Udemy

ISSAP Information Systems Security Architecture Prof QA Test

Enroll Now
  • 126 Students
  • Updated 1/2026
2.2
(04 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
0 Hour(s) 0 Minute(s)
Language
English
Taught by
Technology Exam Point
Rating
2.2
(04 Ratings)

Course Overview

ISSAP Information Systems Security Architecture Prof QA Test

Pass your ISC2 ISSAP Information Systems Security Architecture Professional Certification Exam

ISSAP Information Systems Security Architecture Professional Exam Practice Test

The Information Systems Security Architecture Professional (ISSAP) is a CISSP who specializes in designing security solutions and providing management with risk-based guidance to meet organizational goals. ISSAPs facilitate the alignment of security solutions within the organizational context (e.g., vision, mission, strategy, policies, requirements, change, and external factors).

The CISSP-ISSAP is an appropriate credential if the candidate is a chief security architect or analyst. Typically, the candidate works as an independent consultant or in a similar capacity. As the architect, candidates play a key role in the information security department.

ISSAP Exam Domain :-

Domain 1. Governance, Risk, and Compliance (GRC)

  • Identify legal, regulatory, organizational, and industry requirements

  • Architecting for governance, risk, and compliance (GRC)

Domain 2. Security Architecture Modeling

2.1 Identify security architecture approach

  • Scope (e.g., enterprise, cloud) and types (e.g., network, service-oriented architecture (SOA))

  • Frameworks (e.g., The Open Group Architecture Framework (TOGAF), Sherwood Applied Business Security Architecture (SABSA), service-oriented modeling framework)

  • Reference architectures and blueprints

  • Threat modeling frameworks (e.g., Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE), Common Vulnerability Scoring System (CVSS), threat intelligence)

2.2 Verify and validate design (e.g., functional acceptance testing, regression)

  • Results of threat modeling (e.g., threat vectors, impact, probability)

  • Gaps

  • Alternative solutions/mitigations/compensating controls

  • Internal or external third-party (e.g., tabletop exercises, modeling and simulation, manual review of functions, peer review)

  • Code review methodology (e.g., dynamic, manual, static, source composition analysis)

Domain 3.Infrastructure and System Security

3.1 Identify infrastructure and system security requirements

  • Deployment model (e.g., On-premises, cloud-based, hybrid)

  • Information technology (IT) and operational technology

  • Physical security (e.g., perimeter protection and internal zoning, fire suppression)

  • Infrastructure and system monitoring

  • Infrastructure and system cryptography

  • Application security (e.g., Requirements Traceability Matrix, security architecture documentation, secure coding)

3.2 Architect infrastructure and system security

  • Physical security control set (e.g., cameras, doors, system controllers)

  • Platform security (e.g., physical, virtual, container, firmware, operating system (OS))

  • Network security (e.g., wired/wireless, public/private, Internet of Things (IoT), management, firewalls, airgaps, software defined perimeters, virtual private network (VPN), Internet Protocol Security (IPsec), Network Access Control (NAC), Domain Name System (DNS), Network Time Protocol (NTP), Voice over Internet Protocol (VoIP), Web Application Firewall (WAF))

  • Storage security (e.g., direct attached, storage area network (SAN), network-attached storage (NAS), archival and removable media, encryption)

  • Data repository security (e.g., access control, encryption, redaction, masking)

  • Cloud security (e.g., public/private, Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS))

  • Operational technology (e.g., industrial control system (ICS), Internet of Things (IoT), supervisory control and data acquisition (SCADA))

  • Endpoint security (e.g., bring your own device (BYOD), mobile, endpoint detection and response (EDR), host-based intrusion detection system (HIDS)/host-based intrusion prevention system (HIPS))

  • Secure shared services (e.g., e-mail, Voice over Internet Protocol (VoIP), unified communications)

  • Third-party integrations (e.g., internal/external, federation, application programming interface (API), virtual private network (VPN), Secure File Transfer Protocol (SFTP))

  • Infrastructure monitoring

  • Content monitoring (e.g., email, web, data, social media, data loss prevention (DLP))

  • Out-of-band communications (e.g., incident response, information technology (IT) system management, Business Continuity (BC)/disaster recovery (DR))

  • Evaluate applicability of security controls for system components (e.g., web client applications, proxy services, application services)

3.3 Architect infrastructure and system cryptographic solutions

  • Determine cryptographic design considerations and constraints (e.g., technologies, lifecycle, computational capabilities, algorithms, attack in system)

  • Determine cryptographic implementation (e.g., in-transit, in-use, at-rest)

  • Plan key management lifecycle (e.g., generation, storage, distribution)

Domain 4. Identity and Access Management (IAM) Architecture

4.1 Architect identity lifecycle

  • Establish identity and verify (e.g., physical, logical)

  • Assign identifiers (e.g., to users, services, processes, devices, components)

  • Identity provisioning and de-provisioning (e.g., joiners, movers, and leavers process)

  • Identity management technologies

4.2 Architect identity authentication

  • Define authentication approach (e.g., single-factor, multi-factor, risk-based elevation)

  • Authentication protocols and technologies (e.g., Security Assertion Markup Language (SAML), Remote Authentication Dial-In User Service (RADIUS), Kerberos, Open Authorization (OAuth))

  • Authentication control protocols and technologies (e.g., eXtensible Access Control Markup Language (XACML), Lightweight Directory Access Protocol (LDAP))

  • Define trust relationships (e.g., federated, stand-alone)

4.3 Architect identity authorization

  • Authorization concepts and principles (e.g., discretionary/mandatory, Separation of Duties (SoD), least privilege, interactive, non-interactive)

  • Authorization models (e.g., physical, logical, administrative)

  • Authorization process and workflow (e.g., governance, issuance, periodic review, revocation, suspension)

  • Roles, rights, and responsibilities related to system, application, and data access control (e.g., groups, Digital Rights Management (DRM), trust relationships)

  • Management of privileged accounts (e.g., Privileged Access Management (PAM))

  • Authorization approach (e.g., single sign-on (SSO), rule-based, role-based, attribute-based, token, certificate)

4.4 Architect identity accounting

  • Determine accounting, analysis, and forensic requirements

  • Define audit events

  • Establish audit log alerts and notifications

  • Log management (e.g., log data retention, log data integrity)

  • Log analysis and reporting

  • Comply with policies and regulations (e.g., PCI-DSS, FISMA, HIPAA, GDPR)

Course Content

  • 1 section(s)
  • Section 1 Practice Tests

What You’ll Learn

  • Prepare for ISC2 ISSAP – Information Systems Security Architecture Professional certification, Test your skill while attend this exam, Get skill in Information Systems Security, Practice test for ISSAP – Information Systems Security Architecture Professional certification exam


Reviews

  • C
    Chandram Kotta
    1.0

    crappy questions and bad answers to some questions

  • M
    Mohabbat
    5.0

    It's very good practice test

  • M
    Mehmet Kaya
    1.0

    Questions were very old... You can find them everywhere.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed