We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you the skills required to develop and maintain an information security program needed for the CISM - Certified Information Security Manager exam.

Read more

This course will teach you the skills required to develop and maintain an information security program needed for the CISM - Certified Information Security Manager exam.

In this course, Information Security Program for the CISM, you’ll learn to oversee the development and implementation of an information security program. First, you’ll explore Information security program development . Next, you’ll discover asset valuation. Finally, you’ll learn how to manage and measure the effectiveness of an information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security program management needed for the CISM - Certified Information Security Manager exam.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Information Security Program Development
Information Security Program Management
Information Security Program Communications
Read more
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills of information security program management, a skill essential to clearing the CISM certification
Taught by Kevin Henry
Examines information security program management, which is highly relevant to the CISM certification

Save this course

Save Information Security Program for CISM® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Information Security Program for CISM® with these activities:
Review CISSP Study Guide
Reinforces knowledge and concepts covered in the course, especially those related to CISM certification.
Browse courses on CISM
Show steps
  • Gather study materials
  • Review key concepts and terminology
  • Complete practice questions
Test Network Security Tools
Ensures that students have the technical skills necessary to apply concepts learned in the course to real-world scenarios.
Browse courses on Network Security Tools
Show steps
  • Gather and install network security tools
  • Conduct vulnerability assessments and penetration tests
  • Analyze results and identify security gaps
Use Pluralsight Courses on CISM
Provides additional learning resources and expert insights on the topic, supplementing the course content.
Browse courses on CISM
Show steps
  • Search for relevant Pluralsight courses
  • Watch videos and complete exercises
  • Participate in discussion forums
Five other activities
Expand to see all activities and additional details
Show all eight activities
Complete CISM Practice Exams
Provides hands-on experience in applying knowledge and concepts related to the CISM certification.
Show steps
  • Download and install practice exam software
  • Take a full-length practice exam
  • Review results and identify areas for improvement
  • Repeat steps 2-3 until satisfied with results
Attend CISM Industry Conferences
Provides opportunities to connect with professionals in the field, learn from industry experts, and stay updated on emerging trends.
Browse courses on Networking
Show steps
  • Identify relevant conferences
  • Register for attendance
  • Attend sessions and participate in discussions
Assist in Open Source Security Projects
Allows students to gain practical experience and contribute to the broader information security community.
Browse courses on Open Source Security
Show steps
  • Identify open source security projects
  • Join the project community
  • Contribute code, documentation, or other resources
Develop an Information Security Plan
Applies knowledge gained from the course to create a practical document that showcases understanding of information security management.
Show steps
  • Identify and assess risks
  • Establish security controls
  • Document and implement the plan
Mentor CISM Aspiring Candidates
Provides students with the opportunity to reinforce their knowledge and skills by sharing it with others, while also contributing to the community.
Browse courses on Mentoring
Show steps
  • Identify and connect with mentees
  • Provide guidance and support on CISM certification
  • Share resources and best practices

Career center

Learners who complete Information Security Program for CISM® will develop knowledge and skills that may be useful to these careers:
IT Auditor
An IT Auditor is responsible for assessing the effectiveness of an organization's information security program. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Information Security Analyst
An Information Security Analyst is responsible for identifying, assessing, and mitigating risks to an organization's information systems. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Risk Manager
A Risk Manager is responsible for identifying, assessing, and mitigating risks to an organization's information systems. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Security Analyst
A Security Analyst is responsible for monitoring and responding to security incidents. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their information security posture. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Incident Responder
An Incident Responder is responsible for responding to and mitigating security incidents. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Compliance Manager
A Compliance Manager is responsible for ensuring that an organization's information security program complies with all applicable laws and regulations. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Penetration Tester
A Penetration Tester is responsible for conducting security assessments to identify vulnerabilities in an organization's information systems. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Information Security Manager
An Information Security Manager is responsible for overseeing the development and implementation of an organization's information security program. This course can help you prepare for the CISM - Certified Information Security Manager exam, which is a globally recognized certification for information security professionals. The course will provide you with the knowledge and skills needed to manage an information security program, including how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Security Architect
A Security Architect is responsible for designing and implementing security measures to protect an organization's information systems. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing the development and implementation of an organization's information security program. This course can help you prepare for the CISM - Certified Information Security Manager exam, which is a globally recognized certification for information security professionals. The course will provide you with the knowledge and skills needed to manage an information security program, including how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Information Security Engineer
An Information Security Engineer is responsible for designing and implementing security measures to protect an organization's information systems. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Information Security Officer
An Information Security Officer is responsible for overseeing the development and implementation of an organization's information security program. This course can help you prepare for the CISM - Certified Information Security Manager exam, which is a globally recognized certification for information security professionals. The course will provide you with the knowledge and skills needed to manage an information security program, including how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Security Awareness Trainer
A Security Awareness Trainer is responsible for educating employees about information security risks and best practices. This course can help you develop the skills needed to perform these tasks by providing you with a comprehensive understanding of information security program development and management. You will learn how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.
Security Program Manager
A Security Program Manager is responsible for overseeing the development and implementation of an organization's information security program. This course can help you prepare for the CISM - Certified Information Security Manager exam, which is a globally recognized certification for information security professionals. The course will provide you with the knowledge and skills needed to manage an information security program, including how to develop and implement security policies, conduct risk assessments, and monitor and respond to security incidents.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Information Security Program for CISM®.
The CISM Review Manual is an essential resource for anyone preparing to take the CISM exam. It provides a comprehensive overview of all of the topics covered on the exam, and it is written by a team of experts in the field of information security. This manual must-have for anyone who is serious about passing the CISM exam.
The CISM Certified Information Security Manager All-in-One Exam Guide comprehensive study guide for the CISM exam. It covers all of the topics covered on the exam, and it includes practice questions and mock exams.
The Hands-On Information Security Lab Manual practical guide to information security. It provides step-by-step instructions for conducting a variety of information security tasks.
Network Security: Private Communication in a Public World classic textbook in the field of network security. It provides a comprehensive overview of the field, covering all of the essential topics.
Cryptography and Network Security: Principles and Practice widely respected textbook in the field of cryptography and network security. It provides a comprehensive overview of the field, covering all of the essential topics.
The Art of Deception: Controlling the Human Element of Security fascinating book that provides insights into the human element of security. Mitnick, a former hacker, shares his experiences and provides valuable advice on how to protect yourself from social engineering attacks.
Security in Computing comprehensive textbook that provides a thorough overview of the field of computer security. It covers all of the essential topics in depth, making it a valuable resource for students and professionals alike.
Applied Cryptography: Protocols, Algorithms, and Source Code in C classic textbook that provides a comprehensive overview of the field of cryptography. It covers all of the essential topics in depth, making it a valuable resource for students and professionals alike.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Information Security Program for CISM®.
Information Security Governance for CISM®
Most relevant
Incident Management for CISM®
Most relevant
Information Security Risk Management for CISM®
Most relevant
Exam Review Tips and Tricks for CISM®
Most relevant
Security and Risk Management: Principles of Risk for...
Most relevant
Security Operations: Operations Management for CISSP®
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
IT Audit: Cybersecurity Audit Project
Most relevant
Identity and Access Management (IAM) for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser