CBK 2021 Topics Missing From Mike Chapple’s “Official” CISSP Book

Public service announcement to all CISSP candidates:

Approximately 190 topics are missing from Mike Chapple’s Official CISSP Study Guide (9th Edition), which means that roughly 2/3 of the new content from the updated 2021 Common Body of Knowledge (CBK) is missing from his book. 

I was comparing Mr. Chapple’s Study Guide to the ISC2 source materials (Official CISSP Training Seminar, or Self-Paced Training) and began to keep track of all the new topics/words that were popping up but not appearing in Mike’s book.  One of the biggest questions candidates have, and the one that I get asked the most, is “which book should I purchase?”  Honestly at this point I can’t recommend any of them since a cursory review shows that all of these books are missing many of the same topics.  With so many topics missing, it’s become apparent that either the source material given to the authors by ISC2 is inconsistent or incomplete, or that the publisher’s/author’s staff who actually write the content didn’t do a thorough enough job in examining the source material. 

As a courtesy to CISSP candidates who rely on this book, I am providing a list of full topics & missing terminology here in the hopes that an update will be made to Mr. Chapple’s book. Since words are a big part of this exam, it’s imperative that a book holding the “Official” title (and one that is endorsed by ISC2) be fully updated with current terminology that is fully defined and explained. I am also providing this list so that candidates can be familiar with these terms in case they appear on the exam. 

I sent this list to Mike Chapple and his publisher.  I’ve also sent the list to multiple ISC2 email addresses.  Whether it’s an oversight by ISC2, or an oversight by Mike’s staff, the issue needs to be addressed.

Here is the list of missing topics:

DomainISC2 SELF PACED TRAINING OFFICIAL CISSP TRAINING SEMINAR (OFFICIAL CBK) (ISC)2 CISSP Official Study Guide 9th Edition – Mike Chapple
1Unilateral NDA Not covered
1Bilateral NDA Not covered
1Multilateral NDA Not covered
1Non-compete agreement Not covered
1Prudent actions Not covered
1Reasonable actions Not covered
1Data portability Not covered
1Data localization Not covered
1Restrictive defaults Not covered
1HITRUST Not covered
1Privacy Management Framework (PMF) Not covered
1SWIFT security control framework Not covered
1Cloud Security Alliance’s IOT security control framework Not covered
1Asset-based risk perspective (there are 4 risk perspectives in new CBK) Not covered
1Outcome-based risk perspective Not covered
1Vulnerability-based risk perspective Not covered
1Threat-based risk perspective Not covered
1Hazard (difference between hazard and risk – these are explicitly defined in the new CBK) Not covered
1Prioritize (the new pre-step before the standard 4 responses) Not covered
1Micro training Not covered
2Materials (CBK indicates there is a difference between materials and supplies) Not covered
2Supplies Not covered
2IT asset management lifecycle Not covered
2Planning (part of IT asset management lifecycle) Not covered
2Assigning security needs (part of IT asset management lifecycle) Not covered
2Acquiring (part of IT asset management lifecycle) Not covered
2Deployment (part of IT asset management lifecycle) Not covered
2Managing (part of IT asset management lifecycle) Not covered
2Retiring (part of IT asset management lifecycle) Not covered
2Kiosk service point Not covered
2Data security lifecycle (CSUSAD) Not covered
2Data lifecycle (note: there are two versions with different phases in the CBK) Not covered
2Pervasive encryption Not covered
2Enclave Not covered
3Complex Hybrid Cryptography Not covered
3Type 1 security Not covered
3Type 2 security Not covered
3Government cloud Not covered
3High performance computing systems Not covered
3Key space clumping Not covered
3Clustering/clumping of pseudorandom numbers Not covered
3Deterministic decryption Not covered
3Remote key management services Not covered
3Client-side key management Not covered
3Contact devices Not covered
3Contact alarms Not covered
3Solid core / hollow core Not covered
3High density equipment Not covered
3Very Early Smoke Detection Apparatus (VESDA) Not covered
3Aqueous Firefighting Foam (AFFF) Not covered
3Non-conductive, nontoxic liquid suppressants (Novec) Not covered
3Balanced Magnetic Switch (BMS) Not covered
3Infrared Linear Beam Sensors Not covered
3Automatic Request to Exit Not covered
3Dual-Technology Sensors Not covered
3Condition monitoring Not covered
3Bricking Not covered
4Unbound network Not covered
4Acoustic waves Not covered
4Line driver Not covered
4Multiplexer Not covered
4Dense-wave division multiplexer (DWDM) Not covered
4Infiniband Not covered
4Broadband over power line Not covered
4Frequency division multiplexing Not covered
4PPPoE Not covered
4Arbitration Not covered
4Deconfliction Not covered
4Polling protocols Not covered
4Contention-based protocols Not covered
4Anycast Not covered
4Geocast Not covered
4Native IPv6 Not covered
4IPv6 at the edge Not covered
4Routed protocol Not covered
4Autonomous systems (ASN) Not covered
4Area border router Not covered
4DHCPV6 Not covered
4Modbus or Mod bus Not covered
4east bound interface Not covered
4west bound interface Not covered
4Root of trust Not covered
4Trust anchor Not covered
4Hardware-based ROT (root of trust) Not covered
5Strong Star Propery Not covered
5Access Control As A System Not covered
5Physical Access Token Not covered
5Logical Access Token Not covered
5Hybrid Identity as a Service Not covered
5User behavior review (part of identity lifecycle) Not covered
5Job or duties review (part of identity lifecycle) Not covered
5Permission aggregation Not covered
5Dual custody Not covered
5Identity store Not covered
5FICAM Not covered
5Sponsorship (step 1 of 5 in FICAM) Not covered
5Enrollment/registration (step 2 of 5 in FICAM) Not covered
5Credential production (step 3 of 5 in FICAM) Not covered
5Issuance (step 4 of 5 in FICAM) Not covered
5Credential lifecycle management (step 5 of 5 in FICAM) Not covered
6Formal assessment Not covered
6Informal assessment Not covered
6Condition (component of finding) Not covered
6Criteria (component of finding) Not covered
6Cause (component of finding) Not covered
6Effect (component of finding) Not covered
6Recommendation (component of finding) Not covered
6No notice assessment Not covered
6Trust services criteria Not covered
6SOC reports for cloud and data centers Not covered
6Conducting a SOC audit (two phases) Not covered
6Internal audit steps (chartering, testing, reporting, remediation) Not covered
6External audit steps (chartering, pre-audit planning, audit execution, audit reporting) Not covered
6Compliance audit (CBK now defines “types” of audits) Not covered
6Financial audit Not covered
6Operational audit Not covered
6Information systems audit Not covered
6Integrated audit Not covered
6Forensic audit Not covered
6NCSC (12 principles) Not covered
6Substantive test Not covered
6Ethical penetration testing (includes steps/methodology: chartering, discovery, scanning, exploitation, reporting) Not covered
6Rules of engagement Not covered
6Bug bounty Not covered
6Blind test Not covered
6Double-blind test Not covered
6Continuous full-cycle testing Not covered
6Chaos engineering Not covered
6Service-level agreement validation (in the context of synthetic performance monitoring) Not covered
6Six sigma approach (five steps) Not covered
6Plan-do-check-act (four steps) Not covered
6Non-disclosure (in the context of ethical disclosure) Not covered
6Full disclosure (in the context of ethical disclosure) Not covered
6Responsible disclosure (in the context of ethical disclosure) Not covered
6Mandatory reporting Not covered
6Whistleblowing Not covered
7Desk check Not covered
7Self hosted, self-managed Not covered
7Cloud SIEM, self-managed Not covered
7Hybrid self-hosted Not covered
7SIEM as a service Not covered
7Precursor (CBK differentiates from indicator) Not covered
7External threat intelligence Not covered
7Internal threat intelligence Not covered
7Request for Change (RFC) Not covered
7Change management activities (initiation, review/approval, implementation and evaluation, release/deployment planning/control) Different activities
7NIST Forensic cycle (collection, examination, analysis, reporting) Not covered
7Incident response activities (preparation, detection, analysis, response/mitigation, recovery, remediation, reporting, review & improvement) Different phases
73-2-1 backup strategy Not covered
7Cloud backup as a service Not covered
7RAID 15 and 51 Not covered
8Software Quality Assurance Not covered
8Software Assurance During Acquisition (Five Phases) Not covered
8Non-functional requirements Not covered
8Unit Test Not covered
8Bounds Checking Not covered
8Known-good data (testing) Not covered
8Software assurance policy Not covered
8Orphaned Software Not covered
8Network Database Management Model Not covered
8CODASYL Not covered
8Strongly typed Not covered
8Weakly typed Not covered
8Privileged applets (sandbox) Not covered
8Java Network Launch Protocol Not covered
8CLASSPATH Not covered
8Class loader Not covered
8Native libraries Not covered
8High granularity Not covered
8Low granularity Not covered
8System Lifecycle (SLC) Not covered
8SDLC Covered, but conflicting info
8IPPD Not covered
8Partnership for Systems Approaches to Safety and Security (PSASS) Not covered
8Intermediate code Not covered
8Refactoring Not covered
8Level of abstraction Not covered
8Lower order languages Not covered
8Code protection/logic hiding Not covered
8Constraint based/logic programming Not covered
8Business need identification (4 steps: Ask, evaluate, agree, document) Not covered
8Between the lines Not covered
8Bypass attack Not covered
8Data contamination Not covered
8Query attacks Not covered
8Data lake Not covered
8Data farm Not covered
8Non-relational database Not covered
8Probabilistic method Not covered
8Statistical approach Not covered
8Deviation and trend analysis (as part of KDD) Not covered

1 thought on “CBK 2021 Topics Missing From Mike Chapple’s “Official” CISSP Book

  1. David Griffiths

    In Mike Chapple’s YouTube video “CISSP: What’s Changing in 2021?”
    ( https://www.youtube.com/watch?v=ERi6uB6qyHQ ) at minute 8:02, he specifically mentions that there are very few changes, for example, to Domain 3 which completely contradicts the actuality.
    So, in defense, I strongly suspect it is the source material given to Chapple by ISC2 that was incomplete. (And I hate his books.)

    Thank you for highlighting this issue. You have probably saved me from a train wreck in my upcoming exam.

    David Griffiths

Comments are closed.