Level: Advanced

CISSP - Information Systems Security Management Professional (ISSMP)

5 Day | Instructor Led

This course is designed for CISSPs who specialize in deep managerial elements, such as project management, risk management, setting up and delivering a security awareness program, and managing a business continuity planning program. Gain security leadership and management skills in order to manage an organizations information security program. Ensure your company meets security compliance regulations by establishing, managing, and overseeing a process to help monitor, assess and enforce compliance with security policies and procedures. Learn vital contingency and incident management practices for reducing the impact of adverse events, such as natural and man-made disasters, virus outbreak, or equipment failure

Inquire About
CISSP - Information Systems Security Management Professional (ISSMP)

Ideal Candidates for CISSP - Information Systems Security Management Professional (ISSMP) Class

Leaders of the organization's information security program who typically hold a job title such as chief information security officer, information security director, or enterprise security manager
Individuals pursuing CISSP-ISSMP® certification

CISSP - Information Systems Security Management Professional (ISSMP) Prerequisites

CISSP

What You'll Get in CISSP - Information Systems Security Management Professional (ISSMP)

What You'll Learn in CISSP - Information Systems Security Management Professional (ISSMP)

In-depth coverage of the five domains required to pass the CISSP-ISSMP exam:

Security Leadership and Management
Security Lifecycle Management
Security Compliance Management
Contingency Management
Law, Ethics, and Incident Management

CISSP - Information Systems Security Management Professional (ISSMP) Certification

Certified Information Systems Security Professional-Information System Security Management Professional

CISSP - Information Systems Security Management Professional (ISSMP) Outline

1. Domain 1: Security Leadership and Management

  • Understand Security's Role in the Organization's Culture, Vision, and Mission
  • Align Security Program with Organizational Governance
  • Define and Implement Information Security Strategies
  • Manage Data Classification
  • Define and Maintain Security Policy Framework
  • Manage Security Requirements in Contracts and Agreements
  • Develop and Maintain a Risk Management Program
  • Manage Security Aspects of Change Control
  • Oversee Security Awareness and Training Programs
  • Define, Measure, and Report Security Metrics
  • Prepare, Obtain, and Administer Security Budget
  • Manage the Security Organization
  • Understand Project Management Principles

2. Domain 2: Security Lifecycle Management

  • Manage the Integration of Security into the SDLC
  • Integrate New Business Initiatives into the Security Architecture
  • Define and Oversee Comprehensive Vulnerability Management Programs

3. Domain 3: Security Compliance Management

  • Validate Compliance with Organizational Security Policies and Procedures
  • Manage and Document Exceptions to the Compliance Framework
  • Coordinate with Auditors and Assist with the Internal and External Audit Process

4. Domain 4: Contingency Management

  • Oversee Development of Contingency Plans
  • Guide Development of Recovery Strategies
  • Manage Maintenance of the BCP and DRP plans
5. Domain 5: Law, Ethics, and Incident Management
  • Understand the Impact of Laws that Relate to Information Security
  • Develop and Manage the Incident Handling and Investigation Processes
  • Understand Management Issues as They Relate to the (ISC)2 Code of Ethic

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).



This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.



CISSP Information Systems Security Architecture Professional (ISSAP)



© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W