Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This specialization covers key concepts from information security management to ensure you are well-equipped to handle modern cybersecurity challenges.
In the first course, Information Security Management Fundamentals, you'll learn about the role of an Information Security Manager and gain insights into security governance and risk management practices.
Progressing to the second course, Cybersecurity Threats and Security Program Development, you will develop the ability to assess cybersecurity threats and design robust security programs.
The final course, Cybersecurity Technology and Response Strategies, will empower you with skills to effectively manage security technologies, incidents, and disaster recovery planning. Each course builds on the previous to provide a structured path towards mastering the full scope of information security management, with practical insights at every step.
From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.
Syllabus
- Course 1: Information Security Management Fundamentals
- Course 2: Cybersecurity Threats and Security Program Development
- Course 3: Cybersecurity Technology and Response Strategies
Courses
-
This course provides a comprehensive understanding of cybersecurity technologies and response strategies. It covers the fundamental tools and techniques used in securing systems and responding to incidents in real-time. By exploring various cybersecurity technologies and incident response frameworks, this course will help learners enhance their ability to assess security threats and implement effective response strategies. You'll learn to protect critical systems and ensure business continuity during disruptive events. What sets this course apart is its focus on combining theoretical knowledge with hands-on, real-world applications. You'll gain insight into how to implement disaster recovery plans and optimize security operations within your organization. This course is ideal for IT professionals, cybersecurity specialists, and business continuity planners who want to strengthen their skills in managing security incidents and ensuring operational resilience. No prior advanced knowledge is required, but familiarity with basic IT concepts is beneficial. This course is part three of a three-course Specialization designed to provide a comprehensive learning pathway in this subject area. While it delivers standalone value and practical skills, learners seeking a more integrated and in-depth progression may benefit from completing the full Specialization. From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.
-
Cybersecurity threats are constantly evolving, making it essential for organizations to build strong and resilient security programs. This course explores the modern threat landscape and the strategies required to develop, manage, and test effective information security programs in today’s digital environment. Throughout this course, you will learn how to identify cybersecurity threats, design structured information security programs, and implement security assessment and testing practices. By understanding these concepts, you will gain practical insights into protecting systems, managing risks, and strengthening organizational security posture. What sets this course apart is its balance between foundational cybersecurity concepts and real-world security program implementation. The course connects threat awareness with practical management and testing techniques used in modern security operations. This course is ideal for IT professionals, cybersecurity practitioners, security analysts, and individuals looking to strengthen their knowledge of security program development. A basic understanding of IT systems and security concepts is helpful but not strictly required. This course is part two of a three-course Specialization designed to provide a comprehensive learning pathway in this subject area. While it delivers standalone value and practical skills, learners seeking a more integrated and in-depth progression may benefit from completing the full Specialization. From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.
-
In this course, you’ll develop a foundational understanding of the role of an Information Security Manager. You will explore critical topics such as governance, compliance, and risk management, essential areas for securing organizational information. As the demand for cybersecurity professionals grows, this course provides the knowledge you need to stay ahead in the field. Through this course, you’ll gain the skills to assess and manage risks, implement governance frameworks, and ensure compliance with security standards. By mastering these areas, you’ll be equipped to handle the key challenges of a security management career. What makes this course unique is its ability to integrate theoretical concepts with practical, hands-on applications. Case studies and scenarios will guide you through realistic problems that Information Security Managers face, providing a direct path to mastering the role. This course is ideal for professionals looking to start or advance their career in information security management. Basic understanding of cybersecurity concepts is recommended but not required. This course is part one of a three-course Specialization designed to provide a comprehensive learning pathway in this subject area. While it delivers standalone value and practical skills, learners seeking a more integrated and in-depth progression may benefit from completing the full Specialization. From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.
Taught by
Wiley-Expert Edge Course Instructors