Information Systems Security Management Professional (Online Self-Paced)
ISSMP Online Self-Paced Training
Newly enhanced Official ISC2 Online Self-Paced ISSMP Training now aligns to the exam outline for a structured path that makes learning more intuitive. Learners progress through the course domain by domain with content that’s organized to cut confusion and be easy-to-follow.
Information Systems Security Management Professional (ISSMP) training guides students through a self-paced learning experience. It covers the advanced knowledge and leadership skills that security management professionals use for establishing, presenting, and governing information security programs.
Exam Peace of Mind Protection
Get an extra confidence boost for exam day with Exam Peace of Mind Protection. If you need to sit a second time, you’re covered.
What’s included with each option:
- Online learning at your own pace
- Digital eTextbook
- Pre- and post-course assessments
- Knowledge checks and end-of-domain quizzes
- Key takeaway resources for each domain
- Glossary of Terms
- Email content support
- 24/7/365 chat technical support
Education Guarantee: Learners who don’t pass the exam on their first attempt may access the same training again at no cost within one year from the end of the initial training. The education guarantee covers the cost of the second course.
Who Can Enroll?
ISSMP training is for those seeking a comprehensive review to pursue ISSMP certification. It is ideal for professionals with at least seven years of work experience in two or more of the domains listed below.
FAQs
What Is Covered?
- Domain 1: Leadership and Business Management
- Domain 2: Systems Life Cycle Management
- Domain 3: Risk Management
- Domain 4: Threat Intelligence and Incident Management
- Domain 5: Contingency Management
- Domain 6: Law, Ethics, and Security Compliance Management
What Will You Learn?
- Build a security program that aligns with and supports overall organizational goals, objectives, and values.
- Evaluate and manage risk to protect systems and data during the implementation, integration, and ongoing maintenance of organizational operations.
- Develop and oversee a risk management program.
- Develop and maintain a threat intelligence program.
- Create and oversee an incident handling and investigation program.
- Practice contingency management by developing plans and response and recovery strategies.
- Implement compliance practices to adhere to laws and regulations.
Languages Offered
At this time, content is only available in English.
Cancellation Policy
Refunds for any ISC2 courses will not be provided.
Requisites
Learners must meet these requisites to earn their certificate:
- Complete and pass each domain with a score of 70% or higher (includes all knowledge checks and the end-of-domain assessment).
- Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
- Complete and pass the final assessment with a score of 70% or higher.
- Complete the course evaluation survey.
Validity
Certificates are valid for three years from the date issued.
Certificate Use
A certificate of completion is awarded to learners who meet the requisites, successfully finish their final assessment. Although a certificate can be used to prepare for professional certification, the certificate of completion does not demonstrate competency, establish expertise, or imply licensing or accreditation in a field.
Earned CPEs for Certificate Holders
Official ISC2 online training qualifies for Continuing Professional Education (CPE) credits. See the ISC2 CPE Handbook and ISC2 CPE Opportunities for details.
Technology Requirements
The following are system requirements needed to enhance your overall learning experience. A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.
Hardware Specifications
- Processor 2 GHz +
- RAM 4 GB +
- Monitor minimum resolution (1024 x 768)
- Video card
- Keyboard and mouse or other assistive technology
Computer Peripherals
- Speakers/headphones (noise-cancelling headset is recommended)
- Microphone
- Camera (recommended)
Supported Operating Systems
- Macintosh OS X 10.10 to present
- Windows 10 to present
Supported Browsers
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
Application Software
- Adobe Reader: https://get.adobe.com/reader/