ISC2 CISSP-ISSMP Exam Syllabus

CISSP-ISSMP PDF, CISSP-ISSMP Dumps, CISSP-ISSMP PDF, CISSP-ISSMP VCE, CISSP-ISSMP Questions PDF, ISC2 CISSP-ISSMP VCE, ISC2 ISSMP Dumps, ISC2 ISSMP PDFUse this quick start guide to collect all the information about ISC2 CISSP-ISSMP Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the CISSP-ISSMP ISC2 Information Systems Security Management Professional exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual ISC2 ISSMP certification exam.

The ISC2 CISSP-ISSMP certification is mainly targeted to those candidates who want to build their career in Cybersecurity domain. The ISC2 Information Systems Security Management Professional (CISSP-ISSMP) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of ISC2 ISSMP.

ISC2 CISSP-ISSMP Exam Summary:

Exam Name ISC2 Information Systems Security Management Professional (CISSP-ISSMP)
Exam Price $599 (USD)
Duration 180 mins
Number of Questions 125
Passing Score 700/1000
Schedule Exam Pearson VUE
Sample Questions ISC2 CISSP-ISSMP Sample Questions
Practice Exam ISC2 CISSP-ISSMP Certification Practice Exam

ISC2 ISSMP Exam Syllabus Topics:

Topic Details

Leadership and Business Management - 22%

Establish Security’s Role in Organizational Culture, Vision, and Mission - Define information security program vision and mission
- Align security with organizational goals, objectives, and values
- Explain business processes and their relationships
- Describe the relationship between organizational culture and security
Align Security Program with Organizational Governance - Identify and navigate organizational governance structure
- Recognize roles of key stakeholders
- Recognize sources and boundaries of authorization
- Negotiate organizational support for security initiatives
Define and Implement Information Security Strategies - Identify security requirements from business initiatives
- Evaluate capacity and capability to implement security strategies
- Manage implementation of security strategies
- Review and maintain security strategies
- Describe security engineering theories, concepts, and methods
Define and Maintain Security Policy Framework - Determine applicable external standards
- Manage data classification
- Establish internal policies
- Obtain organizational support for policies
- Develop procedures, standards, guidelines, and baselines
- Ensure periodic review of security policy framework
Manage Security Requirements in Contracts and Agreements - Evaluate service management agreements (e.g., risk, financial)
- Govern managed services (e.g., infrastructure, cloud services)
- Manage impact of organizational change (e.g., mergers and acquisitions, outsourcing)
- Monitor and enforce compliance with contractual agreements
Oversee Security Awareness and Training Programs - Promote security programs to key stakeholders
- Identify training needs by target segment
- Monitor and report on effectiveness of security awareness and training programs
Define, Measure, and Report Security Metrics - Identify Key Performance Indicators (KPI)
- Relate KPIs to the risk position of the organization
- Use metrics to drive security program development and operations
Prepare, Obtain, and Administer Security Budget - Manage and report financial responsibilities
- Prepare and secure annual budget
- Adjust budget based on evolving risks
Manage Security Programs - Build cross-functional relationships
- Identify communication bottlenecks and barriers
- Define roles and responsibilities
- Resolve conflicts between security and other stakeholders
- Determine and manage team accountability
Apply Product Development and Project Management Principles - Describe project lifecycle
- Identify and apply appropriate project management methodology
- Analyze time, scope, and cost relationship

Systems Lifecycle Management - 19%

Manage Integration of Security into System Development Lifecycle (SDLC) - Integrate information security gates (decision points) and milestones into lifecycle
- Implement security controls into system lifecycle
- Oversee configuration management processes
Integrate New Business Initiatives and Emerging Technologies into the Security Architecture - Participate in development of business case for new initiatives to integrate security
- Address impact of new business initiatives on security
Define and Oversee Comprehensive Vulnerability Management Programs (e.g., vulnerability scanning, penetration testing, threat analysis) - Classify assets, systems, and services based on criticality to business
- Prioritize threats and vulnerabilities
- Oversee security testing
- Mitigate or remediate vulnerabilities based on risk
Manage Security Aspects of Change Control - Integrate security requirements with change control process
- Identify stakeholders
- Oversee documentation and tracking
- Ensure policy compliance

Risk Management - 18%

Develop and Manage a Risk Management Program - Communicate risk management objectives with risk owners and other stakeholders
- Understand principles for defining risk tolerance
- Determine scope of organizational risk program
- Obtain and verify organizational asset inventory
- Analyze organizational risk management requirements
- Determine the impact and likelihood of threats and vulnerabilities
- Determine countermeasures, compensating and mitigating controls
- Recommend risk treatment options and when to apply them
Conduct Risk Assessments (RA) - Identify risk factors
- Manage supplier, vendor, and third-party risk
- Understand supply chain security management
- Conduct Business Impact Analysis (BIA)
- Manage risk exceptions
- Monitor and report on risk
- Perform cost–benefit analysis

Threat Intelligence and Incident Management - 17%

Establish and Maintain Threat Intelligence Program - Synthesize relevant data from multiple threat intelligence sources
- Conduct baseline analysis
- Review anomalous behavior patterns for potential concerns
- Conduct threat modeling
- Identify ongoing attacks
- Correlate related attacks
- Create actionable alerting to appropriate resources
Establish and Maintain Incident Handling and Investigation Program - Develop program documentation
- Establish incident response case management process
- Establish Incident Response Team (IRT)
- Understand and apply incident management methodologies
- Establish and maintain incident handling process
- Establish and maintain investigation process
- Quantify and report financial and operational impact of incidents and investigations to stakeholders
- Conduct Root Cause Analysis (RCA)

Contingency Management - 10%

Oversee Development of Contingency Plans (CP) - Analyze challenges related to the Business Continuity (BC) process (e.g., time, resources, verification)
- Analyze challenges related to the Disaster Recovery (DR) process (e.g., time, resources, verification)
- Analyze challenges related to the Continuity of Operations Plan (COOP)
- Coordinate with key stakeholders
- Define internal and external incident communications plans
- Define incident roles and responsibilities
- Determine organizational drivers and policies
- Reference Business Impact Analysis (BIA)
- Manage third-party dependencies
- Prepare security management succession plan
Guide Development of Recovery Strategies - Identify and analyze alternatives
- Recommend and coordinate recovery strategies
- Assign recovery roles and responsibilities
Maintain Business Continuity Plan (BCP), Continuity of Operations Plan (COOP), and Disaster Recovery Plan (DRP) - Plan testing, evaluation, and modification
- Determine survivability and resiliency capabilities
- Manage plan update process
Manage Recovery Process - Declare disaster
- Implement plan
- Restore normal operations
- Gather lessons learned
- Update plan based on lessons learned

Law, Ethics, and Security Compliance Management - 14%

Understand the Impact of Laws that Relate to Information Security - Understand global privacy laws
- Understand legal jurisdictions the organization operates within (e.g., trans-border data flow)
- Understand export laws
- Understand intellectual property laws
- Understand industry regulations affecting the organization
- Advise on potential liabilities
Understand Management Issues as Related to the (ISC)2 Code of Ethics  
Validate Compliance in Accordance with Applicable Laws, Regulations, and Industry Best Practices - Obtain leadership buy-in
- Select compliance framework(s)
- Implement validation procedures outlined in framework(s)
- Define and utilize security compliance metrics to report control effectiveness and potential areas of improvement
Coordinate with Auditors, and Assist with the Internal and External Audit Process - Prepare
- Schedule
- Perform audit
- Evaluate findings
- Formulate response
- Validate implemented mitigation and remediation actions
Document and Manage Compliance Exceptions  

To ensure success in ISC2 ISSMP certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for ISC2 Information Systems Security Management Professional (CISSP-ISSMP) exam.

Rating: 4.9 / 5 (75 votes)