<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.trident365.com/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.trident365.com/feed.php">
        <title>三叉戟 - projects:cissp</title>
        <description>领域专家的成长记录</description>
        <link>https://www.trident365.com/</link>
        <image rdf:resource="https://www.trident365.com/lib/exe/fetch.php?media=wiki:logo.png" />
       <dc:date>2026-04-19T21:12:31+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter1&amp;rev=1747556049&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter2&amp;rev=1747556067&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter3&amp;rev=1747556079&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter4&amp;rev=1747556098&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter5&amp;rev=1747556120&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter6&amp;rev=1747556133&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter7&amp;rev=1747556144&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter8&amp;rev=1747556155&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter9&amp;rev=1747556167&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter10&amp;rev=1747556179&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter11&amp;rev=1747556195&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter12&amp;rev=1747556205&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter13&amp;rev=1747556218&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter14&amp;rev=1747556231&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter15&amp;rev=1747556242&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter16&amp;rev=1747556251&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter17&amp;rev=1747556794&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter18&amp;rev=1747556296&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter19&amp;rev=1747556309&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter20&amp;rev=1747556319&amp;do=diff"/>
                <rdf:li rdf:resource="https://www.trident365.com/doku.php?id=projects:cissp:chapter21&amp;rev=1747556333&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.trident365.com/lib/exe/fetch.php?media=wiki:logo.png">
        <title>三叉戟</title>
        <link>https://www.trident365.com/</link>
        <url>https://www.trident365.com/lib/exe/fetch.php?media=wiki:logo.png</url>
    </image>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter1&amp;rev=1747556049&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:14:09+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter1</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter1&amp;rev=1747556049&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple, one of the authors of the official CISSP study guide. In this series of audio reviews, I&#039;m going to walk you through the study essentials from each chapter in a convenient audio format that you can use to help you prepare for the exam. You might want to listen to these reviews after you&#039;ve read each chapter. Use them in the car, at the gym or wherever it&#039;s convenient for you.</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter2&amp;rev=1747556067&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:14:27+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter2</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter2&amp;rev=1747556067&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 2 of the official CISSP study guide. Here are the top things that you need to know from this chapter on personnel security and risk management concepts.

Understand the security implications of hiring new employees. To properly plan for security, you must have standards in place for job descriptions, job classification, work tasks, job responsibilities, the prevention of collusion, candidate screening, backgrou…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter3&amp;rev=1747556079&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:14:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter3</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter3&amp;rev=1747556079&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 3 of the official CISSP study guide. Here are the top things that you need to know from this chapter on business continuity planning.

Understand the four steps of the business continuity planning process. Business continuity planning involves four distinct elements, project scope and planning, business impact analysis, continuity planning and approval and implementation. Each element contributes to the overall…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter4&amp;rev=1747556098&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:14:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter4</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter4&amp;rev=1747556098&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 4 of the official CISSP study guide. Here are the top things that you need to know from this chapter on laws, regulations and compliance. Understand the differences between criminal law, civil law and administrative law.</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter5&amp;rev=1747556120&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:15:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter5</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter5&amp;rev=1747556120&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 5 of the official CISSP study guide. Here are the top things you need to know from this chapter on protecting the security of assets.

Understand the importance of data and asset classifications. Data owners are responsible for defining data and asset classifications and ensuring that data and systems are properly tagged. Additionally, data owners define requirements to protect data at different classifications…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter6&amp;rev=1747556133&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:15:33+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter6</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter6&amp;rev=1747556133&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 6 of the official CISSP study guide. Here are the top things you need to know from this chapter on cryptography and symmetric key algorithms.

Understand the role that confidentiality, integrity and non-repudiation play in cryptosystems. Confidentiality is one of the major goals of cryptography. It protects the secrecy of data, while it is both at rest and in transit. Integrity provides the recipient of a messa…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter7&amp;rev=1747556144&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:15:44+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter7</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter7&amp;rev=1747556144&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 7 of the official CISSP study guide. Here are the top things that you need to know from this chapter on PKI and cryptographic applications.

Understand the key types used in asymmetric cryptography. Public keys are freely shared among communicating parties, whereas private keys are kept secret. To encrypt a message, use the recipient&#039;s public key, to decrypt a message, use your own private key, to sign a messag…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter8&amp;rev=1747556155&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:15:55+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter8</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter8&amp;rev=1747556155&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 8 of the official CISSP study guide. Here are the top things that you need to know from this chapter on principles of security models, design and capabilities. Be able to describe open and closed systems. Open systems are designed using industry standards and are usually easy to integrate with other open systems. Closed systems are generally proprietary hardware and or software. Their specifications are not nor…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter9&amp;rev=1747556167&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:16:07+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter9</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter9&amp;rev=1747556167&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 9 of the official CISSP study guide. Here are the top things you need to know from this chapter on security vulnerabilities, threats and countermeasures.

Understand shared responsibility. The security design principle indicates that organizations do not operate in isolation. It&#039;s because we participate in shared responsibility that we must research, implement and manage engineering processes using secure desig…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter10&amp;rev=1747556179&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:16:19+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter10</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter10&amp;rev=1747556179&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 10 of the official CISSP study guide. Here are the top things that you need to know from this chapter on physical security requirements.

Understand why there is no security without physical security. Without control over the physical environment, no amount of administrative or technical or logical access controls can provide adequate security. If a malicious person can gain physical access to your facility or …</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter11&amp;rev=1747556195&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:16:35+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter11</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter11&amp;rev=1747556195&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the exam essentials for chapter 11 of the official CISSP study guide. Here are the top things you need to know for the exam from this chapter on secure network architecture and components.

Know the OSI model layers. The OSI layers are application, presentation, session, transport, network, data link and physical. Know the network container names. The network containers are OSI layer seven to five, protocol data unit PDU, layer four is a segme…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter12&amp;rev=1747556205&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:16:45+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter12</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter12&amp;rev=1747556205&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the exam essentials for chapter 12 of the official CISSP study guide. Here are the top things you need to know for the exam from this chapter on secure communications and network attacks.

Understand PPP. The point-to-point protocol PPP is an encapsulation protocol designed to support the transmission of IP traffic over dial up or point-to-point links. The original PPP options for authentication were PAP, CHAP and EAP. Define PAP, CHAP and EAP…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter13&amp;rev=1747556218&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:16:58+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter13</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter13&amp;rev=1747556218&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 13 of the official CISSP study guide. Here are the top things you need to know from this chapter on managing identity and authentication.

Know how physical access controls protect assets. Physical access controls are those you can touch and they directly protect systems, devices and facilities by controlling access and controlling the environment. Indirectly, they also protect information and applications by l…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter14&amp;rev=1747556231&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:17:11+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter14</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter14&amp;rev=1747556231&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the exam essentials for chapter 14 of the official CISSP study guide. Here are the top things you need to know for the exam from this chapter on controlling and monitoring access.

Identify common authorization mechanisms. Authorization ensures that the requested activity or object access is possible given the authenticated identity&#039;s privileges. For example, it ensures that users with appropriate privileges can access files and other resource…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter15&amp;rev=1747556242&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:17:22+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter15</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter15&amp;rev=1747556242&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the exam essentials for chapter 15 of the official CISSP study guide. Here are the top things you need to know for the exam from this chapter on security assessment and testing.

Understand the importance of security assessment and testing programs. Security assessment and testing programs provide an important mechanism for validating the ongoing effectiveness of security controls. They include a variety of tools such as vulnerability assessme…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter16&amp;rev=1747556251&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:17:31+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter16</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter16&amp;rev=1747556251&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 16 of the official CISSP study guide. Here are the top things you need to know from this chapter on managing security operations. Know the difference between need to know and least privileged. Need to know and the least privileged principle are two standard IT security principles implemented in secure networks. They limit access to data and systems so that users and other subjects can access only what they requ…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter17&amp;rev=1747556794&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:26:34+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter17</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter17&amp;rev=1747556794&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 17 of the official CISSP study guide. Here are the top things that you need to know from this chapter on preventing and responding to incidents. List and describe the incident management steps. The CISSP security operations domain lists incident management steps such as detection, response, mitigation, reporting, recovery, remediation and lessons learned. After detecting and verifying an incident, the first res…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter18&amp;rev=1747556296&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:18:16+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter18</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter18&amp;rev=1747556296&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 18 of the official CISSP study guide. Here are the top things that you need to know from this chapter on disaster recovery planning.

Know the common types of natural disasters that may threaten an organization. Natural disasters that commonly threaten organizations include earthquakes, floods, storms, fires, pandemics, tsunamis and volcanic eruptions.</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter19&amp;rev=1747556309&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:18:29+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter19</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter19&amp;rev=1747556309&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 19 of the official CISSP study guide. Here are the top things that you need to know from this chapter on investigations and ethics.

Know the definition of computer crime. Computer crime is a crime or violation of a law or regulation that is directed against or directly involves a computer. Be able to list and explain the seven categories of computer crime. Computer crimes are grouped into seven categories mili…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter20&amp;rev=1747556319&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:18:39+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter20</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter20&amp;rev=1747556319&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 20 of the official CISSP study guide. Here are the top things you need to know from this chapter on software development security.

Explain the basic architecture of a relational database management system, know the structure of relational databases, be able to explain the function of tables, rows and columns, know how relationships are defined between tables and the roles of various types of keys, describe the…</description>
    </item>
    <item rdf:about="https://www.trident365.com/doku.php?id=projects:cissp:chapter21&amp;rev=1747556333&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-05-18T08:18:53+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>chapter21</title>
        <link>https://www.trident365.com/doku.php?id=projects:cissp:chapter21&amp;rev=1747556333&amp;do=diff</link>
        <description>Hi, I&#039;m Mike Chapple and this is the audio review of the study essentials for chapter 21 of the official CISSP study guide. Here are the top things you need to know from this chapter on malicious code and application attacks. Understand the propagation techniques used by viruses. Viruses use four main propagation techniques file infection, service injection, boot sector infection and macro infection to penetrate systems and spread their malicious payloads. You need to understand these techniques…</description>
    </item>
</rdf:RDF>
