CISM Certified Information Security Manager Practice Exams 2nd Edition by Peter H. Gregory – Ebook PDF Instant Download/DeliveryISBN: 1264268327, 9781264268320
Full download CISM Certified Information Security Manager Practice Exams 2nd Edition after payment.
Product details:
ISBN-10 : 1264268327
ISBN-13 : 9781264268320
Author: Peter H. Gregory
Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management. CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference. Features complete coverage of all 2022 CISM exam domains Online content includes 300 practice questions in the customizable TotalTester™ exam engine Written by a cybersecurity expert, author, and lecturer
CISM Certified Information Security Manager Practice Exams 2nd Table of contents:
Part I Information Security Governance
Chapter 1 Enterprise Governance
Introduction to Information Security Governance
Reason for Security Governance
Security Governance Activities and Results
Business Alignment
Organizational Culture
Acceptable Use Policy
Ethics
Legal, Regulatory, and Contractual Requirements
Organizational Structure, Roles, and Responsibilities
Organizational Roles
Board of Directors
Executive Management
Security Steering Committee
Business Process and Business Asset Owners
Custodial Responsibilities
Chief Information Security Officer
Chief Privacy Officer
Chief Compliance Officer
Software Development
Data Management
Network Management
Systems Management
IT Operations
Governance, Risk, and Compliance
Business Resilience
Security Operations
Security Audit
Service Desk
Quality Assurance
Other Roles
General Staff
Monitoring Responsibilities
Chapter Review
Notes
Questions
Answers
Chapter 2 Information Security Strategy
Information Security Strategy Development
Strategy Objectives
Strategy Participants
Strategy Resources
Strategy Development
Strategy Constraints
Information Governance Frameworks and Standards
Business Model for Information Security
The Zachman Framework
The Open Group Architecture Framework
ISO/IEC 27001
NIST Cybersecurity Framework
NIST Risk Management Framework
Strategic Planning
Roadmap Development
Developing a Business Case
Chapter Review
Notes
Questions
Answers
Part II Information Security Risk Management
Chapter 3 Information Security Risk Assessment
Emerging Risk and Threat Landscape
The Importance of Risk Management
Outcomes of Risk Management
Risk Objectives
Risk Management Technologies
Implementing a Risk Management Program
The Risk Management Life Cycle
Vulnerability and Control Deficiency Analysis
Risk Assessment and Analysis
Threat Identification
Risk Identification
Risk Likelihood and Impact
Risk Analysis Techniques and Considerations
Risk Management and Business Continuity Planning
The Risk Register
Integration of Risk Management into Other Processes
Chapter Review
Notes
Questions
Answers
Chapter 4 Information Security Risk Response
Risk Treatment / Risk Response Options
Risk Mitigation
Risk Transfer
Risk Avoidance
Risk Acceptance
Evaluating Risk Response Options
Costs and Benefits
Residual Risk
Iterative Risk Treatment
Risk Appetite, Capacity, and Tolerance
Legal and Regulatory Considerations
The Risk Register
Risk and Control Ownership
Risk Ownership
Control Ownership
Risk Monitoring and Reporting
Key Risk Indicators
Training and Awareness
Risk Documentation
Chapter Review
Notes
Questions
Answers
Part III Information Security Risk Management
Chapter 5 Information Security Program Development
Information Security Program Resources
Trends
Outcomes
Charter
Scope
Information Security Processes
Information Security Technologies
Information Asset Identification and Classification
Asset Identification and Valuation
Asset Classification
Asset Valuation
Industry Standards and Frameworks for Information Security
Control Frameworks
Information Security Management Frameworks
Information Security Architecture
Information Security Policies, Procedures, and Guidelines
Policy Development
Standards
Guidelines
Requirements
Processes and Procedures
Information Security Program Metrics
Types of Metrics
Audiences
The Security Balanced Scorecard
Chapter Review
Notes
Questions
Answers
Chapter 6 Information Security Program Management
Information Security Control Design and Selection
Control Classification
Control Objectives
General Computing Controls
Controls: Build Versus Buy
Control Frameworks
Information Security Control Implementation and Integrations
Controls Development
Control Implementation
Security and Control Operations
Information Security Control Testing and Evaluation
Control Monitoring
Control Reviews and Audits
Information Security Awareness and Training
Security Awareness Training Objectives
Creating or Selecting Content for Security Awareness Training
Security Awareness Training Audiences
Awareness Training Communications
Management of External Services
Benefits of Outsourcing
Risks of Outsourcing
Identifying Third Parties
Cloud Service Providers
TPRM Life Cycle
Risk Tiering and Vendor Classification
Assessing Third Parties
Proactive Issue Remediation
Responsive Issue Remediation
Security Incidents
Information Security Program Communications and Reporting
Security Operations
Risk Management
Internal Partnerships
External Partnerships
Compliance Management
Security Awareness Training
Technical Architecture
Personnel Management
Project and Program Management
Budget
IT Service Management
Service Desk
Incident Management
Problem Management
Change Management
Configuration Management
Release Management
Service-Level Management
Financial Management
Capacity Management
Service Continuity Management
Availability Management
Asset Management
Continuous Improvement
Chapter Review
Notes
Questions
Answers
Part IV Incident Management
Chapter 7 Incident Management Readiness
Incident Response Plan
Security Incident Response Overview
Incident Response Plan Development
Business Impact Analysis
Inventory of Key Processes and Systems
Statements of Impact
Criticality Analysis
Determine Maximum Tolerable Downtime
Determine Maximum Tolerable Outage
Establish Key Recovery Targets
Business Continuity Plan (BCP)
Business Continuity Planning
Disaster Recovery Plan (DRP)
Disaster Response Teams’ Roles and Responsibilities
Recovery Objectives
Incident Classification/Categorization
Incident Management Training, Testing, and Evaluation
Security Incident Response Training
Business Continuity and Disaster Response Training
Testing Security Incident Response Plans
Testing Business Continuity and Disaster Recovery Plans
Evaluating Business Continuity Planning
Evaluating Disaster Recovery Planning
Evaluating Security Incident Response
Chapter Review
Notes
Questions
Answers
Chapter 8 Incident Management Operations
Incident Management Tools and Techniques
Incident Response Roles and Responsibilities
Incident Response Tools and Techniques
Incident Investigation and Evaluation
Incident Detection
Incident Initiation
Incident Analysis
Incident Containment Methods
Incident Response Communications
Crisis Management and Communications
Communications in the Incident Response Plan
Incident Response Metrics and Reporting
Incident Eradication, and Recovery
Incident Eradication
Incident Recovery
Incident Remediation
Post-incident Review Practices
Closure
Post-incident Review
Chapter Review
Notes
Questions
Answers
Part V Appendix and Glossary
Appendix About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Technical Support
People also search for CISM Certified Information Security Manager Practice Exams 2nd:
how long does it take to prepare for cism exam
certified information security manager (cism) exam cost
can i take cism exam online
what is cism certification
how many cism certified in the world
Tags:
CISM,Certified Information,Security Manager,Practice Exams,Peter Gregory