0

Loading ...

Course / Course Details

Information Security Management

  • Super admin image

    By - Super admin

  • 342 students
  • N/A
  • (5)

Course Requirements

  • 1. Basic understanding of IT systems and concepts (helpful but not mandatory).
  • 2. Familiarity with general cybersecurity principles (optional).
  • 3. Interest in organizational security policies, risk management, and compliance.
  • 4. A computer or mobile device with internet access for case studies and exercises.
  • Course Description

    This course introduces participants to the principles and practices of Information Security Management (ISM). It provides an overview of how organizations protect their information assets from risks, threats, and vulnerabilities. Topics covered include the fundamentals of confidentiality, integrity, and availability (CIA), risk assessment and mitigation, security policies, compliance standards (e.g., ISO 27001), and incident management.

    Course Outcomes

    By the end of the course, participants will be able to:

    1. Understand the key concepts of information security and the CIA triad.
    2. Identify common threats, vulnerabilities, and risks to organizational information.
    3. Develop and implement security policies and procedures.
    4. Conduct basic risk assessments and propose mitigation strategies.
    5. Gain awareness of international standards and compliance frameworks (e.g., ISO/IEC 27001, GDPR).
    6. Manage security incidents and understand the importance of incident response planning.
    7. Promote a security-conscious culture within an organization to minimize risks.
    8. Align information security strategies with organizational goals and objectives.

    Course Curriculum

    • chapters
    • lectures
    • quizzes
    • N/A total length
    Toggle all chapters
    1 Module Objectives
    1 Min


    2 Information Security and Its Objectives
    2 Min


    3 The Role Of Information Sec
    5 Min


    4 Role of a Information Systems Security Manager
    1 Min


    5 What is Information Security Management Systems
    1 Min


    6
    N/A


    7 InfoSecMgmt Exercise 1
    1 Hour 30 Min


    1 Module 2 Objectives
    1 Min


    2 Common Threats And Vulnerabilities
    2 Min


    3 Vulnerability vs Threat vs Risk
    3 Min


    4 Impact Of Security Breaches
    2 Min


    5 InfoSecMgmt Exercise 2
    5 Min


    6
    N/A


    1 Module 3 Objectives
    1 Min


    2 Elements Of a Security Policy
    3 Min


    3 Information Security Policies
    2 Min


    4 Role Of Governance In Information Security
    5 Min


    5 IT Security Documentations/Governance
    3 Min


    6 InfoSecMgmt Exercise 3
    5 Min


    7
    N/A


    1 Module 4 Objectives
    N/A


    2 Risk Management
    2 Min


    3 Risk Assessment Techniques
    1 Min


    4 Why You Should Have a Cybersecurity Risk Assessment
    1 Min


    5 Risk Analysis - Know Your Threat Tolerance
    2 Min


    6 Risk Mitigation Strategies
    3 Min


    7 InfoSecMgmt Exercise 4
    5 Min


    8
    N/A


    1 Module 5 Objectives
    N/A


    2 Common Security Frameworks
    3 Min


    3 Building a Cybersecurity Framework
    4 Min


    4 Benefits Of Adopting Security Frameworks
    4 Min


    5 Security Frameworks
    4 Min


    6 The NIST Cybersecurity Framework
    N/A


    7 InfoSecMgmt Exercise 5
    5 Min


    8
    N/A


    1 Module 6 Objectives
    N/A


    2 Types Of Security Controls
    1 Min


    3 Security Controls
    4 Min


    4 Implementing Security Controls
    5 Min


    5
    N/A


    6 InfoSecMgmt Exercise 6
    5 Min


    1 Module 7 Objectives
    N/A


    2 Developing An Incident Response Plan
    2 Min


    3 Incident Response
    2 Min


    4 Steps In Incident Management
    3 Min


    5 Incident Response VS Incident Management
    3 Min


    6
    N/A


    7 InfoSecMgmt Exercise 7
    5 Min


    1 Module 8 Objectives
    N/A


    2 Developing A Security Awareness Program
    2 Min


    3 Phishing Simulations and Awareness Campaign
    2 Min


    4 Measuring the Benefits of a Successful Security Awareness Program
    N/A


    5 Information Security Awareness Employee Training
    N/A


    6 InfoSecMgmt Exercise 8
    5 Min


    7
    N/A


    8 Making security awareness training fun and engaging
    2 Min


    1 Module 9 Objectives
    N/A


    2 Evolution Of Cyber Threats and Defense Mechanisms
    1 Min


    3 Role Of AI and ML In Security
    1 Min


    4 Current Trends and Future Directions in Cyber Security
    2 Min


    5 Rise Of Zero Trust Models
    3 Min


    6
    N/A


    7 InfoSecMgmt Exercise 9
    9 Min


    1 Conclusion
    2 Min


    2 References
    N/A


    1
    N/A


    Instructor

    3.7 Rating
    3 Reviews
    537 Students
    28 Courses

    Course Full Rating

    5

    Course Rating
    (1)
    (0)
    (0)
    (0)
    (0)

    Sign In or Sign Up as student to post a review

    Student Feedback

    You must be enrolled to ask a question

    Students also bought

    More Courses by Author

    Discover Additional Learning Opportunities