We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you knowledge and application of information security governance, concepts, and principles needed for the Certified Information Security Manager (CISM) exam.

Read more

This course will teach you knowledge and application of information security governance, concepts, and principles needed for the Certified Information Security Manager (CISM) exam.

It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Enterprise Governance
Information Security Strategy
Course Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Strengthens an existing foundation for intermediate learners who want to develop their knowledge of Information Security Governance principles needed for CISM certification
Taught by recognized experts named Kevin Henry
Fosters understanding of Information Security Governance, a vital area in the industry
Provides guidance on developing and implementing an enterprise-wide governance program, which is essential for organizations
Helps identify and comply with legal and regulatory requirements, ensuring adherence to important cybersecurity standards

Save this course

Save Information Security Governance for CISM® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Information Security Governance for CISM® with these activities:
Review CISM Concepts
Refresh your knowledge of key CISM concepts before starting the course to ensure you have a strong foundation.
Show steps
  • Review the official CISM Body of Knowledge (CBK)
  • Go through your notes or study materials from previous courses or certifications related to information security
  • Take practice questions or quizzes to test your understanding
Volunteer for an Information Security Organization
To gain practical experience and connect with professionals in the field, volunteer for an information security organization.
Browse courses on Volunteering
Show steps
  • Identify information security organizations that align with your interests
  • Reach out to the organizations and inquire about volunteer opportunities
  • Participate in activities such as organizing events, supporting educational programs, or conducting research
  • Network with other professionals in the field
Engage in Peer Discussions
Engage with your peers to exchange knowledge, discuss concepts, and reinforce your understanding of information security governance.
Browse courses on Collaboration
Show steps
  • Join or create a study group with other students taking the course
  • Regularly meet with your group to discuss the course material, work on assignments together, and share insights
  • Actively participate in discussions, ask questions, and provide your own perspectives
  • Review and summarize the key points of each discussion session
Five other activities
Expand to see all activities and additional details
Show all eight activities
Explore Governance Implementation
To deepen your understanding of governance implementation, seek out and follow tutorials that provide practical guidance.
Show steps
  • Identify reputable online courses or platforms that offer tutorials on information security governance implementation
  • Choose a tutorial that aligns with your learning style and goals
  • Follow the tutorial steps, take notes, and complete any exercises or assignments
Practice Identifying and Analyzing Laws and Regulations
To enhance your ability to navigate the legal and regulatory landscape, perform repetitive exercises that focus on identifying and analyzing laws and regulations relevant to information security.
Show steps
  • Collect a set of relevant laws and regulations
  • Review the materials and identify key provisions related to information security
  • Analyze the implications of these provisions for organizations
  • Complete practice exercises or mock assessments to test your understanding
Create an Information Security Governance Guide
To synthesize and reinforce your knowledge, create a comprehensive guide that outlines the principles and best practices of information security governance.
Browse courses on Security Best Practices
Show steps
  • Gather and organize information from the course materials, textbooks, and other reputable sources
  • Develop a clear and concise structure for the guide
  • Write detailed sections covering each key aspect of information security governance
  • Review and edit your guide for accuracy and clarity
  • Share your guide with others for feedback and potential use
Develop an Enterprise-Wide Governance Program
To solidify your learning and demonstrate your understanding, create an enterprise-wide governance program based on the principles covered in the course.
Show steps
  • Gather relevant information about the organization, its industry, and regulatory landscape
  • Identify and analyze the organization's current governance practices
  • Develop a governance framework that aligns with the organization's needs and objectives
  • Create a detailed implementation plan for the governance program
  • Present your governance program to stakeholders for feedback and approval
Participate in CISM Exam Simulation
To gauge your understanding and identify areas for improvement, participate in a CISM exam simulation that provides a realistic testing experience.
Browse courses on Exam Preparation
Show steps
  • Find a reputable online or in-person CISM exam simulation
  • Take the simulation under timed conditions
  • Review your results and identify areas where you need additional study
  • Revise your study plan accordingly

Career center

Learners who complete Information Security Governance for CISM® will develop knowledge and skills that may be useful to these careers:
Information Security Manager
An Information Security Manager is a mid-level manager who has overall responsibility for the security of an organization's information systems. They must be able to design, implement, and maintain information security policies and procedures, as well as manage and respond to security incidents. This course can help prepare you for this role by providing you with the knowledge and skills you need to develop and implement an effective information security program.
Information Security Analyst
An Information Security Analyst is a security professional who is responsible for identifying, assessing, and mitigating security risks to an organization's information systems. They must be able to understand and interpret security policies and procedures, as well as conduct security audits and assessments. This course can help prepare you for this role by providing you with the knowledge and skills you need to identify and mitigate security risks.
Security Architect
A Security Architect is a senior-level security professional who is responsible for designing and implementing an organization's security architecture. They must be able to understand and interpret security policies and procedures, as well as design and implement security solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to design and implement an effective security architecture.
Security Consultant
A Security Consultant is a security professional who provides advice and guidance to organizations on how to improve their security posture. They must be able to understand and interpret security policies and procedures, as well as conduct security audits and assessments. This course can help prepare you for this role by providing you with the knowledge and skills you need to advise organizations on how to improve their security posture.
Security Engineer
A Security Engineer is a security professional who is responsible for designing, implementing, and maintaining an organization's security infrastructure. They must be able to understand and interpret security policies and procedures, as well as design and implement security solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to design and implement an effective security infrastructure.
Compliance Manager
A Compliance Manager is a security professional who is responsible for ensuring that an organization complies with all applicable laws and regulations. They must be able to understand and interpret legal and regulatory requirements, as well as develop and implement compliance programs. This course can help prepare you for this role by providing you with the knowledge and skills you need to develop and implement an effective compliance program.
Risk Manager
A Risk Manager is a security professional who is responsible for identifying, assessing, and mitigating risks to an organization's information systems. They must be able to understand and interpret risk management frameworks, as well as conduct risk assessments and develop risk mitigation plans. This course can help prepare you for this role by providing you with the knowledge and skills you need to identify and mitigate risks to an organization's information systems.
Auditor
An Auditor is a security professional who is responsible for conducting audits of an organization's information systems. They must be able to understand and interpret audit standards and procedures, as well as conduct audits and write audit reports. This course can help prepare you for this role by providing you with the knowledge and skills you need to conduct effective audits of an organization's information systems.
Business Analyst
A Business Analyst is a business professional who is responsible for analyzing business processes and identifying areas for improvement. They must be able to understand and interpret business requirements, as well as develop and implement business solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to analyze business processes and identify areas for improvement.
Project Manager
A Project Manager is a professional who is responsible for planning, executing, and closing projects. They must be able to understand and interpret project requirements, as well as develop and implement project plans. This course can help prepare you for this role by providing you with the knowledge and skills you need to plan, execute, and close projects.
Systems Analyst
A Systems Analyst is a professional who is responsible for analyzing and designing computer systems. They must be able to understand and interpret system requirements, as well as design and implement system solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to analyze and design computer systems.
Database Administrator
A Database Administrator is a professional who is responsible for managing and maintaining databases. They must be able to understand and interpret database requirements, as well as design and implement database solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to manage and maintain databases.
Network Administrator
A Network Administrator is a professional who is responsible for managing and maintaining networks. They must be able to understand and interpret network requirements, as well as design and implement network solutions. This course can help prepare you for this role by providing you with the knowledge and skills you need to manage and maintain networks.
Security Officer
A Security Officer is a security professional who is responsible for overseeing the security of an organization's information systems. They must be able to understand and interpret security policies and procedures, as well as develop and implement security programs. This course can help prepare you for this role by providing you with the knowledge and skills you need to oversee the security of an organization's information systems.
Incident Responder
An Incident Responder is a security professional who is responsible for responding to security incidents. They must be able to understand and interpret incident response procedures, as well as investigate and remediate security incidents. This course can help prepare you for this role by providing you with the knowledge and skills you need to respond to security incidents.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Information Security Governance for CISM®.
Published by ISACA, this industry-leading text provides essential information for those preparing for the CISM exam. This can serve as a supplemental guide to this course.
While this book is primarily intended for CISSP certification preparation, it also covers relevant topics for the CISM exam, including information security governance. It would provide additional depth and breadth to the course's materials.
Valuable reference for professionals responsible for designing and implementing enterprise security architecture and managing security in the cloud.
This foundational work by renowned security expert Bruce Schneier offers a comprehensive overview of security risk management, providing a solid understanding of the principles and practices involved. It would be an excellent reference for those seeking a deeper understanding of this topic.
Provides guidance on implementing and using ISO 31000, the international standard for risk management, offering a structured approach to risk identification, assessment, and mitigation.
Presents a practical and accessible approach to information security management, focusing on real-world challenges and solutions. It is written in a non-technical style, making it suitable for both technical and non-technical readers.
Is designed to provide boards and executives with a concise and practical guide to information security governance. It offers clear explanations of key concepts and best practices, making it a valuable resource for those responsible for overseeing information security.
Provides a practical and accessible approach to security governance, offering practical advice and case studies for implementing effective security programs. It is written in a clear and concise style, making it suitable for a wide range of readers.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Information Security Governance for CISM®.
Information Security Program for CISM®
Most relevant
Incident Management for CISM®
Most relevant
Information Security Risk Management for CISM®
Most relevant
Exam Review Tips and Tricks for CISM®
Most relevant
Scope of the Information System for CGRC
Most relevant
Security Principles for CC℠
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser