CISSP-ISSMP Certification Training
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Led by an (ISC)² authorized instructor, this Official (ISC)² CBK Training Seminar for the CISSP-ISSMP focuses on establishing, presenting, and governing information security programs. Specifically, this CISSP-ISSMP Certification Training – Information System Security Management Professional Training (ISSMP) course contains deep managerial elements, such as project management, setting up and delivering a security awareness program, and managing a business continuity planning program. Successful CISSP-ISSMP students will be able to establish, present, and govern information security programs demonstrating management and leadership skills.
WHAT'S INCLUDED?
- 5 days of CISSP-ISSMP Certification Training with an expert instructor
- CISSP-ISSMP Certification Training Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- CISSP-ISSMP Certification Training – https://www.wiley.com/
- CISSP-ISSMP Certification Training – https://www.packtpub.com/
- CISSP-ISSMP Certification – https://store.logicaloperations.com/
- CISSP-ISSMP Certification – https://us.artechhouse.com/
- CISSP-ISSMP Certification Training – https://www.amazon.com/
RELATED COURSES
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this CISSP-ISSMP Certification Training course, learners will be able to meet these objectives:
- Prioritize security requirements in support of business initiatives and obtain support from stakeholders.
- Create a security program that includes security awareness and training and a process for analyzing, managing, and enforcing security requirements for contracts and agreements.
- Apply metrics, budgeting, and security program management to achieve a successful security program.
- Adapt the security of the system lifecycle into the organizational security architecture.
- Develop an effective risk management program that meets organizational requirements.
- Integrate supply chain security risks with organizational risk management.
- Create a successful threat intelligence program.
- Design a successful incident handling and investigation program.
- Formulate effective organizational continuity of operations and system-level contingency plans.
- Implement appropriate controls to safeguard sensitive information and systems.
CUSTOMIZE IT
- We can adapt this CISSP-ISSMP Certification Training (Management) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this CISSP-ISSMP Certification (Management) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CISSP-ISSMP Certification (Management) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP-ISSMP Certification (Management) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this CISSP-ISSMP Certification Training course:
- Chief Information Officer
- Chief Information Security Officer
- Chief Technology Officer
- Senior Security Executive
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this CISSP-ISSMP Certification Training course are:
COURSE SYLLABUS
CISSP-ISSMP Certification Training
Leadership and business management
- Establish security’s role in organizational culture, vision, and mission
- Align security program with organizational governance
- Define and implement information security strategies
- Define and maintain the security policy framework
- Manage security requirements in contracts and agreements
- Oversee security awareness and training programs
- Define, measure, and report security metrics
- Prepare, obtain, and administer the security budget
- Manage security programs
- Apply product development and project management principles
Systems lifecycle management
- Manage the integration of security into the System Development Lifecycle (SDLC)
- Integrate new business initiatives in the security architecture
- Define and oversee comprehensive vulnerability management programs (e.g. vulnerability scanning, penetration testing, threat analysis)
- Manage security aspects of change control
Risk management
- Develop and manage a risk management program
- Conduct risk assessments (RA)
Threat intelligence and incident management
- Establish and maintain a threat intelligence program
- Establish and maintain incident handling and investigation program
Contingency management
- Oversee the development of contingency plans (CP)
- Guide development of recovery strategies
- Maintain business continuity plan (BCP), continuity of operations plan (COOP) and disaster recovery plan (DRP)
- Manage recovery process
Law, ethics, and security compliance management
- Understand the impact of laws that relate to information security
- Understand management issues as related to the (ISC)² code of ethics
- Validate compliance in accordance with applicable laws, regulations and industry best Practices
- Coordinate with auditors, and assist with the internal and external audit process
- Document and manage compliance exceptions