Topics Missing From The All-In-One CISSP Exam Guide 9th Edition

If you have purchased, or are about to purchase the Shon Harris CISSP All-In-One Exam Guide, buyer beware:

Approximately 193 topics are missing, which means that (similar to the Mike Chapple book) roughly 2/3 of the new content from the updated 2021 Common Body of Knowledge (CBK) is missing.  The odd thing is, the lists are quite different. Meaning that the Harris book covers topics that the Chapple book doesn’t, and vice versa (which doesn’t make any sense!)

If you’ve read my other post, you know what I’ve been doing so I won’t repeat it here, but as a courtesy to CISSP candidates who rely on the Shon Harris brand, I am providing a list of full topics & missing terminology here in the hopes that an update will be made.  I am also providing this list so that candidates can be familiar with these terms in case they appear on the exam. 

I will send this list to the publisher, McGraw Hill over the next few days.  Whether it’s an oversight by ISC2, or an oversight by the author and his staff, the issue needs to be resolved.

Here is the list of missing topics:

DomainISC2 SELF PACED TRAINING Directly from ISC2All-In-One Exam Guide 9th Edition – Shon Harris
1Unilateral NDANot covered
1Bilateral NDANot covered
1Multilateral NDANot covered
1Non-compete agreementNot covered
1Prudent actionsNot covered
1Reasonable actionsNot covered
1Data portabilityNot covered
1Data localizationCovered
1GDPR privacy principlesNot covered
1Article 5 (accountability)Not covered
1Public chapterCalled public domain
3Secure defaultsCovered
3Restrictive defaultsNot covered
3Zero trustCovered
3Privacy by designCovered
3Trust but verifyCovered
1HITRUSTNot covered
1Privacy Management Framework (PMF)Not covered
1SWIFT security control frameworkNot covered
1Cloud Security Alliance’s IOT security control frameworkNot covered
1Maximum Allowable OutageStill called MTD
1Lessons learned (phase of disaster recovery/biz continuity)Covered
1Asset-based risk perspective (there are 4 risk perspectives in new CBK)Not covered
1Outcome-based risk perspectiveNot covered
1Vulnerability-based risk perspectiveNot covered
1Threat-based risk perspectiveNot covered
1Hazard (difference between hazard and risk – these are explicitly defined in the new CBK)Not covered
1Prioritize (the new pre-step before the standard 4 responses)Covered as part of Risk Assessment
1Micro trainingNot covered
1GamificationCovered
2Materials (CBK indicates there is a difference between materials and supplies)Not covered
2SuppliesNot covered
2Tanigble assetsCovered
2Intangible assetsCovered
2IT asset management lifecycleNot covered
2Planning (part of IT asset management lifecycle)Not covered
2Assigning security needs (part of IT asset management lifecycle)Not covered
2Acquiring (part of IT asset management lifecycle)Not covered
2Deployment (part of IT asset management lifecycle)Not covered
2Managing (part of IT asset management lifecycle)Not covered
2Retiring (part of IT asset management lifecycle)Not covered
2Kiosk service pointNot covered
2Data security lifecycle (CSUSAD)Covered as Data/Information Lifecycle
2Data lifecycle (note: there are two versions with different phases in the CBK)Covered; discrepancies
2Media markingCovered
2Pervasive encryptionNot covered
2EnclaveCovered
2Data collection (phase of data lifecycle)Covered
2Data location (phase of data lifecycle)Covered
2Data maintenance (phase of data lifecycle)Covered
2Hybrid cloud architectureCovered
3Complex Hybrid CryptographyNot covered
3AbstractionCovered
3Type I hypervisor (type 1)Covered
3Type II hypervisor (type 2)Covered
3Type 1 securityNot covered
3Type 2 securityNot covered
3Government cloudNot covered
3MicroservicesCovered
3VM sprawlNot covered
3Application containerCovered
3Serverless systemsCovered
3High performance computing systemsNot covered
3Edge computingCovered
3Fog computingNot covered
3Key space clumpingNot covered
3Clustering/clumping of pseudorandom numbersNot covered
3Deterministic decryptionNot covered
3Bulk encryptionCovered
3Digital envelopeNot covered
3Distributed ledgerNot covered
3BlockchainNot covered
3Internet key exchangeCovered
3ScalabilityCovered
3Remote key management servicesNot covered
3Client-side key managementCovered
3Pass the hashCovered
3Advanced persistent threatCovered
3Kill chainsCovered
3Crime Prevention through Environmental Design (CPTED)Covered
3Contact devicesNot covered
3Contact alarmsNot covered
3Solid core / hollow coreNot covered
3TurnstileCovered
3Sensitive compartmented information facilities (SCIF)Covered
3American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE)Not covered
3ANSI/ASHRAE Standard 90.4-2019Not covered
3High density equipmentNot covered
3Very Early Smoke Detection Apparatus (VESDA)Not covered
3Class A, B, C, D, KCovered
3Aqueous Firefighting Foam (AFFF)Not covered
3Non-conductive, nontoxic liquid suppressants (Novec)Not covered
3Balanced Magnetic Switch (BMS)Not covered
3Acoustic SensorsCalled “Acoustical Detection System”
3Infrared Linear Beam SensorsNot covered
3Passive Infrared SensorsCovered
3Automatic Request to ExitNot covered
3Dual-Technology SensorsNot covered
3Condition monitoringNot covered
3BrickingNot covered
4Bound networkNot covered
4Unbound networkNot covered
4Li-fiCovered
4Acoustic wavesNot covered
4Line driverNot covered
4MultiplexerCovered
4Dense-wave division multiplexer (DWDM)Not covered
4InfinibandNot covered
4Broadband over power lineNot covered
4Frequency division multiplexingCovered
4PPPoENot covered
4ArbitrationNot covered
4DeconflictionNot covered
4Polling protocolsNot covered
4Contention-based protocolsCovered
4AnycastCovered
4GeocastNot covered
4Dual stackNot covered
4Native IPv6Not covered
4IPv6 at the edgeNot covered
4Automatic private IP addressing (APIPA)Not covered
4Distance vectorCovered
4Path vectorNot covered
4Link-stateCovered
4Routed protocolCovered
4Autonomous systems (ASN)Covered
4Routing protocol classifications (interior, exterior gateway, classical, classless, distance vector, path vector, link-state)Covered
4Border gateway protocolCovered
4Intermediate system to intermediate system (ISIS) (IS-IS)Covered
4Area border routerNot covered
4DHCPV6Not covered
4Modbus or Mod busCovered
4east bound interfaceNot covered
4west bound interfaceNot covered
4microsegmentationCovered
4Root of trustCovered
4Trust anchorNot covered
4ImmutabilityNot covered
4Hardware-based ROT (root of trust)Covered
4802.1X (PNAC)Covered
4Captive portalNot covered
5Vertical Privilege EscalationNot covered
5Horizontal Privilege EscalationNot covered
5Strong Star ProperyCovered
5Access Control As A SystemNot covered
5Physical Access TokenNot covered
5Logical Access TokenNot covered
5Just-in-time IdentityCovered
5Privileged account managementCovered
5Hybrid Identity as a ServiceNot covered
5Risk-based access controlsCovered
5Identity lifecycleCovered as “Access Provisioning Life Cycle” with different phases
5Provisioning (part of identity lifecycle)Covered
5Authentication (part of identity lifecycle)Not covered – different phases
5Authorization (part of identity lifecycle)Not covered – different phases
5Accounting (part of identity lifecycle)Not covered – different phases
5User behavior review (part of identity lifecycle)Covered
5Job or duties review (part of identity lifecycle)Covered
5Disable and deprovision (part of identity lifecycle)Covered
5Account access review (part of identity lifecycle)Covered
5Permission aggregationNot covered
5Dual custodyNot covered
5Identity storeCovered
5FICAMNot covered
5Sponsorship (step 1 of 5 in FICAM)Not covered
5Enrollment/registration (step 2 of 5 in FICAM)Not covered
5Credential production (step 3 of 5 in FICAM)Not covered
5Issuance (step 4 of 5 in FICAM)Not covered
5Credential lifecycle management (step 5 of 5 in FICAM)Not covered
5Self service identityCovered
5Single sign-onCovered
5Kerberos ticketCovered
5NTP (kerberos)Covered
5TGT (kerberos)Covered
5TGS (kerberos)Covered
5KDC (kerberos)Covered
5Authentication server (AS – part of kerberos)Covered
5OpenIDCovered
5OauthCovered
5OpenID ConnectCovered
6Formal assessmentNot covered
6Informal assessmentNot covered
6Condition (component of finding)Not covered
6Criteria (component of finding)Not covered
6Cause (component of finding)Not covered
6Effect (component of finding)Not covered
6Recommendation (component of finding)Not covered
6No notice assessmentNot covered
6Trust services criteriaNot covered
6SOC reports for cloud and data centersNot covered
6Conducting a SOC audit (two phases)Not covered
6Internal audit steps (chartering, testing, reporting, remediation)Not covered
6External audit steps (chartering, pre-audit planning, audit execution, audit reporting)Not covered
6Compliance audit (CBK now defines “types” of audits)Not covered
6Financial auditNot covered
6Operational auditNot covered
6Information systems auditNot covered
6Integrated auditNot covered
6Forensic auditNot covered
6NCSC (12 principles)Not covered
6Compliance testNot covered
6Substantive testNot covered
6Code review (the six objectives)Not covered
6Ethical penetration testing (includes steps/methodology: chartering, discovery, scanning, exploitation, reporting)Not covered
6Rules of engagementNot covered
6Bug bountyNot covered
6Blind testCovered
6Double-blind testCovered
6Continuous full-cycle testingNot covered
6Chaos engineeringNot covered
6Service-level agreement validation (in the context of synthetic performance monitoring)Not covered
6Six sigma approach (five steps)Not covered
6Plan-do-check-act (four steps)Covered
6Non-disclosure (in the context of ethical disclosure)Not covered
6Full disclosure (in the context of ethical disclosure)Not covered
6Responsible disclosure (in the context of ethical disclosure)Covered
6Mandatory reportingNot covered
6WhistleblowingNot covered
7Full cutoverCalled “Full Interruption”
7Desk checkCovered
7EDRCovered
7XDRCovered
7Self hosted, self-managedNot covered
7Cloud SIEM, self-managedNot covered
7Hybrid self-hostedNot covered
7SIEM as a serviceNot covered
7Precursor (CBK differentiates from indicator)Not covered
7External threat intelligenceNot covered
7Internal threat intelligenceNot covered
7User and Entity Behavior Analytics (UEBA)Covered
7MITRECovered
7Request for Change (RFC)Covered
7Change management activities (initiation, review/approval, implementation and evaluation, release/deployment planning/control)Different activities
7NIST Forensic cycle (collection, examination, analysis, reporting)Not covered
7Incident response activities (preparation, detection, analysis, response/mitigation, recovery, remediation, reporting, review & improvement)Different phases
7SOARCovered
7Allowed listCovered
7Blocked listCovered
73-2-1 backup strategyNot covered
7Cloud backup as a serviceNot covered
7RAID 15 and 51Not covered
8Software Quality AssuranceCovered
8Software Assurance Maturity Model (SAMM) – very briefCovered
8Software Assurance During Acquisition (Five Phases)Not covered
8Functional requirementsCovered
8Non-functional requirementsCovered
8Acceptance TestingCovered
8Unit TestCovered
8Regression TestingCovered
8Data ValidationNot covered
8FuzzingCovered
8Bounds CheckingCalled something else
8Known-good data (testing)Not covered
8Software assurance policyNot covered
8Orphaned SoftwareNot covered
8Network Database Management ModelNot covered
8CODASYLNot covered
8Strongly typedCovered
8Weakly typedNot covered
8SASTCovered
8DASTCovered
8IASTNot covered
8Privileged applets (sandbox)Not covered
8Java Network Launch ProtocolNot covered
8CLASSPATHNot covered
8Class loaderCovered
8Native librariesNot covered
8RuntimeCovered
8Code RepositoriesCovered
8Configuration ManagementCovered
8High granularityNot covered
8Low granularityNot covered
8Continuous Integration / Continuous Delivery (CICD)Covered
8Configuration AuditNot covered
8System Lifecycle (SLC)Covered
8SDLCCovered
8Memory leakCovered
8IPPDNot covered
8IPTCovered
8Partnership for Systems Approaches to Safety and Security (PSASS)Not covered
8Intermediate codeCovered
8Arbitrary codeNot covered
8RefactoringNot covered
8Level of abstractionCovered
8Lower order languagesNot covered
8Higher order languagesCalled “High-Level”
8Data protection/data hidingCovered
8Code protection/logic hidingNot covered
8Compiled languageCovered
8Interpreted languageCovered
8Constraint based/logic programmingNot covered
8Business need identification (4 steps: Ask, evaluate, agree, document)Not covered
8Between the linesNot covered
8Bypass attackNot covered
8Database view (used for access control)Not covered
8Data contaminationNot covered
8Improper modificationNot covered
8Query attacksNot covered
8Data lakeNot covered
8Data farmNot covered
8Parallel processingCovered
8Graph databaseNot covered
8Candidate keyNot covered
8Non-relational databaseNot covered
8Probabilistic methodNot covered
8Statistical approachNot covered
8Deviation and trend analysis (as part of KDD)Not covered
8Integrated development environment (IDE)Covered
8Commodity systems (COTS)Partially covered