Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material

Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material

by Hemang Doshi
Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material

Certified Information Security Manager Exam Prep Guide - Second Edition: Gain the confidence to pass the CISM exam using test-oriented study material

by Hemang Doshi

Paperback(2nd ed.)

$62.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Master information security fundamentals with comprehensive explanations of concepts. Purchase of the book unlocks access to web-based tools like practice questions, flashcards, and more to take your CISM prep to the next level. Purchase of the print or Kindle book includes a free eBook in PDF format.

Key Features

  • Use this comprehensive resource to prepare for ISACA’s CISM certification
  • Unlock free online tools including interactive practice questions, exam tips, and flashcards to effectively prepare for the CISM exam
  • Understand the theory behind information security program development and management

Book Description

CISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual. With this book, you’ll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author. This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification. By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.

What you will learn

  • Understand core exam objectives to prepare for the CISM exam with confidence
  • Get to grips with detailed procedural guidelines for effective information security incident management
  • Execute information security governance in an efficient manner
  • Strengthen your preparation for the CISM exam using interactive flashcards and practice questions
  • Conceptualize complex topics through diagrams and examples
  • Find out how to integrate governance, risk management, and compliance functions

Who this book is for

If you’re an IT professional, IT security officer, or risk management executive looking to upgrade your career by passing the CISM exam, this book is for you. Basic familiarity with information security concepts is required to make the most of this book.


Product Details

ISBN-13: 9781804610633
Publisher: Packt Publishing
Publication date: 12/16/2022
Edition description: 2nd ed.
Pages: 718
Product dimensions: 7.50(w) x 9.25(h) x 1.44(d)

About the Author

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.

Table of Contents

Table of Contents

  1. Enterprise Governance
  2. Information Security Strategy
  3. Information Risk Assessment
  4. Information Risk Response
  5. Information Security Program Development
  6. Information Security Program Management
  7. Information Security Infrastructure and Architecture
  8. Information Security Monitoring Tools and Techniques
  9. Incident Management Readiness
  10. Incident Management Operations
From the B&N Reads Blog

Customer Reviews