
Information Systems Security Management Professional (ISSMP) training course
The Information Systems Security Management Professional (ISSMP) certification is an advanced-level credential offered by the International Information System Security Certification Consortium (ISC)². It’s designed for experienced security professionals who are involved in the management, leadership, and oversight of an organization’s information security program.
ISSMP helps to,
- Understand the ideas and techniques of strategic security planning, such as coordinating security objectives with corporate goals and designing comprehensive security strategies.
- Develop information security-specific leadership and management abilities, such as team management, communication, and decision-making inside security programs.
- Gain extensive knowledge of risk management approaches and techniques, such as risk assessment, analysis, and mitigation strategies customized to the specific requirements of information security initiatives.
- Understand the fundamentals of security governance, such as creating and maintaining effective governance structures, policies, and processes to support information security goals.
- Learn how to create and implement compliance frameworks and monitoring methods to ensure that relevant laws, regulations, and industry standards are followed.
- Develop competence in business continuity planning and disaster recovery, such as risk assessment, continuity plan development, and implementation of strategies to keep business activities running during disruptions.
- Understand the legal, regulatory, and ethical issues surrounding information security management, such as privacy regulations, intellectual property rights, and ethical duties.
Target Audience for ISSMP,
- Information Security Managers
- Security Consultants
- IT Managers and Directors
- Risk Management Professionals
- Security Program Managers
- System and Network Administrators
Candidates must be a CISSP in good standing and have two years cumulative, full-time experience in one or more of the six domains of the current ISSMP outline.
Or
Candidates must have a minimum of seven years cumulative, full-time experience in two or more of the domains of the current ISSMP outline. Earning a post-secondary degree (bachelors or masters) in computer science, information technology (IT) or related fields or an additional credential from the ISC2 approved list may satisfy one year of the required experience. Part-time work and internships may also count towards the experience requirement.
Exam Name | Information Systems Security Management Professional (ISSMP) |
Exam Type | Multiple-choice Questions |
Exam Cost | Exam Fee*: $599.00 + Application Fee: $150.00 |
Total Questions | 125 Questions |
Exam Duration | 3 Hours (180 Minutes) |
Languages | English, French, German, Brazilian, Portuguese, Spanish, Japanese |
COURSE SYLLABUS
1.1 Establish security’s role in organizational culture, vision and mission
» Define information security program vision and mission
» Align security with organizational goals, objectives and values
» Define security’s relationship to the overall business processes
» Define the relationship between organizational culture and security
1.2 Align security program with organizational governance
» Identify and navigate organizational governance structure
» Validate roles of key stakeholders
» Validate sources and boundaries of authorization
» Advocate and obtain organizational support for security initiatives
1.3 Define and implement information security strategies
» Identify security requirements from business initiatives
» Evaluate capacity and capability to implement security strategies
» Manage implementation of security strategies
» Review and maintain security strategies
» Prescribe security architecture and engineering theories, concepts and methods
1.4 Define and maintain security policy framework Determine applicable external standards
» Determine applicable external standards
» Determine data classification and protection requirements
» Establish internal policies
» Advocate and obtain organizational support for policies
» Develop procedures, standards, guidelines and baselines
» Ensure periodic review of security policy framework
1.5 Manage security requirements in contracts and agreements
» Evaluate service management agreements (e.g., risk, financial)
» Govern managed services (e.g., infrastructure, cloud services)
» Manage impact of organizational change (e.g., mergers and acquisitions, outsourcing)
» Ensure that appropriate regulatory compliance statements and requirements are included in contractual agreements
» Monitor and enforce compliance with contractual agreements
1.6 Manage security awareness and training programs
» Promote security programs to key stakeholders
» Identify needs and implement training programs by target segment
» Monitor and report on effectiveness of security awareness and training programs
1.7 Define, measure and report security metrics
» Identify Key Performance Indicators (KPI)
» Associate Key Performance Indicators (KPI) to the risk posture of the organization
» Use metrics to drive security program development and operations
1.8 Prepare, obtain and administer security budget
» Prepare and secure annual budget
» Adjust budget based on evolving risks and threat landscape
» Manage and report financial responsibilities
1.9 Manage security programs
» Define roles and responsibilities
» Determine and manage team accountability
» Build cross-functional relationships
» Resolve conflicts between security and other stakeholders
» Identify communication bottlenecks and barriers
» Integrate security controls into human resources processes
1.10 Apply product development and project management principles
» Incorporate security into project lifecycle
» Identify and apply appropriate project management methodology
» Analyze project time, scope and cost relationship
2.1 Manage integration of security into Systems Development Life Cycle (SDLC)
» Integrate information security gates (decision points) and requirements into lifecycle
» Implement security controls into system lifecycle
» Oversee security configuration management (CM) processes
2.2 Integrate new business initiatives and emerging technologies into the security architecture
» Integrate security into new business initiatives and emerging technologies
» Address impact of new business initiatives on security posture
2.3 Define and oversee comprehensive vulnerability management programs
(e.g., vulnerability scanning, penetration testing, threat analysis)
» Identify, classify and prioritize assets, systems and services based on criticality to business
» Prioritize threats and vulnerabilities
» Manage security testing
» Manage mitigation and/or remediation of vulnerabilities based on risk
2.4 Manage security aspects of change control
» Integrate security requirements with change control process
» Identify and coordinate with the stakeholders
» Manage documentation and tracking
» Ensure policy compliance (e.g., continuous monitoring)
3.1 Develop and manage a risk management program
» Identify risk management program objectives
» Communicate and agree on risk management objectives with risk owners and other stakeholders
» Determine scope of organizational risk program
» Identify organizational security risk tolerance/appetite
» Obtain and verify organizational asset inventory
» Analyze organizational risks
» Determine countermeasures, compensating and mitigating controls
» Perform cost-benefit analysis (CBA) of risk treatment options
3.2 Conduct risk assessments
» Identify risk factors
3.3 Manage security risks within the supply chain (e.g., supplier, vendor, third-party risk)
» Identify supply chain security risk requirements
» Integrate supply chain security risks into organizational risk management
» Validate security risk control within the supply chain
» Monitor and review the supply chain security risks
4.1 Establish and maintain threat intelligence program
» Aggregate threat data from multiple threat intelligence sources
» Conduct baseline analysis of network traffic, data and user behavior
» Detect and analyze anomalous behavior patterns for potential concerns
» Conduct threat modeling
» Identify and categorize an attack
» Correlate related security event and threat data
» Create actionable alerting to appropriate resources
4.2 Establish and maintain incident handling and investigation program
» Develop program documentation
» Establish incident response case management process
» Establish incident response team
» Apply incident management methodologies
» Establish and maintain incident handling process
» Establish and maintain investigation process
» Quantify and report financial and operational impact of incidents and investigations to stakeholders
» Conduct root cause analysis (RCA)
5.1 Facilitate development of contingency plans
» Identify and analyze factors related to the Continuity of Operations Plan (COOP)
» Identify and analyze factors related to the business continuity plan (BCP) (e.g., time, resources, verification)
» Identify and analyze factors related to the disaster recovery plan (DRP) (e.g., time, resources, verification)
» Coordinate contingency management plans with key stakeholders
» Define internal and external crisis communications plans
» Define and communicate contingency roles and responsibilities
» Identify and analyze contingency impact on business processes and priorities
» Manage third-party contingency dependencies
» Prepare security management succession plan
5.2 Develop recovery strategies
» Identify and analyze alternatives
» Recommend and coordinate recovery strategies
» Assign recovery roles and responsibilities
5.3 Maintain contingency plan, Continuity of Operations Plan (COOP), business continuity
plan (BCP) and disaster recovery plan (DRP)
» Plan testing, evaluation and modification
» Determine survivability and resiliency capabilities
» Manage plan update process
5.4 Manage disaster response and recovery process
» Declare disaster
» Implement plan
» Restore normal operations
» Gather lessons learned
» Update plan based on lessons learned
6.1 Identify the impact of laws and regulations that relate to information security
» Identify applicable privacy laws
» Identify legal jurisdictions the organization and
users operate within (e.g., trans-border data flow)
» Identify export laws
» Identify intellectual property (IP) laws
» Identify applicable industry regulations
» Identify and advise on non-compliance risks
6.2 Adhere to the (ISC)2 Code of Ethics as related to management issues
6.3 Validate compliance in accordance with applicable laws, regulations and industry
best practices
» Inform and advise senior management
» Evaluate and select compliance framework(s)
» Implement the compliance framework(s)
» Define and monitor compliance metrics
6.4 Coordinate with auditors and regulators in support of the internal and external
audit processes
» Plan
» Schedule
» Coordinate audit activities
» Evaluate and validate findings
» Formulate response
» Validate implemented mitigation and remediation actions
6.5 Document and manage compliance exceptions
» Identify and document compensating controls and workarounds
» Report and obtain authorized approval of risk waiver
Competence Recognition: ISSMP certification acknowledges competence in information security program management, displaying advanced knowledge and skills in strategic planning, risk management, and leadership.
Career progression: Having an ISSMP certification can lead to progression chances in information security management, such as chief information security officer (CISO) or senior security manager positions.
Strategic Leadership: Learn how to plan and implement strategic security initiatives that connect with organizational goals, so increasing the efficacy and resilience of information security programs.
Risk Management Proficiency: Develop skill in recognizing, assessing, and reducing information security risks, allowing for proactive risk management to protect organizational assets and support business goals.
Credibility and Trust: Earn credibility and trust from peers, employers, and clients by demonstrating a dedication to excellence in information security management and adherence to industry best practices.
Networking Opportunities: Network with a global network of information security professionals through organizations like (ISC)² to gain essential resources, insights, and support for professional development.
Up-coming Schedule:
Please contact us to know about the upcoming schedule.