Management of Information Security 6th edition by Michael Whitman, Herbert Mattord – Ebook PDF Instant Download/Delivery. 133740571X 978-1337405713
Full download Management of Information Security 6th edition after payment

Product details:
ISBN 10: 133740571X
ISBN 13: 978-1337405713
Author: Michael Whitman, Herbert Mattord
MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You’ll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
Management of Information Security 6th Table of contents:
-
Introduction to Information Security
- Importance of information security in organizations
- Key concepts in information security management
- The role of information security professionals
-
Information Security Governance and Management
- Governance frameworks (e.g., COBIT, ISO 27001)
- Organizational structure for information security
- Leadership and the role of the CISO (Chief Information Security Officer)
-
Risk Management and Risk Assessment
- Understanding risk and risk management
- Risk assessment processes and methodologies
- Identifying and evaluating risks to information systems
- Mitigating and managing risks
-
Security Policy and Legal/Regulatory Compliance
- Developing and implementing security policies
- Legal and regulatory compliance issues (e.g., GDPR, HIPAA)
- Privacy laws and their impact on information security
- Audits and compliance assessments
-
Access Control Systems and Methodology
- Principles of access control
- Authentication and authorization techniques
- Role-based access control (RBAC) and multi-factor authentication (MFA)
- Identity management systems
-
Cryptography and Data Security
- Principles of cryptography
- Encryption and decryption methods
- Key management and digital signatures
- Data security techniques and technologies
-
Network Security and Defense
- Securing networks and communications
- Firewalls, intrusion detection/prevention systems (IDS/IPS)
- Virtual private networks (VPNs) and secure communication protocols
- Wireless network security
-
Security Operations and Incident Response
- Incident response and handling security breaches
- Security monitoring and logging
- Digital forensics and evidence collection
- Disaster recovery and business continuity planning
-
Security Awareness and Training
- Importance of security awareness in organizations
- Developing and implementing training programs
- Social engineering attacks and how to defend against them
- Building a security-conscious culture
-
Business Continuity and Disaster Recovery Planning
- Developing business continuity plans (BCPs)
- Disaster recovery planning and strategies
- Testing and maintaining continuity and recovery plans
-
Managing Security in the Cloud
- Cloud computing security concerns
- Risks associated with cloud storage and services
- Securing cloud-based applications and data
- Cloud security models and solutions
-
Emerging Threats and Technologies in Information Security
- New and evolving cyber threats
- Security challenges with emerging technologies (e.g., IoT, AI)
- Strategies for addressing advanced persistent threats (APTs)
- Future trends in information security
-
Security Metrics and Performance Evaluation
- Measuring and evaluating security effectiveness
- Key performance indicators (KPIs) for information security
- Security audits and assessments
-
Securing the Enterprise IT Infrastructure
- Protecting critical IT infrastructure
- Securing endpoints, mobile devices, and remote work environments
- Security in software development and systems integration
-
Conclusion and Future Outlook
- Summary of key information security concepts
- The future of information security management
- Preparing for the next generation of security challenges
People also search for Management of Information Security 6th:
the management of information security incidents usually requires
introduction to the management of information security
risk management of information security
management of information security 6th edition pdf
management of information security 6th edition pdf free download