Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Information Security Manager: Information Security Program Management

Course Cover
compare button icon

Course Features

icon

Duration

248 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

248 minutes

Course Description

Information security management oversees the balance between compliance and security and ensures that information assets are protected. Effective information security management is essential for organizations to protect their information assets. This program must be tailored to the company's mission, goals and infrastructure. This course, Information Security Manager: Information Security Program Management will provide you with solid knowledge about the program management aspects of security and skills that you can use to protect your assets. You'll first learn how to create internal governance. This includes security policies, managing people and technology, and maintaining an information security training program. You'll then learn how to audit contracts and third-party agreements. You'll also learn how to monitor and report on the performance of your information security program to all stakeholders. This course will teach you how to manage information security programs and how they affect the organization's information assets.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

You'll learn how to develop internal governance, such as security policies, manage people and technology processes, and how to maintain an information security training program

Next, you'll explore how to audit third-party agreements and contracts

Finally, you'll discover how to monitor the performance of the information security program and report that information to the various stakeholders in the organization

By the end of this course, you'll be well-versed in information security program management and how it affects the organization’s information security assets

Course Instructors

Author Image

Bobby Rogers

Instructor

Bobby E. Rogers is an information security engineer working as a contractor for Department of Defense agencies, helping to secure, certify, and accredit their information systems. His duties include ...
Course Cover