top of page

FOUR OF THE BEST THINGS YOU CAN BUY TO PASS THE CISSP EXAM

71OMr0D4FrL._SL1500_.jpg
119159849_10158061653118813_5314694876572739015_n.jpg
four video.png
71eSH5cSYiL._SL1377_.jpg

If You’re Studying For The CISSP, Watch These Movies


I knew if I wanted to pass the CISSP the first time, I’d need to eat, sleep, dream, breathe the CISSP.

Studying for the CISSP became a strong part of my everyday thinking. I’d wake up thinking about DRP/BCP, and I’d go to sleep thinking about Mandatory Access Control.

When spending some quality time with my wife watching movies, I’d start to notice helpful CISSP concepts in some movies.

“Hey, I’m studying that for the CISSP!” I’d say.

Here’s a list of movies (and some TV shows) that incorporate aspects of the CISSP, and helps you relate to some practical use of concepts.

If you have any suggestion, let me know and I’ll update the list!

Security and Risk Management

Breach – Robert Hanssen worked for the FBI and was a double agent for Soviet and Russian Intelligence. Hanssen had a high security clearance, and had need-to-know access to a treasure of highly classified files. At one point, he was put in charge of the very team that was supposed to track down the agency’s mole (which was him all along). He was the ultimate insider threat.

Apollo 13 – DRP/BCP procedures when facing malfunctions aboard a space shuttle.

Interstellar – The importance of not just DRP (resolving the immediate disaster), but also insuring and practing BCP (the long-term approach of keeping the business alive, or in the case of the movie, the human race)

The People v. O. J. Simpson: American Crime Story (TV Show) – The importance of proper chain of custody

The Sopranos (TV Show) – A mafia crime family exemplifies the importance of proper security governance, insider threats, and malicious threats to the organization.

Asset Security

Hackers – Great film that incorporates aspects of social engineering, shoulder surfing, dumpster diving, phone tapping….and hacking.

WarGames – A great movie that uses the wardialing process to find vulnerable modems

Security Engineering

The Imitation Game – A great movie centered around the art of decrypting the German Enigma machine. It also talks about the father of modern computing Alan Turing, as well as the cryptography concepts of known-plaintext attack.

A Beautiful Mind – Another movie with elements of cryptography, namely frequency analysis

The Numbers Station – A remote code station in England uses One-Time Pads in order to relay messages between spies and headquarters.

U-571 – The story of American sailors who board a German U-Boat in order steal an Enigma cipher machine.

Communication and Network Security

White House Down – Hacker helps terrorists take over the White House and nuclear missiles

Mr. Robot (TV Show) – Probably one of the most accurate representations of network security in the real world as translated to media. It also deals with social engineering and physical security.


Silicon Valley (TV Show) - A dissimilar group of tech friends create a compression algorithm that propels to startup fame. Along the way they touch upon network security, database management, proper and improper coding life cycles, physical security, and BCP/DRP measures. The show also provides a satirical, yet accurate, picture of the tech startup environment.

I.T. – An obsessed IT worker stalks his boss and takes over the devices in his house, deals with IoT.

Firewall – Use of firewall access lists and bypassing data center security (but not really).

The Net - Has social engineering and some good 80s computer hacking scenes. Probably about 40% based in reality.

Sneakers - Encryption. General hacking. Social engineering. And Robert Redford demonstrates an easy way to defeat an electronic keypad.

Snowden - Encryption. IPSec VPNs. Information security espionage.

Swordfish - A former black hat hacker is blackmailed into creating a worm in order to compromise a bank's security.

Identity and Access Management

GoldenEye (or any James Bond movie) – Deals a lot with biometric authentication or voice authentication

Mission Impossible 3 (or any Mission Impossible movie) – Deals with palm, facial, retina, masquerading, DNA authentication and identity confirmation.


Who Am I - A German techno-thriller about a small hacker group who becomes popular after compromising the files of a federal intelligence agency. Great movie to understand social engineering and some elements of pen testing.

Security Assessment and Testing

The Matrix Reloaded – The Architect’s explanation of an anomaly in the Matrix programming which created Neo. The Matrix code wasn’t tested thoroughly, hence the creation of multiple Neos.

Security Operations

Crimson Tide – Shows the use of dual-control

The Sum of All Fears – Shows the use of dual-control

Software Development Security

Superman 3 – Richard Pryor embezzles money from his company by performing a salami attack

Office Space – Also deals with a salami attack

The Matrix – A great movie to relate to the software development security domain as it deals with coding, worms, viruses, buffer overflow, artificial intelligence and software bugs.


The Pursuit of Happiness - Stay Motivated! I’m sure some of you will agree with me that the ending of this Movie “The Pursuit of Happiness” is simular to the emotional feeling you get when you get the “Congratulations” when they hand your your results of your CISSP exam! You cannot describe that feeling only experience it ! Keep going ! stay focused !! never give up !! fight and against all obstacles ! (Contributed by Kevin White)

If you see a movie that could be added to this list, let me know!

bottom of page