Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Information Security Management Fundamentals

via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
In this course, you’ll develop a foundational understanding of the role of an Information Security Manager. You will explore critical topics such as governance, compliance, and risk management, essential areas for securing organizational information. As the demand for cybersecurity professionals grows, this course provides the knowledge you need to stay ahead in the field. Through this course, you’ll gain the skills to assess and manage risks, implement governance frameworks, and ensure compliance with security standards. By mastering these areas, you’ll be equipped to handle the key challenges of a security management career. What makes this course unique is its ability to integrate theoretical concepts with practical, hands-on applications. Case studies and scenarios will guide you through realistic problems that Information Security Managers face, providing a direct path to mastering the role. This course is ideal for professionals looking to start or advance their career in information security management. Basic understanding of cybersecurity concepts is recommended but not required. This course is part one of a three-course Specialization designed to provide a comprehensive learning pathway in this subject area. While it delivers standalone value and practical skills, learners seeking a more integrated and in-depth progression may benefit from completing the full Specialization. From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.

Syllabus

  • Today's Information Security Manager
    • In this section, we explore aligning information security strategy with organizational goals, analyzing internal and external influences, and defining roles for effective risk management.
  • Information Security Governance and Compliance
    • In this section, we explore implementing information security governance frameworks, analyzing compliance requirements, and developing business cases to align security practices with organizational strategy and regulatory demands.
  • Information Risk Management
    • In this section, we explore information risk management frameworks, risk treatment options, and reporting strategies to align with organizational goals and regulatory requirements.

Taught by

Wiley-Expert Edge Course Instructors

Reviews

Start your review of Information Security Management Fundamentals

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.