Certified Information Security Manager CISM Study Guide
- 19h 21m 6s
- Mike Chapple
- Gildan Media
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide
In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job.
Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.
Sharpen your skills with exam essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management.
Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.
About the Author
Mike Chapple, PhD, CISM, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com
In this Audiobook
Chapter 1 - Today’s Information Security Manager
Chapter 2 - Information Security Governance and Compliance
Chapter 3 - Information Risk Management
Chapter 4 - Cybersecurity Threats
Chapter 5 - Information Security Program Development Management
Chapter 6 - Security Assessment and Testing
Chapter 7 - Cybersecurity Technology
Chapter 8 - Incident Response
Chapter 9 - Business Continuity and Disaster Recovery