Overview

The Official CISSP-ISSMP training provides a comprehensive review of managerial concepts such as project management, risk management, creating and delivering security awareness programs, and managing a business continuity planning program. This training course will help students review and refresh their knowledge and identify areas they need to study for the ISSMP exam. Taught by an (ISC)² - authorized instructor, the course features:

  • 180 days of access to Official (ISC)² ISSAP course content
  • Interactive flash cards
  • Post-course assessment
  • Independent reading learning activities
  • Case studies
  • Videos
  • End of domain quizzes
Read more

Prerequisites

You do not need to have passed the CISSP exam to challenge for the ISSMP certification.

If you do not have a CISSP certification:

  • You must have at least seven years of experience in two or more of the domains of the ISSMP
  • Pass your exam and submit your certification application
  • To maintain your ISSMP, you will need to earn 140 CPE credits in each 3-year term
Read more

Objectives

After completing this course, you will be able to:

  • Evaluate the role of security, connect the security program with organizational governance, and prioritize security requirements in support of business initiatives to obtain support for the security program.
  • Recommend a documented security program that includes security awareness and training and a process for analyzing, managing and enforcing security requirements for contracts and agreements.
  • Apply metrics, budgeting, project management and management of security team and cross-functional and stakeholder associations to achieve a security program.
  • Understand the management of security into organizational security architecture throughout the system lifecycle.
  • Understand the organizational requirements necessary to establish an effective Risk Management Program.
  • Understand the general processes employed in the identification of system assets, potential system threats, in-place safeguards, and vulnerabilities in the conduct and analysis of system risk assessments.
  • Understand the principles and practices necessary to establish and maintain a successful incident handling and investigation program.
  • Understand the processes and collaboration requirements necessary to establish, maintain, and benefit from a successful threat intelligence program.
  • Understand the various benefits that the proper conduct of a Business Impact Analysis provides to the organization.
Read more

Outline

What’s Covered in the ISSMP Self-Paced Course

The ISSMP course draws from a comprehensive, up-to-date global common body of knowledge to give you deep understanding of new threats, technologies, regulations, standards and practices. Training covers the 6 domains you’ll be tested on in the exam:

  • Domain 1: Leadership and Business Management
  • Domain 2: Systems Lifecycle Management
  • Domain 3: Risk Management
  • Domain 4: Threat Intelligence and Incident Management
  • Domain 5: Contingency Management
  • Domain 6: Law, Ethics and Security Compliance Management
Read more

What's included

  • Exam included
  • Online exam voucher
Read more

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cloud Security
Cyber Blue Team
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Cyber Tech Generalist
Vulnerability Assessment & Penetration Testing

Governance, Risk & Compliance learning paths

Want to boost your career in Governance, Risk & Compliance? View QA's learning pathway below, specially designed to give you the skills to succeed.

= Required
= Certification
Information Security Management
NIST Pathway
Security Auditor
Security Risk