1. Home
  2. ISC2
  3. ISSEP Exam Syllabus

ISC2 ISSEP Exam Syllabus

Start Free ISSEP Exam Practice After Reviewing the Topics

Before starting your ISSEP exam preparation, it is recommended to review the complete ISC2 Information Systems Security Engineering Professional exam syllabus and carefully go through the exam objectives listed below. Once you understand the exam structure and objectives, you should practice using our free ISSEP questions. We also provide premium ISSEP practice test, fully updated according to the latest exam objectives, to help you accurately assess your preparedness for the actual exam.

ISC2 ISSEP Exam Objectives

Section Weight Objectives
Systems Security Engineering Foundations 24% 1.1 Apply systems security engineering fundamentals
  • Systems security engineering trust concepts and hierarchies
  • Relationships between systems and security engineering processes
  • Structural security design principles (e.g., National Institute of Standards and Technology (NIST) engineering framework, International Organization for Standardization (IS0) 27001)
1.2 Execute systems security engineering processes (e.g., hardware, software, data)
  • Organizational security authorities (e.g., internal, external)
  • System security governance and compliance (e.g., laws, regulations, standards)
  • Design concepts (e.g., open, proprietary, modular)
1.3 Integrate with system development methodology
  • Security tasks and activities
  • Security requirements verification throughout the process
  • Assurance methods (e.g., software, hardware, virtual, cloud)
  • Models (e.g., System Development Life Cycle (SDLC), International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 24641:2023, Model based systems engineering)
1.4 Perform technical management 
  • Project management processes participation
  • Configuration management (CM) processes
  • Information management processes
  • Measurement processes
  • Quality assurance (QA) processes
  • Security process automation solution evaluations
1.5 Participate in the technology procurement management
  • Security requirements for acquisitions
  • Selection process
  • Supply chain risk management (SCRM)
  • Review security related contractual deliverables (e.g., hardware, software, services, documentation)
1.6 Resource Analysis (e.g., Cost estimation, personnel costs, probabilities and statistics (Monte Carlo))
  • Cost estimation
  • Personnel costs
  • Probabilities and statistics (Monte Carlo method, mean time between failures (MTBF), Maximum Tolerable Downtime (MTD), mean time to failure (MTTF), mean time to repair (MTTR), mean time to recovery (MTTR))
Risk Management 20% 2.1 Apply security risk management principles 
  • Security risk management alignment with enterprise risk management
  • Risk management integration throughout the lifecycle
2.2 Manage risk to system 
  • Establish risk context 
  • Identify system security risks (e.g., threats, events, vulnerabilities, impact) 
  • Perform inherent risk analysis 
  • Perform risk evaluation 
  • Monitoring and evaluate changes to risk posture (e.g., residual, changed, new) 
  • Documenting risk posture (e.g., findings, decisions)
2.3 Manage risk to operations
  • Establish risk context 
  • Identify system security risks (e.g., threats, events, vulnerabilities, impact) 
  • Perform inherent risk analysis 
  • Perform risk evaluation 
  • Monitoring and evaluate changes to risk posture (e.g., residual, changed, new) 
  • Documenting risk posture (e.g., findings, decisions)
Security Planning and Engineering 22% 3.1 Analyze organizational and operational environment
  • Capture stakeholder requirements
  • Identify roles and responsibilities
  • Identify relevant constraints and assumptions
  • Prepare security validation plan
3.2 Apply system security principles
  • Resiliency methods (e.g., redundancy, component diversity/disparity)
  • Layered security concepts (e.g., defense-in-depth, Zero Trust, secure-by-default)
  • Fail-safe defaults (e.g., fail open, fail secure, fail closed)
  • Single points of failure
  • Least privilege
  • Economy of mechanism
  • Separation of interfaces, functions, services, and roles
  • Automation (e.g., threat response, SecDevOps, emerging technologies)
  • Software assurance
  • Data security
3.3 Develop system requirements
  • Develop system security context
  • Identify functions within the system and security concept of operations
  • Document system security requirements baseline
  • Analyze system security requirements
3.4 Create system security design
  • Develop functional analysis and allocation
  • Develop system security design components
  • Maintain traceability between specified design and system requirements
  • Perform trade-off studies
  • Validate design
Systems Security Implementation, Verification, and Validation 20% 4.1 Implement and integrate security solutions 
  • Perform system security implementation and integration
  • Support on-going system security activities (e.g., Continuous Integration and Continuous Delivery (CI/CD), DevSecOps) 
4.2 Verify successful implementation
  • Develop security test plans
  • Support system security verification
  • Review and update risk analysis
  • Document stakeholder acceptance in system implementation
Secure Operations, Change Management and Disposal 14% 5.1 Develop secure operations plan
  • Identify roles, responsibilities, and requirements for system security personnel conducting operations
  • Specify requirements for security related event reporting
5.2 Support secure operations 
  • Design continuous monitoring functionality (e.g., personnel, processes, technology)
  • Support the incident response process
  • Develop secure maintenance procedures
5.3 Participate in change management
  • Participate in change reviews
  • Assess change impact
  • Perform verification and validation of changes
  • Update risk assessment documentation
5.4 Participate in the disposal process 
  • Identify disposal security requirements
  • Develop secure disposal plan
  • Develop decommissioning and disposal procedures
  • Audit results of the decommissioning and disposal process
  • Implement data retention policies
Official Information https://www.isc2.org/certifications/issep/issep-certification-exam-outline#Domain%205:%20Secure%20Operations,%20Change%20Management%20and%20Disposal