Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

CISSP Study Group

Public • 909 • Free

7 contributions to CISSP Study Group
Community Bootcamp starting Dec. 2nd
Hey everyone! Thanks to our amazing community, we’ve secured a fantastic group discount for a 5-day CISSP bootcamp, starting December 2nd for just $400 (normally $2,495)! 🎉 Because we’re doing this as a group, we’re able to get CertFirst instructor at a fraction of the cost. You’ll also get access to a full-length mock exam and a bank of practice questions. Joining is simple: just unlock the course in the classroom tab to secure your spot. We only have 10 spaces, so jump in soon if you’re interested! Sessions will be recorded, so you can participate at your own pace if needed. 👉 Attached is a PDF with full details, which you can also submit to your employer for reimbursement. Would love to have you with us!
8
20
New comment 14d ago
Community Bootcamp starting Dec. 2nd
1 like • 18d
Hi Vincent, I've been thinking about this the last few days, and I think I am interested but I'll need to talk to my boss on Tuesday about taking the time off. I'll let you know.
1 like • 14d
I'm in.
Quantitative Risk assessment
Your network contains Routers which typically fails once every five years. The total cost of a router is $200. A technician, who is paid $40 per hour, needs 2 hours to replace one failed router. 10 employees, who earn an average of $20 per hour, will be unproductive until the router is replaced. Which of the following is the ARO? (select the best answer)
Poll
31 members have voted
4
15
New comment 6d ago
2 likes • 21d
@Roshan Laloo - What was the answer to this one?
1 like • 19d
@Roshan Laloo Excellent! Thank you so much.
P.Q
**Scenario:** During a penetration test, your team successfully exploits a vulnerability and gains unauthorized access to a critical system. What should be the next step? A) Report the findings to management immediately B) Continue testing to identify more vulnerabilities C) Document the vulnerability and start remediation D) Notify the system owner to take immediate action
4
19
New comment 22d ago
0 likes • 22d
@Sara M That's hilarious.
Call for Volunteers: CISSP Prep Feedback
I need your help! We've been working hard on improving the CISSP Study Group over the past few months, and we’ve got even more exciting changes on the horizon. To make sure we’re heading in the right direction, I’d love to hear from you! I’m looking for a 10-15 volunteers to hop on a quick 10-15 minute call with me to share your experience and thoughts on prepping for the CISSP exam by answering a few simple questions. Your feedback is incredibly valuable and will help us continue to grow and support the community even better. If you’re interested, drop a comment below or send me a DM and we'll connect. Thank you in advance! I appreciate you help.
7
13
New comment 19d ago
1 like • 22d
Happy to jump on too, I have thoughts and ideas.
Curious about SSO versus FIM for SaaS...
Hi everyone, I understand the general concept of Single Sign On (SSO) versus FIM (Federated Identity Management). We have SSO at work for a lot of applications, and I'm sure I've seen FIM used on websites where you can log on with your GMail, Twitter or Instagram credentials. I am curious about the scenario where at work we log into a SaaS tool with our company SSO. Often a SaaS tool will literally have a button like 'Log on with company SSO' that takes the user on a different path from userid/password. I don't really know how this works on a technical level, but from a theoretical level would this be SSO or FIM? Also, apologies if there is no clear cut answer to this question... I can totally accept "It depends" as a response.
1
1
New comment 29d ago
1 like • 29d
For anyone that comes across this later and is curious... we discussed it in the study session and while it's all a complex grey area, if you have the option to connect via your company SSO into a SaaS, that's because the SaaS has integrated your organizations SSO into their platform... so it would be a SSO solution despite being outside the company firewalls.
1-7 of 7
Adam Waring
2
6points to level up
@adam-waring-6007
Excited to study and learn all the CISSP things.

Active 5h ago
Joined Sep 20, 2024
INTJ
powered by