Information Security Management Fundamentals

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Information Security Management Fundamentals

Coursera · Beginner ·🔐 Cybersecurity ·4h ago
In this course, you’ll develop a foundational understanding of the role of an Information Security Manager. You will explore critical topics such as governance, compliance, and risk management, essential areas for securing organizational information. As the demand for cybersecurity professionals grows, this course provides the knowledge you need to stay ahead in the field. Through this course, you’ll gain the skills to assess and manage risks, implement governance frameworks, and ensure compliance with security standards. By mastering these areas, you’ll be equipped to handle the key challenges of a security management career. What makes this course unique is its ability to integrate theoretical concepts with practical, hands-on applications. Case studies and scenarios will guide you through realistic problems that Information Security Managers face, providing a direct path to mastering the role. This course is ideal for professionals looking to start or advance their career in information security management. Basic understanding of cybersecurity concepts is recommended but not required. This course is part one of a three-course Specialization designed to provide a comprehensive learning pathway in this subject area. While it delivers standalone value and practical skills, learners seeking a more integrated and in-depth progression may benefit from completing the full Specialization. From CISM Certified Information Security Manager Study Guide Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Used by arrangement with John Wiley & Sons, Inc.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Python Security Automation for Busy Sysadmins — 5 scripts that lock down SSH, au
Automate security tasks with 5 Python scripts to lock down SSH and audit logs, saving time for busy sysadmins
Dev.to AI
OWASP 2026 Smart Contract Vulnerabilities: Access Control (SC01:2026) Analysis
Learn to identify and mitigate access control failures in smart contracts, a high-severity vulnerability class
Dev.to · Meriç Cintosun
SecurityHeaders.com API Is Gone — Here's the Migration
Migrate from SecurityHeaders.com API to an alternative with a practical drop-in solution using curl examples
Dev.to · Guardr
Offensive Security Intro
Learn the basics of offensive security by hacking a website in a safe environment and understanding the mindset of an ethical hacker
Medium · Cybersecurity
Up next
Access & Security Management
Coursera
Watch →