This course is designed for professionals aiming to excel in creating and managing robust security programs that align with organizational goals. You'll start by exploring the essential components of an information security program, including frameworks, benchmarks, and metrics. As you progress, you'll gain expertise in asset classification, controls, configuration management, and vulnerability management. The course also covers the software development life cycle, cloud computing, and vendor management, equipping you with the skills to handle complex security challenges. Dive into the technical aspects of secure design and implementation, mastering secure design principles, network access control, cryptography, and physical security.



The Pearson Complete Course for CISM Certification: Unit 3
This course is part of The Pearson Complete Course for CISM Certification Specialization

Instructor: Pearson
Access provided by Kalinga Institute of Industrial Technology
Recommended experience
What you'll learn
Develop and manage comprehensive information security programs aligned with organizational objectives.
Implement effective asset classification, controls, and vulnerability management strategies.
Navigate regulatory and compliance requirements with confidence, ensuring organizational adherence and ethical integrity.
Skills you'll gain
Details to know

Add to your LinkedIn profile
3 assignments
July 2025
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There is 1 module in this course
This course delves into the information security program development and management domain, covering the essential activities required to create, implement, and manage an enterprise information security program effectively. It begins with an exploration of program components, frameworks, benchmarks, metrics, and training. The course then examines critical elements such as asset classification, controls, configuration and change management, patch and vulnerability management, and the software development life cycle. Additionally, it addresses cloud computing, vendor management, and the technical aspects of secure design, including design principles, network access control, cryptography, and physical security. With three lessons and 26 sub-lessons aligned with ISACA's objectives, the course includes interactive challenges and case studies to enhance learning. Each lesson concludes with a quiz, emphasizing the role of an information security program manager in developing best practices and aligning security programs with organizational goals.
What's included
33 videos3 assignments
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Why people choose Coursera for their career









