Whizlabs

CISM: Security Program Management

Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

Whizlabs

CISM: Security Program Management

Whizlabs Instructor

Instructor: Whizlabs Instructor

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

6 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

6 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Construct a Strategic Program Foundation.

  • Develop and Enforce Governance Documentation.

  • Cultivate a Risk-Aware Culture and Performance Tracking.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

March 2026

Assessments

6 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Build your subject-matter expertise

This course is part of the Exam Prep CISM: Certified Information Security Manager Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 3 modules in this course

Welcome to the week 1. In this week, we will begin by exploring the core Information Security Program Development Concepts and defining the specific Information Security Program Objectives that align with your business mission. You will learn to establish authority and boundaries through a clear Scope and Charter of Information Security Program Development, ensuring a solid foundation for governance. We will then transition into the selection and implementation of Information Security Framework Components designed to structure your defenses effectively. A key focus will be placed on technical design, specifically understanding Information Infrastructure and Architecture and its role in building a scalable, secure environment. Finally, we will cover the practical steps for Implementing An Information Security Program, providing a comprehensive roadmap that bridges the gap between high-level strategy and technical execution.

What's included

7 videos2 readings2 assignments

Welcome to Week 2. This week, we will begin by establishing the administrative foundations, focusing on the day-to-day Administration and Management of Security Programmes to ensure they remain functional and relevant. We will transition into the tactical side of security, exploring how to deliver consistent Security Program Services and Operational Activities that support the business. A key focus will be placed on the governance lifecycle, specifically understanding the development and enforcement of Policy, Standards, and Procedures to create a predictable security environment. Finally, we will cover the strategic planning and financial oversight required for long-term success, including Creating a Road Map for an Information Security Programme and managing the Budget for Security to bridge the gap between technical operations and executive requirements.

What's included

8 videos1 reading2 assignments

In this week, we will begin by exploring the complex landscape of Privacy Regulations and the unique security challenges posed by Cloud Computing, ensuring your program remains compliant and secure in the digital age. We will transition into the selection and implementation of Countermeasures and Controls designed to mitigate identified risks effectively across the enterprise. A key focus will be placed on the human element of security, specifically understanding the role of Security Education and Training in building a risk-aware culture. Finally, we will cover Metrics and Monitoring for Security Programmes to ensure that control effectiveness is continuously tracked and reported to stakeholders, providing a comprehensive Information Security Program Development and Management overview that bridges the gap between technical defense and regulatory oversight.

What's included

6 videos2 readings2 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Whizlabs Instructor
Whizlabs
146 Courses 113,873 learners

Offered by

Whizlabs

Explore more from Software Development

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions