We may earn an affiliate commission when you visit our partners.
Course image
Pluralsight logo

Information Security Manager

Information Security Program Management

Bobby Rogers
Protecting information assets is the primary goal of an information security program, and information security management provides the oversight for the balance between resources, compliance, and security. Organizations must protect their information assets...
Read more
Protecting information assets is the primary goal of an information security program, and information security management provides the oversight for the balance between resources, compliance, and security. Organizations must protect their information assets by establishing and maintaining an effective information security program, considering the organization’s mission, goals, infrastructure, and people. In this course, Information Security Manager: Information Security Program Management, you'll gain solid foundational knowledge on the program management aspect of security, as well as skills you can use to effectively protect assets in your organization. First, you'll learn how to develop internal governance, such as security policies, manage people and technology processes, and how to maintain an information security training program. Next, you'll explore how to audit third-party agreements and contracts. Finally, you'll discover how to monitor the performance of the information security program and report that information to the various stakeholders in the organization. By the end of this course, you'll be well-versed in information security program management and how it affects the organization’s information security assets.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills in information security program management, governance, and oversight
Teaches how to establish, maintain, and manage an effective information security program
Provides a comprehensive overview of information security program management and its role in protecting information assets
Taught by industry expert Bobby Rogers
Suitable for those seeking to gain foundational knowledge in information security program management

Save this course

Save Information Security Manager: Information Security Program Management to your list so you can find it easily later:
Save

Career center

Learners who complete Information Security Manager: Information Security Program Management will develop knowledge and skills that may be useful to these careers:
IT Auditor
IT auditors are responsible for evaluating an organization's information systems and processes to ensure that they are aligned with the organization's security policies and procedures. This course would be useful for IT auditors as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Information Security Analyst
Information security analysts are responsible for protecting an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course would be particularly useful for aspiring information security analysts as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Risk Manager
Risk managers are responsible for identifying, assessing, and mitigating risks to an organization. This course would be useful for risk managers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Security Consultant
Security consultants help organizations to improve their security posture by identifying and mitigating risks. This course would be useful for security consultants as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Information Security Manager
Information security managers are responsible for planning, implementing, and managing an organization's information security program. This course would be essential for anyone aspiring to become an information security manager as it provides a solid foundational knowledge of information security program management.
Chief Information Security Officer (CISO)
CISOs are responsible for overseeing an organization's information security program. This course would be essential for anyone aspiring to become a CISO as it provides a comprehensive overview of information security program management.
Compliance Manager
Compliance managers are responsible for ensuring that an organization is in compliance with all applicable laws and regulations. This course would be useful for compliance managers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Privacy Manager
Privacy managers are responsible for developing and implementing an organization's privacy program. This course would be useful for privacy managers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Security Architect
Security architects are responsible for designing and implementing an organization's security infrastructure. This course would be useful for security architects as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Business Continuity Manager
Business continuity managers are responsible for developing and implementing plans to ensure that an organization can continue to operate in the event of a disaster. This course would be useful for business continuity managers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Information Security Engineer
Information security engineers are responsible for implementing and maintaining an organization's information security infrastructure. This course would be useful for information security engineers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Data Protection Officer (DPO)
DPOs are responsible for ensuring that an organization is in compliance with data protection laws and regulations. This course would be useful for DPOs as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Security Analyst
Security analysts are responsible for monitoring and analyzing an organization's security systems to identify and respond to threats. This course would be useful for security analysts as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Information Governance Manager
Information governance managers are responsible for developing and implementing an organization's information governance program. This course would be useful for information governance managers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.
Cybersecurity Engineer
Cybersecurity engineers are responsible for designing and implementing an organization's cybersecurity infrastructure. This course would be useful for cybersecurity engineers as it provides a comprehensive overview of information security program management, including topics such as developing internal governance, managing people and technology processes, auditing third-party agreements and contracts, and monitoring the performance of the information security program.

Reading list

We haven't picked any books for this reading list yet.
An authoritative reference on the core concepts of information security, providing a hands-on approach to practical implementation and risk management.
A comprehensive overview of cybersecurity and information security, encompassing a wide range of topics from risk management to incident response.
An in-depth exploration of cloud security, covering topics such as cloud security architecture, risk management, and compliance.
A hands-on guide to penetration testing, covering both the technical aspects of hacking and the methodologies used by professional penetration testers.
A comprehensive guide to incident response and computer forensics, covering both the technical and legal aspects of these disciplines.
A practical guide to network security, covering both offensive and defensive techniques.
Provides a comprehensive overview of the Information Security Program Development (ISPD) process, covering all the essential steps involved in creating and implementing an effective information security program.
Provides a comprehensive overview of information security risk management. It covers all aspects of the risk management process, from identifying and assessing risks to mitigating and managing risks.
Provides a practical guide to developing and implementing an information security program for small businesses. It covers all the essential steps involved in the ISPD process, from planning and risk assessment to implementation and monitoring.
Provides a comprehensive collection of information security policies and procedures. It covers all the essential topics, including security awareness, physical security, network security, and data security.
Provides a comprehensive overview of cloud security. It covers all the essential aspects of cloud security, including cloud security architecture, cloud security controls, and cloud security risk management.
Provides a comprehensive overview of web security. It covers all the essential aspects of web security, including web security threats, web security vulnerabilities, and web security controls.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser