To complete this project, first, you should have strong understanding of the subjects of this course. Second, this project also requires you to study the two textbooks carefully. The main textbook by McMillan and Abernathy (Cert Guide: CISSP) is written in view point of a defender. While the other one (The Hacker Playbook by Peter Kim) is presented from the viewpoint of an attacker.
Based on your understanding of these, you should
1. Summarize the textbooks, both McMillan & Abernathy and Kim
2. Take a position (either an attacker or a defender), and describe weaknesses of the other party. For instance, if you take the attacker position (e.g., hacker), you can find loopholes of the defender (presented in the McMillan & Abernathy book). If you take the defender position (e.g., security manager), you can find what is missing in the Kim’s book.
3. Summarize your findings with suggestions.
**You can choose to write whether you are an attacker or defender. The documentation will have both books, however, the main textbook by McMillan and Abernathy (Cert Guide: CISSP) has limited information, but easy to read. “The Hacker Playbook by Peter Kim” has all the information of the book, but hard to read.** You can choose which is best for you.