ITE533 Cyber Security Management (8)


This subject prepares students for the Certified Information Systems Management Certification (CISM), which is an international industry certification developed by ISACA. Students in this subject will investigate how to establish and maintain an information security governance framework along with the supporting processes to ensure that an organisation's information security strategy is aligned with its goals and objectives.

+ Subject Availability Modes and Location

Session 2
OnlineWagga Wagga Campus
Continuing students should consult the SAL for current offering details: ITE533
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Enrolment restrictions

Only available to students enrolled in:

Graduate Certificate in Cloud Computing and Virtualisation
Graduate Certificate in Industry Computing
Graduate Certificate in Information Systems Security
Graduate Certificate in Management (Information Technology)
Graduate Certificate in Networking and Systems Administration
Master of Cloud Computing and Virtualisation
Master of Information Systems Security
Master of Management (Information Technology)
Master of Networking and Systems Administration

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to create and maintain an information security strategy that aligns with organisational goals and objectives;
  • be able to establish, monitor, evaluate and report on a set of security metrics that are appropriate to an organisation's business mission;
  • be able to formulate and maintain business processes which enable classification of information assets;
  • be able to analyse and evaluate appropriate risk treatment options to manage risk;
  • be able to identify, define and manage requirements for internal and external resources to execute the information security program; and
  • be able to create and maintain an incident response plan to ensure an effective and timely response to information security incidents.


The subject will cover the following topics:
  • Information security governance
  • Information security strategy
  • Security requirements
  • Risk management and compliance
  • Security policies
  • Asset classification models
  • Program development and management
  • Security incident management


The information contained in the 2017 CSU Handbook was accurate at the date of publication: 25 August 2017. The University reserves the right to vary the information at any time without notice.