Information Security Program Management: Resources and Implementation


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Once there is an information security program framework in place, the next step for an information security manager is to catalog the resources on hand, and to assemble the resources that are still required in order to implement the information security program. This course examines the policies, controls, and metrics used to make the program function efficiently, and the analyses that will be used to monitor the program on an ongoing basis. This course also examines the technologies, skills, and outside support that the information security program will use. This course will show you how to evaluate the current state of the program and actions to take to properly manage information security. This course prepares you for the Certified Information Security Manager (CISM) exam.

Target Audience
Experienced IT security professionals seeking to pass the Certified Information Security Manager (CISM) exam, or otherwise gain knowledge in managing, designing, and overseeing an enterprise's information security.

Expected Duration (hours)
2.5

Lesson Objectives

Information Security Program Management: Resources and Implementation

  • identify information security management tasks with regard to policies, standards, and procedures
  • identify key points regarding controls and countermeasures that are important during information security program implementation
  • identify key points regarding audits that an information security manager should remember during program implementation
  • recognize the results of commonly used risk analysis methods
  • recognize how technologies and human resources are used to manage information security
  • recognize key points about governing documentation, controls, and audits
  • recognize key points about risk analysis resources used in information security management
  • recognize key points about technologies and human resources
  • identify key points regarding the evaluation of an information security program
  • recognize actions that an information security manager should take when implementing an established program
  • recognize responsibilities of an information security manager during program implementation
  • recognize key points about evaluating an information security program
  • recognize key points related to information security management
  • recognize key points related to the responsibilities of an information security manager
  • Course Number:
    sp_cism_a10_it_enus