CISA STUDY HELP AND TIPS

HOW TO PREPARE CISSP
CISA is a piece of cake. CISSP is very tough and detailed. If you don't have an IT background then it would be very difficult to clear this exam (sorry for being upfront). But if you are determined to do it then you must go for it.

To pass CISSP do the following:
1. Shon Harris (Author) - CISSP All-in-One version 4.0 study guide 
2. Shon Harris Video tutorials 
3. Free practice tests on http://www.cccure.org/ website. If you can do all these thoroughly then you have better chance of passing this exam. 

Mind you, the practice tests on http://www.cccure.org/ will help you clearing and memorizing some concepts but you won't see even a single question from this website or any other practice tests (paid or un-paid) in the exam. So, don't rely on these practice questions for the exam. CISSP exam is all about how you study and your over all experience. 

 Hope it helps.
_____________________________________________________________________________
While preparing for CISA, never think that the questions will be repeated from question dumps. By reading the CRM and the question dumps one should have the conceptual understanding. The question dumps gives the idea how the questions are framed. While answering the questions try to eliminate the two wrong answers first and choose the best out of two then analyse each answer why it is wrong/right. So one must thoroughly understand the question before answering, the same question with a small change will be different.
______________________________________________________________________________
Consensus Audit Guidelines Draft 1.0 on SANS
Twenty Most Important Controls and Metrics for Effective Cyber Defence and Continuous FISMA Compliance .
* Consensus Audit Guidelines - Introduction (Draft 1.0)
* Critical Control 1: Inventory of authorized and unauthorized hardware.
* Critical Control 2: Inventory of authorized and unauthorized software; enforcement of white lists of authorized software.
* Critical Control 3: Secure configurations for hardware and software on laptops, workstations, and servers.
* Critical Control 4: Secure configurations of network devices such as firewalls, routers, and switches.
* Critical Control 5: Boundary Defence
* Critical Control 6: Maintenance, Monitoring and Analysis of Complete Audit Logs
* Critical Control 7: Application Software Security
* Critical Control 8: Controlled Use of Administrative Privileges
* Critical Control 9: Controlled Access Based On Need to Know
*Critical Control 10: Continuous Vulnerability Testing and Remediation
* Critical Control 11: Dormant Account Monitoring and Control
* Critical Control 12: Anti-Malware Defences
* Critical Control 13: Limitation and Control of Ports, Protocols and Services
* Critical Control 14: Wireless Device Control
* Critical Control 15: Data Leakage Protection
* Critical Control 16: Secure Network Engineering
* Critical Control 17: Red Team Exercises
* Critical Control 18: Incident Response Capability
* Critical Control 19: Data Recovery Capability
* Critical Control 20: Security Skills Assessment and Appropriate Training To Fill GAPS.
__________________________________________________________

The information and knowledge in this website are for educational purposes. Our purpose is to help student study and pass the examination more effectively. Information and knowledge used are provided or collected from various Internet sources, email, what's app, telegram ect. I shall not be liable to any wrong doing or violation of laws by anyone that uses the knowledge or information in this website.