Information Security Governance for CISM®
Offered By: Pluralsight
Course Description
Overview
This course will teach you knowledge and application of information security governance, concepts, and principles needed for the Certified Information Security Manager (CISM) exam.
It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.
It can be stated that access control is the very heart of an information security program, and, therefore, it is a core responsibility of an information security manager. In this course, Information Security Governance for the CISM, you’ll learn to implement appropriate governance principles and security concepts into an organization. First, you’ll explore the nature of governance and its differentiation from management. Next, you’ll discover how to develop an enterprise-wide governance program. Finally, you’ll learn how to identify and comply with the factors of law, regulation and organizational culture in development of adequate oversight for the information security program. When you’re finished with this course, you’ll have the skills and knowledge of information security governance needed for the Certified Information Security Manager exam.
Syllabus
- Course Overview 1min
- Enterprise Governance 67mins
- Information Security Strategy 35mins
- Course Summary 6mins
Taught by
Kevin Henry
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera