CISSP Domain3 Section 5

CISSP Domain3 Section 5