Top of Page

Online Training

Official (ISC)²  CBK Training Seminar for the  ISSMP

Price: $2,495.00

Course Includes

- 180 Days of access to Official (ISC)² ISSMP content in the learning management system
- 40 hours of on-demand videos covering all 6 domains
- Interactive flashcards
- Domain Quizzes
- Post-assessment practice questions
- Flexibility to learn on your schedule

Bonus: CISSP Self-Paced Refresher

At no additional cost, (ISC)² is offering a refresher of the CISSP material to help you prepare for the ISSMP. The CISSP Self-Paced Refresher is set up as a separate course, but we’ll give you FREE access throughout your ISSMP training. Use the CISSP materials as much (or as little) as you want to!

Register for Training

What’s Covered in the ISSMP Self-Paced Course

The ISSMP course draws from a comprehensive, up-to-date global common body of knowledge to give you deep understanding of new threats, technologies, regulations, standards and practices. Training covers the 6 domains you’ll be tested on in the exam:

  • Domain 1: Leadership and Business Management
  • Domain 2: Systems Lifecycle Management
  • Domain 3: Risk Management
  • Domain 4: Threat Intelligence and Incident Management
  • Domain 5: Contingency Management
  • Domain 6: Law, Ethics and Security Compliance Management

    Learning Objectives

    After completing this course, you will be able to:

    1. Evaluate the role of security, connect the security program with organizational governance, and prioritize security requirements in support of business initiatives to obtain support for the security program.
    2. Recommend a documented security program that includes security awareness and training and a process for analyzing, managing and enforcing security requirements for contracts and agreements.
    3. Apply metrics, budgeting, project management and management of security team and cross-functional and stakeholder associations to achieve a security program.
    4. Understand the management of security into organizational security architecture throughout the system lifecycle.
    5. Understand the organizational requirements necessary to establish an effective Risk Management Program.
    6. Understand the general processes employed in the identification of system assets, potential system threats, in-place safeguards, and vulnerabilities in the conduct and analysis of system risk assessments.
    7. Understand the principles and practices necessary to establish and maintain a successful incident handling and investigation program.
    8. Understand the processes and collaboration requirements necessary to establish, maintain, and benefit from a successful threat intelligence program.
    9. Understand the various benefits that the proper conduct of a Business Impact Analysis provides to the organization.


    If you are purchasing within North America and need to purchase on behalf of someone else, please contact the North America regional office. Email: or call Phone: +1-866-331-ISC2 (4722) ext. 2

    Cancellation Policy

    No Refunds.


    40.00 CPE



    Price: $2,495.00