Certified Information Security Manager CISM Study Guide

  • 19h 21m 6s
  • Mike Chapple
  • Gildan Media
  • 2022

Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide

In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job.

Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further.

Sharpen your skills with exam essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management.

Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.

About the Author

Mike Chapple, PhD, CISM, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com

In this Audiobook

  • Introduction
  • Chapter 1 - Today’s Information Security Manager
  • Chapter 2 - Information Security Governance and Compliance
  • Chapter 3 - Information Risk Management
  • Chapter 4 - Cybersecurity Threats
  • Chapter 5 - Information Security Program Development Management
  • Chapter 6 - Security Assessment and Testing
  • Chapter 7 - Cybersecurity Technology
  • Chapter 8 - Incident Response
  • Chapter 9 - Business Continuity and Disaster Recovery

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE