Program Brief

Dive into the world of cybersecurity leadership with our LDR512: Security Leadership Essentials for Managers program, designed specifically for professionals aiming to elevate their security management skills. This comprehensive program not only covers the fundamentals of building and managing a security program but also delves into the intricacies of risk assessment, policy development, and technical security architecture. By participating in our program, you'll gain the confidence to navigate the complex landscape of cybersecurity frameworks and controls. You’ll learn to identify vulnerabilities and implement proactive defenses against emerging threats. Our curriculum, crafted by industry experts, emphasizes real-world applicability, ensuring that you can apply what you've learned directly to your day-to-day operations. You'll also master cybersecurity strategic planning, develop policies that resonate with your team, and lead with assurance during critical cybersecurity incidents. Understanding the pivotal role of compliance, this program guides you through the legal and regulatory standards affecting cybersecurity, preparing you to lead your organization with integrity and foresight. Through engaging lectures, hands-on exercises, and real-world simulations, LDR512 offers a dynamic learning environment that fosters practical skills and strategic thinking. Join our network of cybersecurity professionals committed to excellence and take your leadership capabilities to the next level. Whether you're an aspiring manager or looking to strengthen your current leadership role, this program is designed to enhance your career and contribute significantly to your organization's security and resilience.

Program Goals

At the end of the training program, the participant should be able to:

  • in the knowledge and skills necessary to pass the LDR512® exam.
  • Navigate and implement various security frameworks, enhancing their ability to build robust security programs within their organizations.
  • Gain proficiency in identifying, assessing, and managing cybersecurity risks to make informed security decisions and prioritize resources effectively.
  • Learn to create, manage, and enforce security policies that align with organization’s risk appetite and compliance requirements.
  • Acquire the skills to design and evaluate technical security architectures, ensuring a secure infrastructure across network, cloud, and application layers.
  • Understand the process of identifying, prioritizing, and mitigating vulnerabilities to strengthen organization’s defense against cyber threats.
  • Enhance skills & capabilities to effectively manage and lead cybersecurity teams, fostering a culture of security awareness and resilience.
  • Master the art of strategic cybersecurity planning, including developing, implementing, and maintaining a comprehensive security program.
  • Equip yourself with the knowledge and skills to effectively manage and respond to cybersecurity incidents, minimizing their impact on business operations.
  • Understand the legal and regulatory landscape affecting cybersecurity, ensuring organization’s security practices comply with applicable laws and standards.
Program Agenda
Module 1: Building Your Security Program
  • 1 Security Frameworks

    • Control, Program, and Risk Frameworks

    • 2 Understanding Risk

      • Risk Concepts

        • Calibration

          • Risk Assessment and Management

          • 3 Security Policy

            • Purpose of Policy

              • Risk Appetite Statement

                • Policy Planning

                  • Managing Policy

                  • 4 Program Structure

                    • Reporting Relationships

                      • Three Lines of Defense

                        • Roles and Responsibilities

                          • Security Functions

                          • 5 Exercises:

                            • Cyber42 Watt's Warehouse Company Overview

                              • Calibration Lab

                                • Cyber42 Round 1 Initiative Selection

                                  • Cyber42 Round 1 Event 1: Whither Watt's Warehouse

                                    • Cyber42 Round 1 Event 2: Institutionalizing Security

                                      • Cyber42 Round 1 Event 3: Board Briefing

                                      Module 2: Technical Security Architecture
                                      • 1 Security Architecture Overview

                                        • Models and Trends

                                          • Security Architecture Frameworks

                                            • Cyber Defense Matrix

                                            • 2 Network Security

                                              • Layer 1 and 2

                                                • Overview and Attacks

                                              • Layer 3

                                                • VPNs and IPSec

                                              • Layer 4

                                                • TCP and UDP

                                              • Application Layer

                                                • Proxies, NGFW, IDS/IPS, NSM

                                            • 3 Host Security

                                              • Malware and Attack Examples

                                                • Host Security Controls

                                                  • EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing

                                              • 4 Cloud Security

                                                • Cloud Security Fundamentals

                                                  • AWS Security Reference Architecture

                                                    • AWS Overview

                                                      • Cloud Security Attack Example and Controls

                                                        • Cloud Security Tools

                                                          • CSPM, CWPP, CASB

                                                        • Cloud Security Models

                                                          • Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks

                                                      • 5 Identity and Access Management (IAM)

                                                        • Authentication Factors

                                                          • Authentication and Access Attacks

                                                            • IAM Security Capabilities

                                                            • 6 Zero Trust

                                                              • Principles and Best Practices

                                                                • Zero Trust Network Access (ZTNA)

                                                                  • Variable Trust

                                                                  • 7 Exercises:

                                                                    • Cyber42 Round 1 Event 4: Network Security Implementation

                                                                      • Cyber42 Round 1 Event 5: End User Security

                                                                        • Cyber42 Round 1 Event 6: To Serve and Protect

                                                                        Module 3: Security Engineering
                                                                        • 1 Security Engineering

                                                                          • Overview

                                                                          • 2 Data Protection

                                                                            • Cryptography Concepts

                                                                              • Confidentiality, Integrity, Authentication, Non-Repudiation

                                                                            • Encryption Algorithms

                                                                              • Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature

                                                                            • Encryptions Applications

                                                                              • TLS, PKI, Blockchain, Quantum

                                                                          • 3 Privacy Primer

                                                                            • Privacy and Security

                                                                              • Requirements and Regulations

                                                                                • Privacy Engineering

                                                                                • 4 Application Security

                                                                                  • Secure SDLC

                                                                                    • Application Attacks

                                                                                      • OWASP Top Ten

                                                                                    • Application Security Tools

                                                                                      • SAST, SCA, DAST, WAF, RASP

                                                                                  • 5 DevSecOps

                                                                                    • DevOps Toolchain and Pipeline

                                                                                      • Continuous Integrations and Continuous Delivery (CI / CD)

                                                                                        • Infrastructure as Code (IaC)

                                                                                          • Container Security

                                                                                          • 6 Generative AI and Large Language Models (GenAI and LLMs)

                                                                                            • Innovations in Artificial Intelligence

                                                                                              • LLM Application Architecture

                                                                                                • AWS Generative AI Security Scoping Matrix

                                                                                              • LLM Attacks

                                                                                                • OWASP Top Ten for LLMs

                                                                                                • MITRE ATLAS

                                                                                                • Overreliance, Prompt Injection, Sensitive Information Disclosure, Model Theft, Training Data Poisoning, Excessive Agency, Jailbreaking

                                                                                              • GenAI Security Controls

                                                                                                • NIST AI Risk Management Framework (RMF)

                                                                                                • AI Security Policy

                                                                                                • AI Security Tools and Mitigations

                                                                                            • 7 Exercises:

                                                                                              • Cyber42 Round 2 Initiative Selection

                                                                                                • Cyber42 Round 2 Event 7: Industry Breach

                                                                                                  • Cyber42 Round 2 Event 8: Shadow IT

                                                                                                    • Cyber42 Round 2 Event 9: Security Misconfiguration

                                                                                                      • Cyber42 Round 2 Event 10: Miracle on DevOps Way

                                                                                                      Module 4: Security Management and Leadership
                                                                                                      • 1 Vulnerability Management

                                                                                                        • PIACT Process

                                                                                                          • Prioritizing Vulnerabilities

                                                                                                            • Common Vulnerability Scoring System (CVSS)

                                                                                                          • Finding and Fixing Vulnerabilities

                                                                                                            • Communicating and Managing Vulnerabilities

                                                                                                            • 2 Security Awareness

                                                                                                              • Maturity Model

                                                                                                                • Human Risks

                                                                                                                • 3 Negotiations Primer

                                                                                                                  • Negotiations Strategies

                                                                                                                  • 4 Vendor Analysis

                                                                                                                    • Product Analysis and Selection

                                                                                                                      • Analytical Hierachy Process (AHP)

                                                                                                                      • 5 Managing and Leading Teams

                                                                                                                        • Managing Projects

                                                                                                                          • Leading Teams

                                                                                                                            • Going From Good to Great

                                                                                                                            • 6 Exercises:

                                                                                                                              • Cyber42 Round 3 Initiative Selection

                                                                                                                                • Cyber42 Round 3 Event 11: Patching Problems

                                                                                                                                  • Cyber42 Round 3 Event 12: Let It Be Known!

                                                                                                                                    • Cyber42 Round 3 Event 13: Tough Negotiations

                                                                                                                                      • Cyber42 Round 3 Event 14: Managing Resistance

                                                                                                                                      Module 5: Detecting and Responding to Attacks
                                                                                                                                      • 1 Logging and Monitoring

                                                                                                                                        • SIEM Deployment Best Practices

                                                                                                                                        • 2 Security Operations Center (SOC)

                                                                                                                                          • SOC Functional Components

                                                                                                                                            • Models and Structure

                                                                                                                                              • Tiered vs. Tierless SOCs

                                                                                                                                                • Managing and Organizing a SOC

                                                                                                                                                • 3 Incident Handling

                                                                                                                                                  • PICERL Process

                                                                                                                                                    • Incident Handling Lifecycle

                                                                                                                                                    • 4 Contingency Planning

                                                                                                                                                      • Business Continuity Planning (BCP)

                                                                                                                                                        • Disaster Recovery (DR)

                                                                                                                                                        • 5 Physical Security

                                                                                                                                                          • Issues and Controls

                                                                                                                                                          • 6 Exercises:

                                                                                                                                                            • Cyber42 Round 4 Initiative Selection

                                                                                                                                                              • Cyber42 Round 4 Event 15: New Guy in Town

                                                                                                                                                                • Cyber42 Round 4 Event 16: Cost Cutting

                                                                                                                                                                  • Cyber42 Round 4 Event 17: Ransomware Response

                                                                                                                                                                    • Cyber42 Round 4 Event 18: Opportunity Knocks

                                                                                                                                                                    Program Requirements

                                                                                                                                                                    Not Available

                                                                                                                                                                    Program Path

                                                                                                                                                                    Names of the training programs that are integrated (enriched) with the training program:

                                                                                                                                                                    • Not Available

                                                                                                                                                                    Names of the training programs that after the training program:

                                                                                                                                                                    • Not Available
                                                                                                                                                                    Program Method
                                                                                                                                                                    • Lecture
                                                                                                                                                                    • Practical Implementation
                                                                                                                                                                    • Exercises and assignments
                                                                                                                                                                    Evaluation Method
                                                                                                                                                                    • Simulation Test for professional exam
                                                                                                                                                                    Training Type
                                                                                                                                                                    • In Class Training

                                                                                                                                                                    Add Comment

                                                                                                                                                                    CAPTCHA

                                                                                                                                                                    Realted Program

                                                                                                                                                                    International Financial Reporting Standard 17

                                                                                                                                                                    Unlock the complexities of IFRS 17 with our comprehensive training program designed for finance and insurance professionals. Over four days, participants will gain an in-depth understanding of key principles, the General Measurement Model, and the Premium Allocation Approach. Our expert-led sessions combine lectures, case studies, and practical implementation to ensure mastery of IFRS 17 standards. Learn about reinsurance and regulatory requirements specific to Saudi Arabia, and gain insights into projecting cash flows in compliance with IFRS 17. Additionally, we cover IFRS 9, offering a holistic view of financial reporting and its impact on IFRS 17. Enhance your skills through hands-on training that includes interactive exercises and real-world examples. Our face-to-face sessions provide the perfect environment for learning and networking with peers. Don't miss this opportunity to stay ahead in the dynamic world of finance and insurance—register now to secure your spot and elevate your expertise to the next level. Join us and ensure compliance with the latest standards in financial reporting.

                                                                                                                                                                    Details

                                                                                                                                                                    Financial Modeling and Valuation Analyst

                                                                                                                                                                    This three-day Financial Modelling course equips participants with advanced skills in building and analyzing financial models, emphasizing best practices. It begins with the 8 principles of modelling best practice, covering topics like consistent timelines, formulae, circular references, and macros. The curriculum includes sessions on Model Design and Planning, exploring model types, valuation, transaction structuring, and data manipulation. Participants will engage in practical exercises, constructing models, handling complex calculations like IRR and NPV, and conducting scenario analyses. This course is essential for professionals seeking to enhance their financial modelling and decision-making skills.

                                                                                                                                                                    Details

                                                                                                                                                                    Investing in Fintech Business

                                                                                                                                                                    The program offers a comprehensive exploration of how technology is transforming finance. Through a series of expert-led lectures and interactive workshops, participants will delve into FinTech investment strategies and gain a thorough understanding of the sector’s dynamics. The curriculum includes an in-depth immersion into Silicon Valley’s ecosystem, providing valuable opportunities to connect with leading FinTech startups, seasoned investors, and industry experts. This experience highlights the lifecycle of ventures and strategies for strategic growth. Aimed at equipping attendees with critical insights, the program emphasizes the importance of legal compliance, the strategic value of investments, and the transformative impact of partnerships in the FinTech industry.

                                                                                                                                                                    Details

                                                                                                                                                                    Preparation Program for Certified Internal Auditor Exam (CIA®)- First Part

                                                                                                                                                                    A professional certificate accredited by the Institute of Internal Auditors, IIA, USA, an organization offered in the internal field of performance, as well as there is a need in the labor market for holders of this certificate, and hence the high value of the benefits and job opportunities for them. This certificate helps prepare a new generation of accountants with globally qualified professional qualifications, to face the economic challenges faced by business establishments. The CIA Internal Auditor Certificate in Part One focuses on the internal basics of studying internal concepts, the mandatory mountain, and techniques of Iranian auditing.

                                                                                                                                                                    Details

                                                                                                                                                                    Microsoft Excel- Advanced Level

                                                                                                                                                                    One of the basic skills needed to carry out daily tasks professionally is the ability to use Microsoft Excel to manage and create equations and statistics. This training program is designed to provide participants with the knowledge and skills necessary to use advanced technologies in Excel efficiently and effectively.

                                                                                                                                                                    Details

                                                                                                                                                                    International Financial Reporting Standards (IFRS)

                                                                                                                                                                    Accounting is the language of business, and it is an information system that provides a wide range of stakeholders with the financial information they need to make rational decisions in finance and investment. The accuracy of this information is important to users, so the International Accounting Standards Board IASB issued international accounting standards and international financial reporting standards to ensure the quality of this information. This course includes an explanation of the most important international accounting standards related to the preparation and presentation of financial statements and its included items matching with the IAS and IFRS requirements and meets the users’ needs

                                                                                                                                                                    Details

                                                                                                                                                                    Preparing Financial Reports

                                                                                                                                                                    The financial reports issued by the facility are considered as the outputs of its accounting system through which the results of the financial events related to the reporting period are presented and that help the beneficiaries of those reports to judge the state of the facility in terms of financial balance and the structure of financing the acquisition of assets, as well as showing its ability to generate revenue, and enables them From the analysis of the cost component structure. This training program is designed to provide participants with the knowledge and skills necessary to read and understand the components of financial reports and how to prepare them, and to review the most important presentation and disclosure requirements for international accounting standards and financial reporting standards.

                                                                                                                                                                    Details

                                                                                                                                                                    Risk Analysis and Management in Insurance Companies

                                                                                                                                                                    Risk management in insurance companies is an essential element of management and accountability, as it is a method and approach applied to all company departments to increase the effectiveness of corporate governance and compliance systems, which supports the achievement of strategic goals by identifying, analyzing, evaluating and prioritizing and monitoring risks to help ensure the sustainability of the company’s work and enable it to achieve its objectives. A main focus of this program is to identify risk management, its stages, and various tools for risk management as well as to review the legal framework for risk management in the Saudi insurance sector and to learn how to prepare an emergency plan for management of business continuity and crises.

                                                                                                                                                                    Details

                                                                                                                                                                    Preparation Program for Risk in Financial Services Certificate Exam- from CISI

                                                                                                                                                                    This training program aims to prepare participants with the knowledge and skills necessary to pass the The Risk in Financial Services program provides by CISI. This program covers the main areas of risk in financial services, by addressing international issues, and providing participants with a comprehensive and sound understanding of the principles of the risk management and control framework and corporate governance. The program also addresses the techniques used to identify and manage operational risks, credit risks, market risks, investment risks, and liquidity risks.

                                                                                                                                                                    Details

                                                                                                                                                                    Anti-Money Laundering and Terrorist Financing- Advanced Level

                                                                                                                                                                    Fighting money laundering and terrorist financing is a priority for the international community; since these financial crimes threaten the integrity and stability of the financial system and the economy in general, they can also affect the integrity and stability of financial institutions, discourage foreign investment, and distort international flows. As a result, the affected country experiences dire financial instability and poor economic performance. This program deeply explains AML & CTF standards and respective risk management in financial institutions. The program also explains pertinent local and international legislations and leading practices, as well as, the preparation and implementation of ML and TF risk-based programs, including “Know Your Customer” and “Customer Due Diligence” requirements.

                                                                                                                                                                    Details

                                                                                                                                                                    Credit Analysis and Decision-Making Mechanisms

                                                                                                                                                                    Choosing the right credit decision is the first line of defense for preserving lenders' capital, protecting creditors, and maximizing profitability for the bank. In this program, the participant gets familiar with the stages of credit decision-making according to the approved credit policy, the latest strategies for analyzing and calculating credit risks, local and international controls and standards, to be able to make a correct and successful credit decision that controls the expected risks.

                                                                                                                                                                    Details

                                                                                                                                                                    Financial Planning, Analysis and Forecasting

                                                                                                                                                                    Since the financial statements provide us with historical information and total figures, the decision maker needs tools that enable him to enter into the details of this information and the indicators that show the relationship between them. Therefore, close knowledge of the tools of planning, analysis and financial forecasting is one of the basic skills needed to manage the financial resources of the enterprise. This program provides participants with the basic knowledge to analyze financial statements and how to use the extracted indicators in evaluating the performance of the enterprise, making decisions and drawing future plans and policies for it. Additionally, it covers the forecasting model that depends on a specific set of financial criteria on which the financial plan for the facility is based.

                                                                                                                                                                    Details

                                                                                                                                                                    Motor Insurance (M94)- Dip. CII

                                                                                                                                                                    The Diploma in Insurance is a technical and supervisory qualification for insurance staff working across all sectors of the industry, and the logical progression from the Certificate in Insurance. The Diploma will provide you with a firm understanding of insurance fundamentals and will enable you to build towards advanced technical knowledge, thereby ensuring you have the means to function effectively in a challenging environment. Motor Insurance (M94) unit counts towards a Diploma in Insurance, it may also count towards the Advanced Diploma in Insurance. This training program provides an understanding of the risks faced by the various types of motor vehicles and the legal requirements associated with motor insurance. It includes relevant case law and an overview of the different types of motor insurance products available from the general insurance market.

                                                                                                                                                                    Details
                                                                                                                                                                    We value your feedback

                                                                                                                                                                    Dear visitor, we hope that you will participate in improving and developing the services provided by the academy on the website.

                                                                                                                                                                    Was it easy to find what you were looking for on the Academy's website?
                                                                                                                                                                    Was the information presented on the Academy’s website sufficient and useful?
                                                                                                                                                                    Please share with us your suggestions for developing the website
                                                                                                                                                                    Thank you!