{"id":5749,"date":"2019-04-18T20:33:42","date_gmt":"2019-04-18T19:33:42","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5749"},"modified":"2021-07-13T12:15:05","modified_gmt":"2021-07-13T11:15:05","slug":"understanding-cissp-requirements","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements","title":{"rendered":"Understanding CISSP Requirements"},"content":{"rendered":"<p>The CISSP certification was named the \u201cmost valued credential among employers by a margin of 3 to 1\u201d in\u00a0<a class=\"ext\" href=\"https:\/\/www.cybrary.it\/channelcontent\/2017-cybersecurity-trends-spotlight-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Trends<\/a>\u00a0Spotlight and Report. On LinkedIn, CISSP is the most required security certification for IT professionals working in this field. In this environment, it\u2019s imperative that MSPs are familiar with CISSP, what it stands for, and how to become CISSP certified.<\/p>\n<h3><b>What is CISSP?<\/b><\/h3>\n<p>CISSP stands for Certified Information Systems Security Professional. It\u2019s a certification offered by the (ISC)\u00b2, an international, nonprofit association for IT and cybersecurity professionals. The certification validates an IT professional\u2019s experience in designing, implementing, and managing cybersecurity programs.<\/p>\n<p>CISSP was introduced in 1994 and approved by the US Department of Defense shortly thereafter. It\u2019s the first security certification to meet the ISO\/IEC Standard 17024, making it the gold standard in cybersecurity qualifications. The certification is available in 114 countries, and there are around 129,000 professionals who currently hold the CISSP certification. It\u2019s a great way for IT professionals to set themselves apart as experienced and knowledgeable cybersecurity managers.<\/p>\n<h3><b>What are the requirements for CISSP certification?<\/b><\/h3>\n<p>Becoming certified as a CISSP is an involved process\u2014which may be why there are so few CISSP professionals relative to the global IT security population. There\u2019s an exam that a candidate must first qualify to take by having at least five years of paid work experience in two or more of the eight CISSP domains. A four-year college degree, a regional equivalent, or an additional credential from a pre-approved (ISC)\u00b2 list can be substituted for one year of requisite experience.\u00a0<img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignleft\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\" alt=\"\" width=\"443\" height=\"219\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/><\/p>\n<p>Newer IT professionals who don\u2019t have the requisite experience are still eligible to take the CISSP exam. However, they will not become full CISSP certified professionals\u2014rather they will become an Associate of (ISC)\u00b2 and have six years to earn the five years of experience necessary to be a CISSP.<\/p>\n<p>There are some caveats when it comes to what the (ISC)\u00b2 considers to be \u201cprofessional work experience.\u201d The association is looking for deep, meaningful professional experience, time dedicated specifically to at least two of their eight cybersecurity domains. As such, there are definitions as to what counts as \u201cexperience\u201d:<\/p>\n<ul>\n<li>Full-time experience: a minimum of 35\/hours a week for four weeks counts as one month of work experience.<\/li>\n<li>Part-time experience: cannot be less than 20 hours a week and no more than 34 hours a week.<\/li>\n<li>Both paid and unpaid internships count against the experience requirement, but to qualify, an applicant must submit verification of time worked on the organization\u2019s official letterhead.<\/li>\n<\/ul>\n<p>By those definitions, 1,040 hours of part-time experience is the equivalent of six months of full-time experience. In total, CISSP requirements include five years cumulative paid work experience\u2014so applicants need to make sure their full-time and part-time hours meet the strict definitions before embarking on the CISSP certification process.<\/p>\n<p>Applicants who have enough experience can take the CISSP exam. The exam is made up of 100 to 150 CISSP domain-related questions, and participants can take up to three hours. It\u2019s an expensive proposition: the CISSP exam for U.S. candidates is $549 or $599, depending upon whether you do an early registration or standard registration. Passing the CISSP exam means achieving a score of 700\/1000 or higher.<\/p>\n<p>The final step upon passing the exam is to complete an (ISC)\u00b2 endorsement within nine months of passing the exam. There is an online application to be endorsed by an (ISC)\u00b2-certified professional, i.e., someone who is already a part of the (ISC)\u00b2 association. The endorsement asks this member to attest that you have the professional experience. If you don\u2019t know anyone who is a CISSP or (ISC)\u00b2 certified, the organization can act as an endorser on your behalf. This final formality will be the last step to becoming a member of the (ISC)\u00b2\u2014CISSPs will need to recertify every three years, meaning you will take continuing professional education credits and pay an annual membership fee.<\/p>\n<h3><b>What are the 8 domains of CISSP?<\/b><\/h3>\n<p>The (ISC)\u00b2 CISSP requirements exam covers eight domains to certify that professionals have a holistic understanding of cybersecurity. Remember, you must have work experience in at least two of these domains in order to become certified.<\/p>\n<p><strong><em>1\/ Security and Risk Management<\/em><\/strong><\/p>\n<p>How can cybersecurity managers set expectations and guide organizations to recognize and mitigate\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/unified-threat-management-overview\">potential threats<\/a>? This domain covers topics such as standards for information security and setting up a framework for organizations to keep data safe. Questions are primarily concerned with how to establish security governance principles that:<\/p>\n<ul>\n<li>Align security with business strategy, goals, missions, and objectives<\/li>\n<li>Set forth guidelines for organizational processes (e.g., acquisitions, divestitures, governance committees)<\/li>\n<li>Delineate organizational roles and responsibilities<\/li>\n<li>Establish security control frameworks<\/li>\n<li>Maintain due care\/due diligence processes<\/li>\n<\/ul>\n<p>Compliance, ethics, regulatory, and legal issues are also covered under this section. Roughly 15% of the exam questions are concerned with Security and Risk Management, making this one of the biggest topics for CISSP verification.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>2\/ Asset Security<\/em><\/strong><\/p>\n<p>Questions covered under Asset Security are concerned with the physical management of information and device protection. Under this domain, applicants should know how to outline ownership rules for devices,\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/archiving-vs-backup-whats-difference\" target=\"_blank\" rel=\"noopener\">data storage<\/a>\u00a0accounts, databases, and more. Other questions might cover:<\/p>\n<ul>\n<li>Classifying information and assets<\/li>\n<li>How to maintain asset ownership and privacy<\/li>\n<li>Data security protocols and internal controls<\/li>\n<\/ul>\n<p>Asset Security questions are only about 10% of the exam, but nevertheless, it\u2019s an important part of cybersecurity in which all professionals should be well-versed.<\/p>\n<p><strong><em>3\/ Security and Architecture Engineering<\/em><\/strong><\/p>\n<p>This domain covers how to keep data and business information secure. This might entail knowledge on encryption methods and strategic deployment, how to keep physical sites secure, and recognizing and resolving vulnerabilities. This technical section will also cover ways to assess security vulnerabilities in:<\/p>\n<ul>\n<li>Web-based systems<\/li>\n<li>Mobile systems<\/li>\n<li>Embedded devices<\/li>\n<li>Client-based systems<\/li>\n<li>Server-based systems<\/li>\n<li>Database systems<\/li>\n<li>Cryptographic systems<\/li>\n<li>Cloud-based systems<\/li>\n<li>Internet of Things (IoT)<\/li>\n<li>Industrial Control Systems<\/li>\n<li>Distributed systems<\/li>\n<\/ul>\n<p>Applicants should also study on-site security, such as fire prevention, wiring closets, and other physical infrastructure that could present a vulnerability. It\u2019s estimated that 13% of exam questions cover this domain.<\/p>\n<p><strong><em>4\/ Communication and Network Security<\/em><\/strong><\/p>\n<p>CISSP professionals should know about communication and network security as it relates to creating secure communication channels for internal messaging. This covers emails, enterprise messaging, and more. This domain will include questions regarding:<\/p>\n<ul>\n<li>Secure network components, such as transmission media and Network Access Control (NAC) devices<\/li>\n<li>How to implement secure design principles in\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-to-design-a-network\" target=\"_blank\" rel=\"noopener\">network architectures<\/a><\/li>\n<li>Design best practices for implementing secure communication channels<\/li>\n<\/ul>\n<p>This is another big section on the exam: expect about 14% of the material to cover Communication and Network Security.<\/p>\n<p><strong><em>5\/ Identity and Access Management<\/em><\/strong><\/p>\n<p>Access Management is primarily concerned with who is able to\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/use-cases\/enterprise-data-backup\">access an enterprise\u2019s data<\/a>, as well as what internal controls are in place to restrict or grant user access. CISSP professionals should know how to establish individual login credentials, create protocols for off-site access, and more. Topics in this domain will include:<\/p>\n<ul>\n<li>Implementing authorization mechanisms, such as role-based access control (RBAC), rule-based access control, mandatory access control (MAC), and others<\/li>\n<li>Managing the identification and authentication of users and devices<\/li>\n<li>Controlling physical access to assets and sites<\/li>\n<\/ul>\n<p>Applicants can expect around 13% of the exam to be related to Identity and Access Management questions.<\/p>\n<p><strong><em>6\/ Security Assessment and Testing<\/em><\/strong><\/p>\n<p>A CISSP professional should be able to assess the effectiveness of different methods of security and identify vulnerabilities. This domain is similar to Security and Risk Management, but it covers the actual processes and methods one would use to test and monitor security. That might include topics such as:<\/p>\n<ul>\n<li>How to design and audit internal, external, and third-party security strategies<\/li>\n<li>How to conduct different security control tests<\/li>\n<li>Collecting key performance and risk indicators<\/li>\n<li>Internal, external, and third-party site security audits<\/li>\n<\/ul>\n<p>Overall, the exam is going to consist of 13% of Security Assessment and Testing topics. It\u2019s related heavily to the next domain topic, Security Operations.<\/p>\n<p><strong><em>7\/ Security Operations\u00a0<\/em><\/strong><\/p>\n<p>Like Security Assessment and Testing, this domain covers action items that security teams will perform regularly. Security Operations is of paramount importance in every industry, so it\u2019s a good domain to understand before sitting for the CISSP exam. How can security teams put their limited resources to best use securing an organization\u2019s information? Topics will include:<\/p>\n<ul>\n<li>How to understand and support security investigations<\/li>\n<li>Security provisioning, including asset management and inventory and configuration management<\/li>\n<li>How to conduct logging and monitoring activities<\/li>\n<li>Putting resource protection techniques into use<\/li>\n<\/ul>\n<p>There are many more topics covered under this domain, so pay close attention during your preparation. Security Operations questions will make up about 13% of the CISSP exam.<\/p>\n<p><strong><em>8\/ Software Development Security<\/em><\/strong><\/p>\n<p>Last, but not least, software development security concentrates on how IT professionals identify, buy, use, and analyze software to keep their information secure. Questions in this domain will cover items such as:<\/p>\n<ul>\n<li>Security in the Software Development Life Cycle (SDLC)<\/li>\n<li>How to assess a software\u2019s security effectiveness<\/li>\n<li>Secure coding guidelines and best practices<\/li>\n<\/ul>\n<p>This final domain is only 10% of the exam\u2019s questions, but important nonetheless.<\/p>\n<h3><b>Why get CISSP certified?\u00a0<\/b><\/h3>\n<p>CISSP certification verification has many benefits for managed services provider (MSPs). It can lead to higher billing rates and give you the growth and learning to stay apprised of evolving cybersecurity threats. According to the (ISC)\u00b2, CISSP members earn\u00a0<a class=\"ext\" href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Certifications\/Ultimate-Guides\/UltimateGuideCISSP-Web.ashx\" target=\"_blank\" rel=\"noopener noreferrer\">35% more<\/a>\u00a0than nonmembers. There are other tangible benefits to joining the (ISC)\u00b2, including discounts on industry conferences, webinars, and other professional development opportunities, and free or discounted subscriptions to magazines and other industry resources. Overall, CISSP gives IT professionals the background and knowledge they need to keep a company\u2019s data and network secure.<\/p>\n<p>Learn more about ways that CISSP-certified professionals are using information security products by\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\" target=\"_blank\" rel=\"noopener\">visiting our resource library.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5749","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding CISSP Requirements - N-able<\/title>\n<meta name=\"description\" content=\"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding CISSP Requirements - N-able\" \/>\n<meta property=\"og:description\" content=\"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-18T19:33:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T11:15:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Understanding CISSP Requirements\",\"datePublished\":\"2019-04-18T20:33:42+01:00\",\"dateModified\":\"2021-07-13T11:15:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\"},\"wordCount\":1611,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\",\"name\":\"Understanding CISSP Requirements - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\",\"datePublished\":\"2019-04-18T20:33:42+01:00\",\"dateModified\":\"2021-07-13T11:15:05+00:00\",\"description\":\"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding CISSP Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding CISSP Requirements - N-able","description":"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements","og_locale":"de_DE","og_type":"article","og_title":"Understanding CISSP Requirements - N-able","og_description":"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.","og_url":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-04-18T19:33:42+00:00","article_modified_time":"2021-07-13T11:15:05+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Understanding CISSP Requirements","datePublished":"2019-04-18T20:33:42+01:00","dateModified":"2021-07-13T11:15:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements"},"wordCount":1611,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg","articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements","url":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements","name":"Understanding CISSP Requirements - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg","datePublished":"2019-04-18T20:33:42+01:00","dateModified":"2021-07-13T11:15:05+00:00","description":"Learn about the main CISSP requirements necessary to become certified in cybersecurity and the eight CISSP domains that comprise the certification.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/04\/CISSP_body.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/understanding-cissp-requirements#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Understanding CISSP Requirements"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5749"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5749\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}