WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/58243223

Complete Guide to CISM Certification

The Certified Information Security Manager (CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The "Complete Guide to CISM Certification" examines five functional areas - security governance, risk management, information security program management, information security management, and response management. Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented.; Also included is a workbook to a thirty-question final exam. "Complete Guide to CISM Certification" describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Open All Close All

http://schema.org/description

  • "The Certified Information Security Manager (CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The "Complete Guide to CISM Certification" examines five functional areas - security governance, risk management, information security program management, information security management, and response management. Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented.; Also included is a workbook to a thirty-question final exam. "Complete Guide to CISM Certification" describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators."
  • "The Certified Information Security Manager (CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The "Complete Guide to CISM Certification" examines five functional areas - security governance, risk management, information security program management, information security management, and response management. Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented.; Also included is a workbook to a thirty-question final exam. "Complete Guide to CISM Certification" describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators."@en
  • "Complete Guide to CISM® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal f."@en

http://schema.org/genre

  • "Study guides"@en
  • "Electronic books"@en
  • "Study guides"
  • "Electronic resource"

http://schema.org/name

  • "Complete Guide to CISM Certification"@en
  • "Complete guide to CISM certification"@en
  • "Complete guide to CISM certification"
  • "Complete Guide to CISM Certification"