ISC2 CISSP-ISSMP Exam Syllabus

CISSP-ISSMP PDF, CISSP-ISSMP Dumps, CISSP-ISSMP PDF, CISSP-ISSMP VCE, CISSP-ISSMP Questions PDF, ISC2 CISSP-ISSMP VCE, ISC2 ISSMP Dumps, ISC2 ISSMP PDFUse this quick start guide to collect all the information about ISC2 CISSP-ISSMP Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CISSP-ISSMP ISC2 Information Systems Security Management Professional exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual ISC2 ISSMP certification exam.

The ISC2 CISSP-ISSMP certification is mainly targeted to those candidates who want to build their career in Cybersecurity Strategy and Implementation domain. The ISC2 Information Systems Security Management Professional (CISSP-ISSMP) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of ISC2 ISSMP.

ISC2 CISSP-ISSMP Exam Summary:

Exam Name ISC2 Information Systems Security Management Professional (CISSP-ISSMP)
Exam Code CISSP-ISSMP
Exam Price $599 (USD)
Duration 180 mins
Number of Questions 125
Passing Score 700/1000
Books / Training Information Systems Security Management Professional (Online Self-Paced)
Schedule Exam Pearson VUE
Sample Questions ISC2 CISSP-ISSMP Sample Questions
Practice Exam ISC2 CISSP-ISSMP Certification Practice Exam

ISC2 ISSMP Exam Syllabus Topics:

Topic Details

Leadership and Organizational Management - 21%

Establish security’s role in organizational culture, vision, and mission - Defining information security program vision and mission
- Aligning security with organizational goals, objectives, and values
- Defining security’s relationship with the overall organization processes
- Defining the relationship between organizational culture and security
Align Security Program with Organizational Governance - Identifying and navigating organizational governance structure
- Verifying and validating roles of key stakeholders
- Validating sources and boundaries of authorization
- Advocating and obtaining organizational support for security initiatives
Define and Implement Information Security Strategies - Identifying security requirements from organizational initiatives
- Evaluating capacity and capability to implement security strategies
- Prescribing security architecture design
- Managing implementation of security strategies
- Reviewing and maintaining security strategies
Define and maintain security policy framework - Determining applicable external standards, laws, and regulations
- Determining data classification and protection requirements
- Establishing internal policies
- Advocating and obtaining organizational support for policies
- Developing procedures, standards, guidelines, and baselines
- Ensuring periodic review of security policy framework
Manage Security Requirements in Contracts and Agreements - Evaluating service management agreements (e.g., risk, financial)
- Governing managed services (e.g., infrastructure, cloud services)
- Managing security impact of organizational change (e.g., mergers and acquisitions, outsourcing, capability development)
- Ensuring that applicable regulatory compliance statements and requirements are included in contractual and service management agreements
- Monitoring and enforcing compliance with contractual and service management agreements
Manage security awareness and training programs - Promoting security programs to key stakeholders
- Identifying needs and implementing training programs by target segment
- Monitoring, evaluating, and reporting on effectiveness of security awareness and training programs
Define, Measure, and Report Security Metrics - Identifying Key Performance Indicators (KPI) and Key Risk Indicators (KRI)
- Associating metrics to the risk posture of the organization
- Using metrics to drive improvements to the security program and operations
Prepare, obtain, and manage security budget - Preparing and securing annual budget
- Adjusting or requesting budget based on evolving risks and threat landscape
- Managing and reporting financial responsibilities
Manage Security Programs - Defining roles and responsibilities
- Determining and managing team accountability
- Building cross-functional relationships
- Resolving conflicts between security and other stakeholders
- Identifying communication bottlenecks and barriers
- Integrating security controls into organization processes
Apply product development and project management principles - Incorporating security throughout the lifecycle
- Identifying and applying applicable methodology (e.g., agile, waterfall, lean, rapid application development)
- Analyzing project scope, timelines, quality, and budget

Systems Lifecycle Management - 15%

Manage integration of security throughout system life cycle - Integration of information security decision points and requirements throughout the system life cycle
- Implementation of security controls throughout the system life cycle
- Overseeing security configuration management (CM) processes
Integrate organization initiatives and emerging technologies throughout the security architecture - Implementing security principles
- Addressing impact of organization initiatives on security posture
Define and manage comprehensive vulnerability management programs (e.g., vulnerabilities, scanning, penetration testing, threat analysis) - Identification, classification, and prioritization of assets, systems, and services based on criticality and impact to the organization
- Prioritization of threats and vulnerabilities based on risk
- Management of security testing
- Management of mitigation and/or remediation of vulnerabilities
- Monitoring and reporting of vulnerabilities
Manage Security Aspects of Change Control - Integration of security requirements with change control process
- Conducting a security impact analysis
- Identification and coordination with the stakeholders
- Management of documentation and tracking
- Ensuring policy compliance (e.g., continuous monitoring)

Risk Management - 20%

Develop and Manage a Risk Management Program - Identifying risk management program objectives
- Defining risk management objectives with risk owners and other stakeholders
- Determining scope of organizational risk program
- Identifying organizational risk tolerance/appetite
- Obtaining and verifying organizational asset inventory
- Analyzing organizational risks
- Determine countermeasures, compensating and mitigating controls
- Identifying risk treatment options
- Conducting Cost-benefit analysis (CBA) of risk treatment options
- Recommending risk treatment options to stakeholders
- Documenting and managing agreed risks and issues treatments
- Testing, monitoring, and reporting on risks and issues
Manage security risks within the supply chain (e.g., supplier, vendor, third-party risk, contracts) - Identifying supply chain security risk objectives
- Integrating supply chain security risks into organizational risk management
- Verifying and validating security risk control within the supply chain
- Monitoring and reviewing the supply chain security risks
Conduct risk assessments - Identifying risk factors
- Determining the risk assessment approach (e.g., qualitative, quantitative)
- Performing the risk analysis
Manage risk controls - Identifying controls
- Determining control effectiveness
- Evaluating control coverage
- Monitoring/reporting risk control effectiveness and coverage

Security Operations - 18%

Establish and maintain security operations center - Development of security operations center (SOC) documentation
Establish and maintain threat intelligence program - Aggregating threat data from multiple threat intelligence sources
- Conducting baseline analysis of network traffic, data, and user behavior
- Detecting and analyzing anomalous behavior patterns for potential concerns
- Conducting threat modeling
- Identifying and categorizing attacks
- Correlating related security events and threat data
- Defining actionable alerts
Establish and maintain incident management program - Development of program documentation
- Establishing incident response (IR) case management processes
- Establishing incident response (IR) team
- Applying incident management methodologies
- Establishing and maintaining incident handling processes
- Establishing and maintaining investigation processes
- Quantifying and reporting incident impacts and investigations to stakeholders
- Conducting root cause analysis

Contingency Management - 12%

Facilitate development of contingency plans - Identifying and analyzing factors related to resiliency planning (e.g., Continuity of Operations Plan (COOP), external factors, laws, regulations, business impact analysis (BIA))
- Identifying and analyzing factors related to the business continuity plan (BCP) (e.g., time, resources, verification, business impact analysis (BIA))
- Identifying and analyzing factors related to the disaster recovery plan (DRP) (e.g., time, resources, verification)
- Coordinating contingency management plans with key stakeholders
- Defining internal and external crisis communications plan
- Defining and communicating contingency roles and responsibilities
- Identifying and analyzing contingency impact on organization processes and priorities
- Managing third-party contingency dependencies (e.g., cloud providers, utilities)
- Preparing security management succession plan
Develop recovery strategies - Identifying and analyzing alternatives
- Recommending and coordinating recovery strategies
- Assigning recovery roles and responsibilities
Maintain contingency plan, resiliency plan (e.g., Continuity of Operations Plan (COOP)), business continuity plan (BCP) and disaster recovery plan (DRP) - Planning testing, evaluation, and modification
- Determining survivability and resiliency capabilities
- Managing plan update process
Manage disaster response and recovery process - Declaring and communicating disaster
- Implementing plan
- Restoring normal operations
- Gathering lessons learned
- Updating plan based on lessons learned

Law, Ethics, and Security Compliance Management - 14%

Identify the impact of laws and regulations that relate to information security - Identifying legal jurisdictions that the organization and users operate within (e.g., trans-border data flow)
- Identifying applicable security and privacy laws/regulations/standards
- Identifying intellectual property laws
- Identifying and advising on risks of non-compliance and non-conformity
Understand, adhere to, and promote professional ethics
 
- ISC2 Code of Ethics
- Organizational code of ethics
Validate compliance in accordance with applicable laws, regulations, and industry standards - Informing and advising senior management
- Evaluating and selecting compliance framework(s)
- Implementing the compliance framework(s)
- Defining and monitoring compliance metrics
Coordinate with auditors and regulators in support of internal and external audit processes - Planning
- Scheduling
- Coordinating audit activities
- Evaluating and validating findings
- Formulating response
- Monitoring and validating implemented mitigation and remediation actions
Document and Manage Compliance Exceptions - Identifying and documenting controls and workarounds
- Reporting and obtaining authorized approval of risk waiver

To ensure success in ISC2 ISSMP certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for ISC2 Information Systems Security Management Professional (CISSP-ISSMP) exam.

Rating: 4.9 / 5 (75 votes)