Cissp -Issmp Exam Outline

download Cissp -Issmp Exam Outline

of 33

Transcript of Cissp -Issmp Exam Outline

  • 8/10/2019 Cissp -Issmp Exam Outline

    1/33

    1

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    (Exam Outline)Effective Date: April 2013

    April 2013

  • 8/10/2019 Cissp -Issmp Exam Outline

    2/33

    2

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Non-Discrimination

    ISC) does not discriminate candidates based on their nationality, gender, religion, race,ethnicity, sexual orientation, age and disability. For further info rmation on (ISC)s non -

    discrimination policy, please visit https://www.isc2.org/legal-info-policies.aspx .

    https://www.isc2.org/legal-info-policies.aspxhttps://www.isc2.org/legal-info-policies.aspxhttps://www.isc2.org/legal-info-policies.aspxhttps://www.isc2.org/legal-info-policies.aspx
  • 8/10/2019 Cissp -Issmp Exam Outline

    3/33

    3

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    1) SECURITY LEADERSHIP AND MANAGEMENT ......................................................................................5

    Overview .......................................................................................................................................................5

    Key Areas of Knowledge ........................................................................................................................6

    2) SECURITY LIFECYCLE MANAGEMENT ..................................................................................................9

    Overview ...................................................................................................................................................9

    Key Areas of Knowledge ........................................................................................................................9

    3) SECURITY COMPLIANCE MANAGEMENT......................................................................................... 11

    Overview ................................................................................................................................................ 11

    Key Areas of Knowledge ..................................................................................................................... 11

    4) CONTINGENCY MANAGEMENT ....................................................................................................... 12

    Overview ................................................................................................................................................ 12

    Key Areas of Knowledge ..................................................................................................................... 12

    5) LAW,ETHICS AND INCIDENT MANAGEMENT ................................................................................... 14

    Overview ................................................................................................................................................ 14

    Key Areas of Knowledge ..................................................................................................................... 14

    REFERENCES ............................................................................................................................................... 15

    SAMPLE EXAM QUESTIONS ....................................................................................................................... 18

    GENERAL EXAMINATION INFORMATION ................................................................................................ 20

    Paper Based Test (PBT) ............................................................................................................................. 20

    Any questions? .......................................................................................................................................... 23

    GENERAL EXAMINATION INFORMATION ................................................................................................ 24

    Computer Based Test (CBT) .................................................................................................................... 24

    Registering for the Exam .......................................................................................................................... 24

    Scheduling a Test Appointment ............................................................................................................. 25

    Non Disclosure ........................................................................................................................................... 28

    Day of the Exam ....................................................................................................................................... 28

    Any questions? .......................................................................................................................................... 32

  • 8/10/2019 Cissp -Issmp Exam Outline

    4/33

    4

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    ISSMPs are CISSPs who specialize in establishing, presenting, and governing information securityprograms demonstrating management and leadership skills. They direct the alignment ofsecurity programs with the organizations mission, goals, and s trategies in order to meetenterprise financial and operational requirements in support of its desired risk position.

    The purpose of the CISSP-ISSMP certification examination is to recognize professional informationsecurity managers who have obtained expertise and experience appropriate to manage anenterprise s information security program. The CISSP-ISSMP is a leader of the organizationsinformation security program and typically holds a job title such as Chief Information SecurityOfficer, Information Security Director, or Enterprise Security Manager.

    This Candidate Information Bulletin provides the following: Exam blueprint to a limited level of detail that outlines major topics and sub-topics

    within the domains Suggested reference list Description of the format of the items on the exam, and Basic registration/administration policies General Exam Information for computer based testing and paper based testing.

    Candidates should review this section accordingly.

    Candidates for the CISSP-ISSMP must: Be a CISSP in good standing Demonstrate 2 years of cumulative paid full-time work experience in one or more

    domains of this concentration Pass the CISSP-ISSMP examination Maintain the credential in good standing along with the underlying CISSP

    Before candidates are allowed to take the test at testing centers, they must respondyes or No to the following four question s regarding criminal history and relatedbackground:

    1. Have you ever been convicted of a felony; a misdemeanor involving acomputer crime, dishonesty, or repeat offenses; or a Court Martial in militaryservice, or is there a felony charge, indictment, or information now pendingagainst you? (Omit minor traffic violations and offenses prosecuted in juvenilecourt).

    2. Have you ever had a professional license, certification, membership or

    registration revoked, or have you ever been censured or disciplined by anyprofessional organization or government agency?

    3. Have you ever been involved, or publicly identified, with criminal hackers orhacking?

    4. Have you ever been known by any other name, alias, or pseudonym? (Youneed not include user identities or screen names with which you were publiclyidentified).

  • 8/10/2019 Cissp -Issmp Exam Outline

    5/33

    5

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    1) SECURITY LEADERSHIP AND MANAGEMENT

    Overview

    The Security Leadership and Management domain ass esses the candidates fundamental skillsand knowledge in managing an organizations information security program. It is built upon theconcepts of information security from an organizational perspective and emphasizesinformation securitys ro le in supporting the overall goal of the organization. In this domainemphasis is placed on application and management of appropriate processes andtechnologies to achieve organizational goals and objectives for information security.

    The CISSP-ISSMP candidate should have an understanding of:

    Collaborating with organizational leaders to develop, document and enforceinformation security strategies and governance.

    Developing information security goals and objectives in support of organizationalmissions, goals and objectives.

    Developing and maintaining policies and procedures for achieving goals and objectives. Working successfully across organizational, political, regulatory or market boundaries. Utilizing risk management principles in problem solving and goal prioritization, including,

    threat and impact assessment, and risk mitigation. Developing key performance indicators and meaningful metrics to monitor and assess

    the effectiveness of the security program. Assisting organizational leaders in determining data classification and establishing

    efficient, effective controls. Participating in the change control process to manage the security implications of

    proposed changes.

    Managing the security aspects of contracts and procurement of managed services. Determining information security training and awareness goals and overseeing

    implementation of an organizational information security training and awareness

    program that includes: information security policy, roles and responsibilities, acceptable

    use of system resources, regulatory compliance, incident detection and response, and

    information security processes and procedures.

  • 8/10/2019 Cissp -Issmp Exam Outline

    6/33

    6

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Using sound management practices to administer the security program, its staff and itsbudget.

    Key Areas of Knowledge

    1.A Underst and Securitys Role in the Organizations Culture, Vision and Mission

    1.A.1 Define information security program vision and mission

    1.A.2 Align security with organization's goals and objectives

    1.A.3 Understand business processes and their relationships

    1.A.4 Describe the relationship between organization culture and security

    1.B Align Security Program with Organizational Governance

    1.B.1 Understand the organizational governance structure

    1.B.2 Understand the roles of key stakeholders

    1.B.3 Recognize sources and boundaries of authorization

    1.B.4 Define the security governance structure

    1.C Define and Implement Information Security Strategies

    1.C.1 Identify security requirements from business initiative

    1.C.2 Evaluate the capacity and capability to implement security strategies

    1.C.3 Manage implementation of security strategies

    1.C.4 Review and maintain security strategies

    1.D Manage Data Classification

    1.D.1 Sensitivity

    1. D.2 Criticality

    1.E Define and Maintain Security Policy Framework

    1.E.1 Determine applicable external standards

    1.E.2 Establish internal policies

    1.E.3 Garner/build organizational support for policies

  • 8/10/2019 Cissp -Issmp Exam Outline

    7/33

    7

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    1.E.4 Direct development of and approve procedures, standards, guidelines andbaselines

    1.E.5 Ensure periodic review of security policy framework

    1.F Manage Security Requirements in Contracts and Agreements

    1.F.1 Evaluation of service management agreements (e.g., risk, financial)

    1.F.2 Governance of managed services (e.g., "infrastructure, software, platform" asa service)

    1.F.3 Understand impact of organizational change (e.g., mergers and acquisitions,outsourcing, divestitures)

    1.F.4 Monitor and enforce compliance with contractual agreements

    1.G Develop and Maintain a Risk Management Program

    1.G.1 Understand enterprise risk management objectives

    1.G.2 Evaluate risk assessment results

    1.G.3 Communicate security business risk to management

    1.G.4 Determine and manage the appropriate countermeasures and makerecommendations

    1.G.5 Obtain management acceptance and support of residual risk1.H Manage Security Aspects of Change Control

    1.H.1 Integrate security requirements with change control process

    1.H.2 Identify stakeholders

    1.H.3 Oversee documentation and tracking

    1.H.4 Assure policy compliance

    1.I Oversee Security Awareness and Training Programs

    1.I.1 Promote security programs to key stakeholders1.I.2 Identify training needs by target segment

    1.I.3 Monitor and report on effectiveness of security awareness and training programs

    1.J Define, Measure, and Report Security Metrics

    1.J.1 Identify KPIs

  • 8/10/2019 Cissp -Issmp Exam Outline

    8/33

    8

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    1.J.2 Relate KPIs to the risk position of the organization

    1.J.3 Use metrics to drive security program development1.K Prepare, Obtain, and Administer Security Budget

    1.K.1 Manage and report financial responsibilities

    1.K.2 Prepare and secure annual budget

    1.K.3 Understand economic environment1.L. Manage the Security Organization (e.g., define roles and responsibilities,

    determine FTEs, performance evaluation)

    1.M. Understand Project Management Principles (e.g., time, scope, and cost relationship, work breakdown structure)

  • 8/10/2019 Cissp -Issmp Exam Outline

    9/33

    9

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    2) SECURITY LIFECYCLE MANAGEMENT

    Overview

    The Security Lifecycle Management domain assesses the candidates knowledg e and skill inintegrating information security principles and processes into new business initiatives, as well asthe System Development Life Cycle (SDLC), including the operations and maintenance anddisposal phases. Security must be included from the early stages of all projects to identify andmanage vulnerabilities and remediate risks. The candidate should have an understanding of:

    The organizations operating environment and threats and vulnerabilities that could have

    a negative impact on business functions. Emerging trends in technologies and operating environments (e.g., cloud computing). Collaborating with organizational leaders to identify and assess risks associated with new

    initiatives. Overseeing processes to define, document, and test information security requirements as

    part of new initiatives. Using configuration management to minimize the risk of introducing new vulnerabilities. Developing processes and procedures for identifying and remediating vulnerabilities.

    Key Areas of Knowledge

    2.A. Manage the Integration of Security into the System Development Lifecycle(SDLC)

    2.A.1 Identify lifecycle processes within the organization

    2.A.2 Integrate information security gates (decision points) and milestones intolifecycle

    2.A.3 Monitor compliance with the lifecycle

    2.A.4 Oversee the configuration management process

    2.B. Integrate New Business Initiatives into the Security Architecture

    2.B.1 Participate in development of business case for new initiatives to integratesecurity

  • 8/10/2019 Cissp -Issmp Exam Outline

    10/33

    10

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    2.B.2 Address impact of new business initiatives on security (e.g., cloud, bigdata)

    2.C. Define and Oversee Comprehensive Vulnerability Management Programs(e.g., vulnerability scanning, penetration testing, threat analysis)

    2.C.1 Classify assets, systems, and services based on criticality to business

    2.C.2 Prioritize threats and vulnerabilities

    2.C.3 Oversee security testing

    2.C.4 Remediate vulnerabilities based on risk

  • 8/10/2019 Cissp -Issmp Exam Outline

    11/33

    11

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    3) SECURITY COMPLIANCE MANAGEMENT

    Overview

    The Security Compliance Management domain assesses the candidates knowledge and skill inestablishing, managing, and overseeing a process to help monitor, assess and enforcecompliance with security policies and procedures. The process should include meaningfulmetrics, identify acceptable exceptions and report status to senior managers. The candidateshould also understand audit goals and procedures and should be able to help prepare for andparticipate in both internal and external audits and respond to audit findings.

    Key Areas of Knowledge

    3.A Validate Compliance with Organizational Security Policies and Procedures

    3.A.1 Define a compliance framework

    3.A.2 Implement validation procedures outlined in framework

    3.A.3 Utilize and report on security compliance metrics

    3.B Manage and Document Exceptions to the Compliance Framework

    3.C Coordinate with Auditors and Assist with the Internal and External Audit Process

    3.C.1 Preparation

    3.C.2 Scheduling (e.g., availability, mitigation timeline)

    3.C.3Evaluation (e.g., validate findings, assess impact, providecomments, and resolution)

    3.C.4 Formulate response

  • 8/10/2019 Cissp -Issmp Exam Outline

    12/33

    12

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    4) CONTINGENCY MANAGEMENT

    Overview

    The Contingency Management domain assesses the candidates knowledge and skill inplanning and implementing processes for reducing the impact of adverse events, such asnatural or man-made disasters, virus outbreak, or equipment failure. The candidate shouldpossess the necessary knowledge and skill to assist organizational leaders in identifying key

    business functions and information assets, as well as developing, maintaining and implementingrecovery strategies. Planning for disasters must take into account business priorities and goals aswell as resources needed to maintain or restore capabilities.

    Key Areas of Knowledge

    4.A Oversee Development of Contingency Plans

    4.A.1Address challenges related to the business continuity process (e.g., time,resources, verification)

    4.A.2 Address challenges related to the disaster recovery process (time,resources, verification)

    4.A.3 Coordinate with key stakeholders

    4.A.4 Understand organizational drivers & policies

    4.A.5 Oversee Business Impact Analysis (BIA) process

    4.B Guide Development of Recovery Strategies

    4.B.1 Identify and analyze alternatives

    4.B.2 Recommend and coordinate strategies

    4.B.3 Assign security roles and responsibilities

  • 8/10/2019 Cissp -Issmp Exam Outline

    13/33

    13

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    4.C Manage Maintenance of the BCP and DRP plans (e.g., lessons learned,architecture changes)

    4.C.1 Plan testing, evaluation, and modification

    4.C.2 Determine survivability and resiliency capabilities

    4.C.3 Manage recovery process

  • 8/10/2019 Cissp -Issmp Exam Outline

    14/33

  • 8/10/2019 Cissp -Issmp Exam Outline

    15/33

    15

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    REFERENCES

    This reference list is NOT intended to be an all-inclusive collection representing the CISSP CoreBody of Knowledge (CBK). Its purpose is to provide candidates a starting point for their studiesin domains which need supplementary learning in order to complement their associated levelof work and academic experience. Candidates may also consider other references, which arenot on this list but adequately cover domain content.

    Note : (ISC) 2 does not endorse any particular text or author and does not imply that any or all references be acquired or consulted. (ISC) 2 does not imply nor guarantee that the study ofthese references will result in an examination pass.

  • 8/10/2019 Cissp -Issmp Exam Outline

    16/33

    16

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Reference Author

    A Practical Guide to Security Assessments, 2004 Sudhanshu Kairab

    Asset Protection and Security Management Handbook, 2003 James Walsh

    Building a global Information Assurance Program, 2005Raymond J. Curts, Douglas E.Campbell

    Building an Information Security Awareness Program, 2001 Marck B.Desman

    Business Continuity Management: Building an Effective IncidentManagement Plan, 2009

    Michael Blyth

    Computer Forensics, Computer Crime Scene Investigation 2 nd Ed. 2005 John R. Vacca

    Computer Security Art and Science, 2002 Matt Bishop

    Corporate Resiliency: Managing the Growing Risk of Fraud andCorruption, 2009

    Toby J. Bishop, Frank E. Hydoski

    The Definitive Handbook of Business Continuity Management, 2010 Andrew Hiles

    Disaster Recovery Planning: Preparing for the Unthinkable 3rd Ed. 2003 Jon William Toiga

    Enterprise Security Architecture: A Business-Driven Approach, 2005John Sherwood, Andrew Clark,David Lynas

    EU Directive 95/46/EC on the protection of individuals with regard tothe processing of personal data and on the free movement of suchdata, 1995

    European Parliament, Council of theEuropean Union

    Information Assurance - Managing Organizational IT Security Risks,2002

    Joseph G. Boyce, Dan W. Jennings

    Information Security Management Handbook Series, 1998, 2000, 2001,2003, 2005,2006, 2007, 2008

    Harold F. Tipton, Micki Krause

    Inside the Security Mind, 2003 Kevin Day

    ISO/IEC 27001:2005 - Information technology -- Security techniques --Information security management systems -- Requirements.

    ISO

    ISO/IEC 27002:2005 - Information technology - Security techniques -Code of practice for information security management.

    ISO

    ISO/IEC 27003:2010 - Information technology - Security techniques -Information security management system implementation guidance

    ISO

    ISO/IEC 27004:2009 - Information technology - Security techniques -Information security management - Measurement

    ISO

  • 8/10/2019 Cissp -Issmp Exam Outline

    17/33

    17

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    ISO/IEC 27005:2011- Information technology - Security techniques -Information security risk management ISO

    ISO/IEC 29100:2011 - Information technology - Security techniques -Privacy framework

    ISO

    IT Governance: A Manager's Guide to Data Security and ISO 27001 /ISO 27002, 2008

    Alan Calder, Steve Watkins

    IT Security Risking the Corporation, 2003 Linda McCarthy

    Managing an Information Security and Privacy Awareness TrainingProgram, 2005

    Rebecca Herold

    The New School of Information Security, 2008 Adam Shostack, Andrew Stewart

    NIST Special Publication 800-30, July 2002 or later,Risk Management Guide for Information Technology Systemshttp://csrc.nist.gov/publications/PubsSPs.html

    Gary Stoneburner, Alice Goguen,and Alexis Feringa

    NIST Special Publication 800-35, October 2003 or later,Guide to Information Technology Security Services,http://csrc.nist.gov/publications/PubsSPs.html

    Grance, Hash, Stevens, O'Neal,Bartol

    NIST Special Publication 800-47, August 2002 or later,Security Guide for Interconnecting Information Technology Systemshttp://csrc.nist.gov/publications/PubsSPs.html

    Grance, Hash, et al.

    NIST Special Publication 800-55 rev 1 or later, July 2008Performance Measurement Guide for Information Securityhttp://csrc.nist.gov/publications/PubsSPs.html

    Chew, Swanson, Stein, Bartol, Brown,Robinson

    NIST Special Publication 800-100, October 2006 or later,Information Security Handbook: A Guide for Managershttp://csrc.nist.gov/publications/PubsSPs.html

    Pauline Bowen, Joan Hash, MarkWilson

    The Practice of Network Security, 2003 Allan Liska

    Surviving and Thriving in Uncertainty: Creating The Risk IntelligentEnterprise, 2010

    Frederick Funston, Stephen Wagner

    http://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.htmlhttp://csrc.nist.gov/publications/PubsSPs.html
  • 8/10/2019 Cissp -Issmp Exam Outline

    18/33

    18

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    SAMPLE EXAM QUESTIONS

    1. Which of the following methods of training users in security awareness is BEST for employees?

    (A) Offer textual information regarding security awareness to the employees

    (B) Provide the employees with a video concerning security awareness

    (C) Demonstrate security awareness practices to the employees

    (D) Make a web-based presentation on the subject of security awareness available to

    the employees

    Answer: C

    2. A hostile code has made an initial entry into a companys enterprise. Given thisscenario, which stage of the lifecycle does the hostile code now enter in order tobecome suitable for infection?

    (A) Propagation

    (B) Dormancy

    (C) Payload delivery

    (D) Triggering event

    Answer: A

  • 8/10/2019 Cissp -Issmp Exam Outline

    19/33

  • 8/10/2019 Cissp -Issmp Exam Outline

    20/33

    20

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    GENERAL EXAMINATION INFORMATION

    Paper Based Test (PBT)

    Please note: General Exam Information there are two sets of instructions one for ComputerBased Test (CBT), and one for Paper Based Test (PBT). Please choose accordingly.

    General Information

    The doors to all examination rooms will open at 8:00a.m. Examination instructions will beginpromptly at 8:30a.m. All examinations will begin at approximately 9:00a.m.

    The maximum duration of the CISSP exam is 6 hours. The maximum duration of all other exams

    except the CSSLP is 3 hours. The CSSLP candidates are allowed a maximum of 4 hours tocomplete the exam.

    Please note there will be no lunch break during the testing period. However, you arepermitted to bring a snack with you. You may, at your option, take a break and eat yoursnack at the back of the examination room. No additional time will be allotted for breaks.

    Examination Admittance

    Please arrive at 8:00a.m. when the doors a r e opened. Please bring your admission letter tothe examination site. In order to be admitted, photo identification is also required. You will notbe admitted without proper identification. The only acceptable forms of identification are a

    drivers license, government-issued identification card, or passport. No other written formsof identification will be accepted.

    Examination Security

    Failure to follow oral and written instructions will result in your application being voided andapplication fee being forfeited. Conduct that results in a violation of security or disrupts theadministration of the examination could result in the confiscation of your test and yourdismissal from the examination. In addition, your examination will be considered void andwill not be scored. Examples of misconduct include, but are not limited to, the following:writing on anything other than designated examination materials, writing after time is called,looking at another candidate s examination materials, talking with other candidates at any timeduring the examination period, failing to turn in all examination materials before leaving thetesting room.

    You must not discuss or share reference materials or any other examination informationwith any candidate during the entire examination period. You are particularly cautionednot to do so after you have completed the exam and checked out of the test room, asother candidates in the area might be taking a break and still not have completed the

  • 8/10/2019 Cissp -Issmp Exam Outline

    21/33

    21

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    examination. You may not attend the examination only to review or audit test materials.You may not copy any portion of the examination for any reason. No examination materialsmay leave the test room under any circumstances and all examination materials must beturned in and accounted for before leaving the testing room. No unauthorized persons will beadmitted into the testing area.

    Please be further advised that all examination content is strictly confidential. You maycommunicate with (ISC) only about the test, or questions on the test, using theappropriate comment forms provided by the examination staff at the test site. At no othertime, before, during or after the examination, may you communicate orally, electronicallyor in writing with any person or entity about the content of the examination or individualexamination questions.

    Reference Material Candidates writing on anything other than examination materials distributed by the proctorswill be in violation of the security policies above. Reference materials are not allowed in thetesting room. Candidates are asked to bring as few personal and other items as possible to thetesting area.

    Hard copies of language translation dictionaries are permitted for the examination, shouldyou choose to bring one to assist you with language conversions. Electronic dictionarieswill not be permitted under any circumstances. The Examination Supervisor will fully inspectyour dictionary at check-in. Your dictionary may not contain any writing or extraneous

    materials of any kind. If the dictionary contains writing or other materials or papers, it will notbe permitted in the examination room. Additionally, you are not permitted to write in yourdictionary at any time during the examination, and it will be inspected a second time priorto dismissal from the examination. Finally, (ISC) takes no responsibility for the content ofsuch dictionaries or interpretations of the contents by a candidate.

    Examination Protocol

    While the site climate is controlled to the extent possible, be prepared for either warm or cooltemperatures at the testing center. Cellular phones and beepers are prohibited in thetesting area. The use of headphones inside the testing area is prohibited. Electrical outlets

    will not be available for any reason. Earplugs for sound suppression are allowed. Nosmoking or use of tobacco products will be allowed inside the testing area. Food and drinksare only allowed in the snack area located at the rear of the examination room. You mustvacate the testing area after you have completed the examination. If you require specialassistance, you must contact (ISC) Candidate Services (see address at the bottom of thisdocument) at least one week in advance of the examination date and appropriate

  • 8/10/2019 Cissp -Issmp Exam Outline

    22/33

    22

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    arrangements will be made. Due to limited parking facilities at some sites, please allow ampletime to park and reach the testing area.

    Admission Problems A problem table for those candidates who did not receive an admission notice or need otherassistance will be available 30 minutes prior to the opening of the doors.

    Examination Format and Scoring

    The CISSP

    examination consists of 250 multiple choice questions with four (4)choices each.

    The CSSLP

    examination consists of 175 multiple choice questions with four (4) choices

    each. The SSCP examination contains 125 multiple choice questions with four (4) choices

    each. The ISSAP, ISSEP, and ISSMP conce ntra ti on examinations contain 125, 150, 125

    multiple choice questions respectively with four (4) choices each. The Certified Authorization Professional (CAP) examination contains 125 multiple

    choice questions with four (4) choices each. Also, administered in computers.

    There may be scenario-based items which may have more than one multiple choicequestion associated with it. These items will be specifically identified in the test booklet.

    Each of these exams contains 25 questions which are included for research purposes only.The research questions are not identified; therefore, answer all questions to the best of yourability. There is no penalty for guessing, so candidates should not leave any item unanswered.Examination results will be based only on the scored questions on the examination. Thereare several versions of the examination. It is important that each candidate have anequal opportunity to pass the examination, no matter which version is administered. SubjectMatter Experts (SMEs) have provided input as to the difficulty level of all questions used in theexaminations. That information is used to develop examination forms that have comparabledifficulty levels. When there are differences in the examination difficulty, a mathematicalprocedure called equating is used to make the difficulty level of each test form equal.

    Because the number of questions required to pass the examination may be different for eachversion, the scores are converted onto a reporting scale to ensure a common standard. Thepassing grade required is a scale score of 700 out of a possible 1000 points on the gradingscale.

  • 8/10/2019 Cissp -Issmp Exam Outline

    23/33

    23

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Examination Results

    Examination results will normally be released, via e mail, within 6 to 8 weeks of theexamination date. A comprehensive statistical and psychometric analysis of the score datais conducted prior to the release of scores. A minimum number of candidates must havetaken the examination for the analysis to be conducted. Accordingly, depending upon theschedule of test dates for a given cycle, there may be occasions when scores are delayedbeyond the 6-8 week time frame in order to complete this critical process. Results WILL NOTbe released over the telephone. In order to receive your results, your p ri mary e mai laddress must be current and any email address changes must be submitted to (ISC) Customer Support via email [email protected] , or may be updated online in your

    candidate profile.Exam Response Information

    Your answer sheet MUST be completed with your name and other information as required.The answer sheet must be used to record all answers to the multiple-choice questions. Uponcompletion, you are to wait for the proctor to collect your examination materials. Answersmarked in the test booklet will not be counted or graded, and additional time will not beallowed in order to transfer answers to the answer sheet. All marks on the answer sheet mustbe made with a No. 2 pencil. You must blacken the appropriate circles completely andcompletely erase any incorrect marks. Only your responses marked on the answer sheet will

    be considered. An unanswered question will be scored as incorrect. Dress is business casual(neat...but certainly comfortable).

    Any questions?

    (ISC) 2

    Candidate Services311 Park Place Blvd, Suite 400Clearwater, FL 33759Phone: 1.866.331.ISC2 (4722) in the United States1.727.785.0189 all othersFax: 1.727.683.0785

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/10/2019 Cissp -Issmp Exam Outline

    24/33

    24

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    GENERAL EXAMINATION INFORMATION

    Computer Based Test (CBT)Please note: General Exam Information there are two sets of instructions one for ComputerBased Test (CBT), and one for Paper Based Test (PBT). Please choose accordingly.

    Registering for the Exam

    Process for Registration Overview

    This section describes procedures for candidates registering to sit for a Computer Based Test(CBT). The test is administered at Pearson VUE Testing centers in the US, Canada, and otherparts of the world.

    1. Go to www.pearsonvue.com/isc2 to register for a test appointment.2. Select the most convenient test center3. Select an appointment time.4. Pay for your exam appointment.5. Receive confirmation from Pearson VUE with the appointment details, test center

    location and other relevant instructions, if any.

    Please note that your registration information will be transferred to (ISC) and allcommunication about the testing process from (ISC) and Pearson VUE will be sent to you via

    email.

    Fees

    Please visit the (ISC) 2 website https://www.isc2.org/certification-register-now.aspx for the mostcurrent examination registration fees.

    U.S. Government Veterans Administration G.I. Bill

    The U.S. Department of Veterans Affairs has approved reimbursement to veterans under the G.I.Bill for the cost of the Certified Information System Security Professional (CISSP), the CISSPConcentrations (ISSAP, ISSEP, ISSMP), the Certification and Accreditation Professional (CAP), andthe System Security Certified Practitioner (SSCP) examinations. Please refer to the U.S.Department of Veterans Affairs Website at www.va.gov for more details.

    http://www.pearsonvue.com/isc2http://www.pearsonvue.com/isc2http://www.pearsonvue.com/isc2https://www.isc2.org/certification-register-now.aspxhttps://www.isc2.org/certification-register-now.aspxhttps://www.isc2.org/certification-register-now.aspxhttp://www.pearsonvue.com/isc2
  • 8/10/2019 Cissp -Issmp Exam Outline

    25/33

  • 8/10/2019 Cissp -Issmp Exam Outline

    26/33

    26

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    forfeiture of exam fees. Exam fees are also forfeited for no-shows. Please note that, Pearson VUEcharges a 50 USD/ 35 /40 fee for reschedules, and 100 USD/70 /80 fee for cancellations.

    Reschedules and cancellations may be done at the (ISC) CBT Candidate Website(www.pearsonvue.com/isc2 ) or via telephone. Please r efer to Contact Information for moreinformation and local telephone numbers for your region.

    Late Arrivals or No Shows

    If the candidate does not arrive within 15 minutes of the scheduled exam starting time, he orshe has technically forfeited his or her assigned seat.

    If the candidate arrives late (after 15 minutes of his/her scheduled appointment), it is up to thediscretion of the testing center as to whether or not the candidate may still take the exam. If thetest administrator at the testing location is able to accommodate a late arriving candidate,without affecting subsequ ent candidates appointments, he/she will let the candidate to sit forthe exam and launch his/her exam.

    Any/all attempts are made to accommodate candidates who arrive late. However, if theschedule is such that the test center is not able to accommodate a late arrival, the candidatewill be turned away and his/her exam fees will be forfeited.

    If a candidate fails to appear for a testing appointment, the test result will appear in the systemas a No-Show and the candidate s exam fees will be forfeited.

    Procedure for Requesting Special AccommodationsPearson VUE Professional Centers can accommodate a variety of candidates needs, as theyare fully compliant with the Americans with Disability Act (ADA), and the equivalentrequirements in other countries.

    Requests for accommodations should be made to (ISC) in advance of the desired testingappointment. Once (ISC) grants the accommodations request, the candidate may schedulethe testing appointment using Pearson VUEs special accommodations number. From there, aPearson VUE coordinator will handle all of the arrangements.

    PLEASE NOTE: Candidates that request special accommodations should not schedule theirappointment online or call the main CBT registration line.

    http://www6.pearsonvue.com/isc2/http://www6.pearsonvue.com/isc2/http://www6.pearsonvue.com/isc2/http://www6.pearsonvue.com/isc2/
  • 8/10/2019 Cissp -Issmp Exam Outline

    27/33

    27

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    What to Bring to the Test Center

    Proper Identification

    (ISC) requires two forms of identification, a primary and a secondary, when checking in for aCBT test appointment at a Pearson VUE Test Center. All candidate identification documentsmust be valid (not expired) and must be an original document (not a photocopy or a fax).

    Primary IDs: Must contain a permanently affixed photo of the candidate, along with thecandidates signature.

    Secondary IDs : Must have t he candidates signature.

    Accepted Primary ID (photograph and signature, not expired) Government issued Drivers License or Identification Card U.S. Dept of State Drivers License U.S. Learners Permit (card only with photo and signature) National/State/Country Identification Card Passport Passport Cards Military ID Military ID for spouses and dependents Alien Registration Card (Green Card, Permanent Resident Visa) Government Issued local language ID (plastic card with photo and signature Employee ID School ID Credit Card* (A credit card can be used as a primary form of ID only if it contains both

    a photo and a signature and is not expired. Any credit card can be used as asecondary form of ID, as long as it contains a signature and is not expired. This includesmajor credit cards, such as VISA, MasterCard, American Express and Discover. It alsoincludes department store and gasoline credit cards.

    Accepted Secondary ID (contains signature, not expired) U.S. Social Security Card

    Debit/(ATM) Card Credit Cards Any form of ID on the primary list

  • 8/10/2019 Cissp -Issmp Exam Outline

    28/33

    28

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Name Matching Policy

    Candidates first and last name on the presented identification document must exactly matchthe first and last name on the registration record with Pearson VUE. If the name the candidatehas registered with does not match the name on the identification document, proof of legalname change must be brought to the test center on the day of the test. The only acceptableforms of legal documentation are marriage licenses, divorce decrees, or court sanctioned legalname change documents. All documents presented at the test center must be originaldocuments. If a mistake is made with a name during the application process, candidatesshould contact (ISC) to correct the information well in advance of the actual test date. Namechanges cannot be made at the test center or on the day of the exam. Candidates who donot meet the requirements presented in the name matching policy on the day of the test may

    be subject to forfeiture of testing fees and asked to leave the testing center.

    Non Disclosure

    Prior to starting the exam, all candidates are presented with (ISC) non-disclosure agreement(NDA), and are required in the computer to accept the agreement prior to being presentedwith exam questions. If the NDA is not accepted by the candidate, or refused to accept withinthe time allotted, the exam will end, and the candidate will be asked to leave the test center.No refund of exam fees will be given. For this reason, all candidates are strongly encouraged toreview the non-disclosure agreement prior to scheduling for, or taking the exam.

    The agreement is located at www.pearsonvue.com/isc2/isc2_nda.pdf .

    Day of the Exam

    Check-In Process

    Plan to arrive at the Pearson VUE testing center at least 30 minutes before the scheduled testingtime. If you arrive more than 15 minutes late to your scheduled appointment, you may lose yourexamination appointment. For checking-in:

    You will be required to present two acceptable forms of identification. You will be asked to provide your signature, submit to a palm vein scan, and have

    your photograph taken. Hats, scarves and coats may not be worn in the testing room,or while your photograph is being taken.

    You will be required to leave your personal belongings outside the testing room.Secure storage will be provided. Storage space is small, so candidates should plan

    http://www.pearsonvue.com/isc2/isc2_nda.pdfhttp://www.pearsonvue.com/isc2/isc2_nda.pdfhttp://www.pearsonvue.com/isc2/isc2_nda.pdfhttp://www.pearsonvue.com/isc2/isc2_nda.pdf
  • 8/10/2019 Cissp -Issmp Exam Outline

    29/33

    29

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    appropriately. Pearson Professional Centers assume no responsibility for candidatespersonal belongings.

    The Test Administrator (TA) will give you a short orientation, and then will escort you toa computer terminal. You must remain in your seat during the examination, exceptwhen authorized to leave by test center staff. You may not change your computerterminal unless a TA directs you to do so.

    Raise your hand to notify the TA if you

    believe you have a problem with your computer. need to change note boards. need to take a break. need the administrator for any reason.

    BreaksYou will have up to six hours to complete the CISSP , and up to four hours to complete the CSSLPand CCFP up to three hours to complete the following examinations:

    SSCP CAP HCISPP ISSAP ISSEP ISSMP

    Total examination time includes any unscheduled breaks you may take. All breaks countagainst your testing time. You must leave the testing room during your break, but you may notleave the building or access any personal belongings unless absolutely necessary (e.g. forretrieving medication). Additionally, when you take a break, you will be required to submit to apalm vein scan before and after your break.

    Examination Format and Scoring

    The CISSP

    examination consists of 250 multiple choice questions with four (4) choiceseach.

    The CSSLP

    examination consists of 175 multiple choice questions with four (4) choiceseach.

    The HCISPP examination contains 125 multiple choice questions with four (4) choiceseach.

    The CCFP examination contains 125 multiple choice questions with four (4) choices each.

  • 8/10/2019 Cissp -Issmp Exam Outline

    30/33

    30

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    The SSCP examination contains 125 multiple choice questions with four (4) choiceseach.

    The ISSAP , ISSEP , and ISSMP concentration examinations contain 125, 150, 125multiple choice questions respectively with four (4) choices each.

    The Certified Authorization Professional (CAP ) examination contains 125 multiple choicequestions with four (4) choices each. Also, administered in computers.

    There may be scenario-based items which may have more than one multiple choicequestion associated with it. These items will be specifically identified in the test booklet.

    Each of these exams contains 25 questions which are included for research purposes only.The research questions are not identified; therefore, answer all questions to the best of yourability. There is no penalty for guessing, so candidates should not leave any item unanswered.Examination results will be based only on the scored questions on the examination. Thereare several versions of the examination. It is important that each candidate have anequal opportunity to pass the examination, no matter which version is administered. SubjectMatter Experts (SMEs) have provided input as to the difficulty level of all questions used in theexaminations. That information is used to develop examination forms that have comparabledifficulty levels. When there are differences in the examination difficulty, a mathematicalprocedure called equating is used to make the difficulty level of each test form equal.Because the number of questions required to pass the examination may be different for eachversion, the scores are converted onto a reporting scale to ensure a common standard. The

    passing grade required is a scale score of 700 out of a possible 1000 points on the gradingscale.

    Technical Issues

    On rare occasion s, technical problems may require rescheduling of a candidates examination.If circumstances arise causing you to wait more than 30 minutes after your scheduledappointment time, or a restart delay lasts longer than 30 minutes, you will be given the choiceof continuing to wait, or rescheduling your appointment without an additional fee.

    If you choose to wait, but later change your mind at any time prior to beginning or restarting the examination, you will be allowed to take exam at a later date, atno additional cost.

    If you choose not to reschedule, but rather test after a delay, you will have nofurther recourse, and your test results will be considered valid.

    If you choose to reschedule your appointment, or the problem causing the delaycannot be resolved, you will be allowed to test at a later date at no additionalcharge. Every attempt will be made to contact candidates if technical problemsare identified prior to a scheduled appointment.

  • 8/10/2019 Cissp -Issmp Exam Outline

    31/33

    31

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Testing Environment

    Pearson Professional Centers administer many types of examinations including some thatrequire written responses (essay-type). Pearson Professional Centers have no control over typingnoises made by candidates sitting next to you while writing their examination. Typing noise isconsidered a normal part of the computerized testing environment, just as the noise of turningpages is a normal part of the paper-and pencil testing environment. Earplugs are availableupon request.

    When the Exam is Finished

    After you have finished the examination, raise your hand to summon the TA. The TA will collectand inventory all note boards. The TA will dismiss you when all requirements are fulfilled.

    If you believe there was an irregularity in the administration of your test, or the associated testconditions adversely affected the outcome of your examination, you should notify the TAbefore you leave the test center.

    Results Reporting

    Candidates will receive their unofficial test result at the test center. The results will be handedout by the Test Administrator during the checkout process. (ISC) will then follow up with anofficial result via email.

    In some instances, real time results may not be available. A comprehensive statistical andpsychometric analysis of the score data is conducted during every testing cycle before scoresare released. A minimum number of candidates are required to take the exam before thisanalysis can be completed. Depending upon the volume of test takers for a given cycle, theremay be occasions when scores are delayed for approximately 6-8 weeks in order to completethis critical process. Results WILL NOT be released over the phone. They will be sent via emailfrom (ISC) as soon as the scores are finalized. If you have any questions regarding this policy,you should contact (ISC) prior to your examination.

    Retake Policy

    Test takers who do not pass the exam the first time will be able to retest after 30 days. Testtakers that fail a second time will need to wait 90 days prior to sitting for the exam again. In theunfortunate event that a candidate fails a third time, the next available time to sit for the examwill be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)exams a maximum of 3 times within a calendar year.

  • 8/10/2019 Cissp -Issmp Exam Outline

    32/33

    32

    2014 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial

    purposes is prohibited. 5.13.14 V9

    Effective Date: April 2013

    Recertification by Examination

    Candidates and members may recertify by examination for the following reasons ONLY;

    The candidate has become decertified due to reaching the expiration of the time limitfor endorsement.

    The member has become decertified for not meeting the number of required continuingprofessional education credits.

    Logo Usage Guidelines

    (ISC) is a non-profit membership organization identified as the leader in certifying individuals ininformation security.

    Candidates who successfully complete any of the (ISC) certification requirements may use theappropriate Certification Mark or the Collective Mark, where appropriate, and the logocontaining the Certification Mark or the Collective Mark, where appropriate (the Logo) toidentify themselves as having demonstrated the professional experience and requisiteknowledge in the realm of information system security. Please visit the following link (URL) formore information on logo use:

    https://www.isc2.org/uploadedfiles/(ISC)2_Public_Content/Legal _and _Policies/LogoGuidleines.pdf

    Any questions?

    (ISC) 2

    Candidate Services311 Park Place Blvd, Suite 400Clearwater, FL 33759Phone: 1.866.331.ISC2 (4722) in the United States1.727.785.0189 all othersFax: 1.727.683.0785

    https://www.isc2.org/uploadedfiles/(ISC)2_Public_Content/Legal%20_and%20_Policies/LogoGuidleines.pdfhttps://www.isc2.org/uploadedfiles/(ISC)2_Public_Content/Legal%20_and%20_Policies/LogoGuidleines.pdfhttps://www.isc2.org/uploadedfiles/(ISC)2_Public_Content/Legal%20_and%20_Policies/LogoGuidleines.pdf
  • 8/10/2019 Cissp -Issmp Exam Outline

    33/33

    Effective Date: April 2013