Trevor Lee
HomeAboutCISSP Study LogContact

CISSP Study Log

This page tracks my CISSP preparation using the The ISC2 CISSP Official Study Guide, 10th Edition.
I log each study session with the chapters covered and notes on concepts, questions, or insights that stood out.

Progress

11 / 21 chapters logged

Filters

Chapter Coverage

Click any chapter to filter entries by chapter.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21

Showing 1-5 of 57 entries

2026-04-01
Reading
Notes
Chapters
Ch 11
Domains
D4

Network segmentation was discussed. It is the process of dividing a network into smaller networks to improve security and performance. Segmentation can be done at the physical, data link, network, or application layer, though it is most commonly done at the network layer using routers. There are physical, logical, and hybrid segmentation approaches. Microsegmentation is a more granular form of logical segmentation, typically enforced with firewalls to control traffic between segments. It is used to improve security and support regulatory compliance.

2026-03-28
Reading
Notes
Chapters
Ch 11
Domains
D4

Internet Protocol (IP) was introduced. It is a connectionless protocol that does not guarantee delivery or order of packets. It is a best-effort delivery protocol. IP addresses are 32-bit values used to identify a device on a network. IPv4 is the most common version of IP, while IPv6 is the newer version and uses 128-bit addresses. ARP was also introduced and is used to find the MAC address of a device on a network.

2026-03-25
Reading
Notes
Chapters
Ch 11
Domains
D4

DNS was introduced. It is a distributed system for resolving domain names to IP addresses. It is a hierarchical system, with the root domain at the top level. A DNS server can be authoritative for a domain. DNS poisoning is a type of attack where an attacker modifies DNS records to redirect users to a malicious website.

2026-03-22
Reading
Notes
Chapters
Ch 11
Domains
D4

The TCP/IP model was introduced. The 4 layers (link, internet, transport, and application) were explained. Common application protocols were mentioned, such as HTTP, FTP, SMTP, and POP3. TCP uses a three-way handshake to establish a connection. UDP was also mentioned and is a connectionless protocol.

2026-03-20
Reading
Notes
Chapters
Ch 11
Domains
D4

The OSI model was introduced. The 7 layers (physical, data link, network, transport, session, presentation, and application) were explained. A useful saying to remember the layers is: All Presidents Since Truman Never Did Pottery.

Showing 1-5 of 57 entries