CISSP-ISSMP Certification Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Led by an (ISC)² authorized instructor, this Official (ISC)² CBK Training Seminar for the CISSP-ISSMP focuses on establishing, presenting, and governing information security programs. Specifically, this CISSP-ISSMP Certification Training – Information System Security Management Professional Training (ISSMP) course contains deep managerial elements, such as project management, setting up and delivering a security awareness program, and managing a business continuity planning program. Successful CISSP-ISSMP students will be able to establish, present, and govern information security programs demonstrating management and leadership skills.

WHAT'S INCLUDED?
  • 5 days of CISSP-ISSMP Certification Training with an expert instructor
  • CISSP-ISSMP Certification Training Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this CISSP-ISSMP Certification Training course, learners will be able to meet these objectives:

  • Prioritize security requirements in support of business initiatives and obtain support from stakeholders.
  • Create a security program that includes security awareness and training and a process for analyzing, managing, and enforcing security requirements for contracts and agreements.
  • Apply metrics, budgeting, and security program management to achieve a successful security program.
  • Adapt the security of the system lifecycle into the organizational security architecture.
  • Develop an effective risk management program that meets organizational requirements.
  • Integrate supply chain security risks with organizational risk management.
  • Create a successful threat intelligence program.
  • Design a successful incident handling and investigation program.
  • Formulate effective organizational continuity of operations and system-level contingency plans.
  • Implement appropriate controls to safeguard sensitive information and systems.
CUSTOMIZE IT
  • We can adapt this CISSP-ISSMP Certification Training (Management) course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this CISSP-ISSMP Certification (Management) course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CISSP-ISSMP Certification (Management) around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CISSP-ISSMP Certification (Management) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this CISSP-ISSMP Certification Training course:

  • Chief Information Officer
  • Chief Information Security Officer
  • Chief Technology Officer
  • Senior Security Executive
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this CISSP-ISSMP Certification Training course are:

COURSE SYLLABUS

CISSP-ISSMP Certification Training
Leadership and business management
  • Establish security’s role in organizational culture, vision, and mission
  • Align security program with organizational governance
  • Define and implement information security strategies
  • Define and maintain the security policy framework
  • Manage security requirements in contracts and agreements
  • Oversee security awareness and training programs
  • Define, measure, and report security metrics
  • Prepare, obtain, and administer the security budget
  • Manage security programs
  • Apply product development and project management principles
Systems lifecycle management
  • Manage the integration of security into the System Development Lifecycle (SDLC)
  • Integrate new business initiatives in the security architecture
  • Define and oversee comprehensive vulnerability management programs (e.g. vulnerability scanning, penetration testing, threat analysis)
  • Manage security aspects of change control
Risk management
  • Develop and manage a risk management program
  • Conduct risk assessments (RA)
Threat intelligence and incident management
  • Establish and maintain a threat intelligence program
  • Establish and maintain incident handling and investigation program
Contingency management
  • Oversee the development of contingency plans (CP)
  • Guide development of recovery strategies
  • Maintain business continuity plan (BCP), continuity of operations plan (COOP) and disaster recovery plan (DRP)
  • Manage recovery process
Law, ethics, and security compliance management
  • Understand the impact of laws that relate to information security
  • Understand management issues as related to the (ISC)² code of ethics
  • Validate compliance in accordance with applicable laws, regulations and industry best Practices
  • Coordinate with auditors, and assist with the internal and external audit process
  • Document and manage compliance exceptions
CISSP-ISSMP Certification TrainingCISSP-ISSMP Certification Training Course Recap, Q/A, and Evaluations

REQUEST MORE INFORMATION