Program Brief

Dive into the world of cybersecurity leadership with our LDR512: Security Leadership Essentials for Managers program, designed specifically for professionals aiming to elevate their security management skills. This comprehensive program not only covers the fundamentals of building and managing a security program but also delves into the intricacies of risk assessment, policy development, and technical security architecture. By participating in our program, you'll gain the confidence to navigate the complex landscape of cybersecurity frameworks and controls. You’ll learn to identify vulnerabilities and implement proactive defenses against emerging threats. Our curriculum, crafted by industry experts, emphasizes real-world applicability, ensuring that you can apply what you've learned directly to your day-to-day operations. You'll also master cybersecurity strategic planning, develop policies that resonate with your team, and lead with assurance during critical cybersecurity incidents. Understanding the pivotal role of compliance, this program guides you through the legal and regulatory standards affecting cybersecurity, preparing you to lead your organization with integrity and foresight. Through engaging lectures, hands-on exercises, and real-world simulations, LDR512 offers a dynamic learning environment that fosters practical skills and strategic thinking. Join our network of cybersecurity professionals committed to excellence and take your leadership capabilities to the next level. Whether you're an aspiring manager or looking to strengthen your current leadership role, this program is designed to enhance your career and contribute significantly to your organization's security and resilience.

Program Goals

At the end of the training program, the participant should be able to:

  • in the knowledge and skills necessary to pass the LDR512® exam.
  • Navigate and implement various security frameworks, enhancing their ability to build robust security programs within their organizations.
  • Gain proficiency in identifying, assessing, and managing cybersecurity risks to make informed security decisions and prioritize resources effectively.
  • Learn to create, manage, and enforce security policies that align with organization’s risk appetite and compliance requirements.
  • Acquire the skills to design and evaluate technical security architectures, ensuring a secure infrastructure across network, cloud, and application layers.
  • Understand the process of identifying, prioritizing, and mitigating vulnerabilities to strengthen organization’s defense against cyber threats.
  • Enhance skills & capabilities to effectively manage and lead cybersecurity teams, fostering a culture of security awareness and resilience.
  • Master the art of strategic cybersecurity planning, including developing, implementing, and maintaining a comprehensive security program.
  • Equip yourself with the knowledge and skills to effectively manage and respond to cybersecurity incidents, minimizing their impact on business operations.
  • Understand the legal and regulatory landscape affecting cybersecurity, ensuring organization’s security practices comply with applicable laws and standards.
Program Agenda
Module 1: Building Your Security Program
  • 1 Security Frameworks

    • Control, Program, and Risk Frameworks

    • 2 Understanding Risk

      • Risk Concepts

        • Calibration

          • Risk Assessment and Management

          • 3 Security Policy

            • Purpose of Policy

              • Risk Appetite Statement

                • Policy Planning

                  • Managing Policy

                  • 4 Program Structure

                    • Reporting Relationships

                      • Three Lines of Defense

                        • Roles and Responsibilities

                          • Security Functions

                          • 5 Exercises:

                            • Cyber42 Watt's Warehouse Company Overview

                              • Calibration Lab

                                • Cyber42 Round 1 Initiative Selection

                                  • Cyber42 Round 1 Event 1: Whither Watt's Warehouse

                                    • Cyber42 Round 1 Event 2: Institutionalizing Security

                                      • Cyber42 Round 1 Event 3: Board Briefing

                                      Module 2: Technical Security Architecture
                                      • 1 Security Architecture Overview

                                        • Models and Trends

                                          • Security Architecture Frameworks

                                            • Cyber Defense Matrix

                                            • 2 Network Security

                                              • Layer 1 and 2

                                                • Overview and Attacks

                                              • Layer 3

                                                • VPNs and IPSec

                                              • Layer 4

                                                • TCP and UDP

                                              • Application Layer

                                                • Proxies, NGFW, IDS/IPS, NSM

                                            • 3 Host Security

                                              • Malware and Attack Examples

                                                • Host Security Controls

                                                  • EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing

                                              • 4 Cloud Security

                                                • Cloud Security Fundamentals

                                                  • AWS Security Reference Architecture

                                                    • AWS Overview

                                                      • Cloud Security Attack Example and Controls

                                                        • Cloud Security Tools

                                                          • CSPM, CWPP, CASB

                                                        • Cloud Security Models

                                                          • Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks

                                                      • 5 Identity and Access Management (IAM)

                                                        • Authentication Factors

                                                          • Authentication and Access Attacks

                                                            • IAM Security Capabilities

                                                            • 6 Zero Trust

                                                              • Principles and Best Practices

                                                                • Zero Trust Network Access (ZTNA)

                                                                  • Variable Trust

                                                                  • 7 Exercises:

                                                                    • Cyber42 Round 1 Event 4: Network Security Implementation

                                                                      • Cyber42 Round 1 Event 5: End User Security

                                                                        • Cyber42 Round 1 Event 6: To Serve and Protect

                                                                        Module 3: Security Engineering
                                                                        • 1 Security Engineering

                                                                          • Overview

                                                                          • 2 Data Protection

                                                                            • Cryptography Concepts

                                                                              • Confidentiality, Integrity, Authentication, Non-Repudiation

                                                                            • Encryption Algorithms

                                                                              • Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature

                                                                            • Encryptions Applications

                                                                              • TLS, PKI, Blockchain, Quantum

                                                                          • 3 Privacy Primer

                                                                            • Privacy and Security

                                                                              • Requirements and Regulations

                                                                                • Privacy Engineering

                                                                                • 4 Application Security

                                                                                  • Secure SDLC

                                                                                    • Application Attacks

                                                                                      • OWASP Top Ten

                                                                                    • Application Security Tools

                                                                                      • SAST, SCA, DAST, WAF, RASP

                                                                                  • 5 DevSecOps

                                                                                    • DevOps Toolchain and Pipeline

                                                                                      • Continuous Integrations and Continuous Delivery (CI / CD)

                                                                                        • Infrastructure as Code (IaC)

                                                                                          • Container Security

                                                                                          • 6 Generative AI and Large Language Models (GenAI and LLMs)

                                                                                            • Innovations in Artificial Intelligence

                                                                                              • LLM Application Architecture

                                                                                                • AWS Generative AI Security Scoping Matrix

                                                                                              • LLM Attacks

                                                                                                • OWASP Top Ten for LLMs

                                                                                                • MITRE ATLAS

                                                                                                • Overreliance, Prompt Injection, Sensitive Information Disclosure, Model Theft, Training Data Poisoning, Excessive Agency, Jailbreaking

                                                                                              • GenAI Security Controls

                                                                                                • NIST AI Risk Management Framework (RMF)

                                                                                                • AI Security Policy

                                                                                                • AI Security Tools and Mitigations

                                                                                            • 7 Exercises:

                                                                                              • Cyber42 Round 2 Initiative Selection

                                                                                                • Cyber42 Round 2 Event 7: Industry Breach

                                                                                                  • Cyber42 Round 2 Event 8: Shadow IT

                                                                                                    • Cyber42 Round 2 Event 9: Security Misconfiguration

                                                                                                      • Cyber42 Round 2 Event 10: Miracle on DevOps Way

                                                                                                      Module 4: Security Management and Leadership
                                                                                                      • 1 Vulnerability Management

                                                                                                        • PIACT Process

                                                                                                          • Prioritizing Vulnerabilities

                                                                                                            • Common Vulnerability Scoring System (CVSS)

                                                                                                          • Finding and Fixing Vulnerabilities

                                                                                                            • Communicating and Managing Vulnerabilities

                                                                                                            • 2 Security Awareness

                                                                                                              • Maturity Model

                                                                                                                • Human Risks

                                                                                                                • 3 Negotiations Primer

                                                                                                                  • Negotiations Strategies

                                                                                                                  • 4 Vendor Analysis

                                                                                                                    • Product Analysis and Selection

                                                                                                                      • Analytical Hierachy Process (AHP)

                                                                                                                      • 5 Managing and Leading Teams

                                                                                                                        • Managing Projects

                                                                                                                          • Leading Teams

                                                                                                                            • Going From Good to Great

                                                                                                                            • 6 Exercises:

                                                                                                                              • Cyber42 Round 3 Initiative Selection

                                                                                                                                • Cyber42 Round 3 Event 11: Patching Problems

                                                                                                                                  • Cyber42 Round 3 Event 12: Let It Be Known!

                                                                                                                                    • Cyber42 Round 3 Event 13: Tough Negotiations

                                                                                                                                      • Cyber42 Round 3 Event 14: Managing Resistance

                                                                                                                                      Module 5: Detecting and Responding to Attacks
                                                                                                                                      • 1 Logging and Monitoring

                                                                                                                                        • SIEM Deployment Best Practices

                                                                                                                                        • 2 Security Operations Center (SOC)

                                                                                                                                          • SOC Functional Components

                                                                                                                                            • Models and Structure

                                                                                                                                              • Tiered vs. Tierless SOCs

                                                                                                                                                • Managing and Organizing a SOC

                                                                                                                                                • 3 Incident Handling

                                                                                                                                                  • PICERL Process

                                                                                                                                                    • Incident Handling Lifecycle

                                                                                                                                                    • 4 Contingency Planning

                                                                                                                                                      • Business Continuity Planning (BCP)

                                                                                                                                                        • Disaster Recovery (DR)

                                                                                                                                                        • 5 Physical Security

                                                                                                                                                          • Issues and Controls

                                                                                                                                                          • 6 Exercises:

                                                                                                                                                            • Cyber42 Round 4 Initiative Selection

                                                                                                                                                              • Cyber42 Round 4 Event 15: New Guy in Town

                                                                                                                                                                • Cyber42 Round 4 Event 16: Cost Cutting

                                                                                                                                                                  • Cyber42 Round 4 Event 17: Ransomware Response

                                                                                                                                                                    • Cyber42 Round 4 Event 18: Opportunity Knocks

                                                                                                                                                                    Program Requirements

                                                                                                                                                                    Not Available

                                                                                                                                                                    Program Path

                                                                                                                                                                    Names of the training programs that are integrated (enriched) with the training program:

                                                                                                                                                                    • Not Available

                                                                                                                                                                    Names of the training programs that after the training program:

                                                                                                                                                                    • Not Available
                                                                                                                                                                    Program Method
                                                                                                                                                                    • Lecture
                                                                                                                                                                    • Practical Implementation
                                                                                                                                                                    • Exercises and assignments
                                                                                                                                                                    Evaluation Method
                                                                                                                                                                    • Simulation Test for professional exam
                                                                                                                                                                    Training Type
                                                                                                                                                                    • In Class Training

                                                                                                                                                                    Add Comment

                                                                                                                                                                    CAPTCHA

                                                                                                                                                                    Realted Program

                                                                                                                                                                    Portfolio Management

                                                                                                                                                                    Investment opportunities in the financial markets allow you to choose between the shares of many companies listed in the financial markets, and they are usually exposed to different levels of risk and varying levels of returns. Given that the investment options available to the investor are many and different and may reach dozens of stocks and investment funds; This program has been designed to build and manage investment portfolios in line with the types and requirements of investors in the financial market according to the different models for managing the risks related to them to achieve the targeted returns for investors.

                                                                                                                                                                    Details

                                                                                                                                                                    Planning and Innovation Skills

                                                                                                                                                                    Innovative thinking and planning are among the most important tasks in the business system. Innovation is an urgent necessity for continuity and growth. This program focuses on identifying the strengths, weaknesses, opportunities, and threats facing the organization. In addition to defining goals, how to formulate them and building plans according to the administrative level, identifying the elements of the planning process and integrating innovative thinking in the planning stages to ensure creative results.

                                                                                                                                                                    Details

                                                                                                                                                                    Risk Based Internal Audit Plan Preparation

                                                                                                                                                                    The risk-based internal audit plan plays a vital role in financial institutions by analyzing and evaluating potential financial and operational risks, thereby enhancing compliance with financial laws and regulations, and contributing to making sound strategic decisions that ensure sustainability and success. This program provides participants with the best practices and tools for Risk Based Audit planning aligned with the organization's strategic objectives. Participants will be exposed to international best practices for internal control systems’ and governance frameworks’ assessment to enable participants to help their organizations to improve the effectiveness and efficiency of the control operations and increase the likelihood of achieving those strategic objectives.

                                                                                                                                                                    Details

                                                                                                                                                                    IPO Masterclass for Professionals

                                                                                                                                                                    A company's IPO is one of the biggest strategic decisions it can make during its financial lifespan and is considered the best way to raise capital and expand in the future. Due to the rapid growth of the financial markets، private companies were able to obtain liquidity، expand their shareholder base، and introduce radical structural and operational changes through public offerings. This training program aims to prepare participants with the knowledge، skills، and tools necessary to originate & execute IPOs. This training program aims to prepare participants with the knowledge، skills، and tools necessary to originate & execute IPOs.

                                                                                                                                                                    Details

                                                                                                                                                                    Fundamentals of Internal Auditing

                                                                                                                                                                    The internal audit contributes to verifying that the establishment is committed to implementing the internal control systems represented by the policies and procedures established by the management; in order to protecting the assets of the facility and ensuring that it achieves its operational objectives. This program provides participants with the fundamental requirements of internal auditing, starting with the modern concept of internal audit, then standards and procedures for carrying out audit tasks, preparing the plan, designing worksheets, selecting samples, collecting evidences and documentation, and then preparing internal audit reports.

                                                                                                                                                                    Details

                                                                                                                                                                    Anti-Money Laundering and Terrorist Financing- Advanced Level

                                                                                                                                                                    Fighting money laundering and terrorist financing is a priority for the international community; since these financial crimes threaten the integrity and stability of the financial system and the economy in general, they can also affect the integrity and stability of financial institutions, discourage foreign investment, and distort international flows. As a result, the affected country experiences dire financial instability and poor economic performance. This program deeply explains AML & CTF standards and respective risk management in financial institutions. The program also explains pertinent local and international legislations and leading practices, as well as, the preparation and implementation of ML and TF risk-based programs, including “Know Your Customer” and “Customer Due Diligence” requirements.

                                                                                                                                                                    Details

                                                                                                                                                                    Underwriting Practice (M80)- Dip. CII

                                                                                                                                                                    The Diploma in Insurance is a technical and supervisory qualification for insurance staff working across all sectors of the industry, and the logical progression from the Certificate in Insurance. The Diploma will provide you with a firm understanding of insurance fundamentals and will enable you to build towards advanced technical knowledge, thereby ensuring you have the means to function effectively in a challenging environment. Underwriting Practice (M80) unit counts towards a Diploma in Insurance, it may also count towards the Advanced Diploma in Insurance. Through this training program, participants will understand the principles and practices of underwriting and the environment within which they operate.

                                                                                                                                                                    Details

                                                                                                                                                                    CMA Advance Qualification Examination in Compliance

                                                                                                                                                                    This training program is to provide participants with knowledge and skills necessary to pass the Advanced Qualification Exam in Compliance, presented by the CMA and TFA. The exam is tailored for CMA-licensed compliance and AML officers. This program is designed to familiarize participants with the regulatory environment for financial services as well as local and international regulations, as well as to promote compliance & governance culture, understanding of risks, and shows how to establish an effective compliance function, in addition to identifying key skills in combating main financial crimes.

                                                                                                                                                                    Details

                                                                                                                                                                    Private Investing: From Inception to IPO

                                                                                                                                                                    This comprehensive training program, "Private Investing: From Inception to IPO," is designed to provide participants with an in-depth understanding of the private investment landscape. Spanning three days, the program covers the full spectrum of early-stage investment processes in the financial sector. Participants will gain valuable insights into evaluating investment opportunities, conducting due diligence, and assessing risks. The program delves into the roles of venture capital and private equity in scaling financial businesses, highlighting the importance of governance and ethical practices in preparing for an IPO.

                                                                                                                                                                    Details

                                                                                                                                                                    Credit Analysis and Decision-Making Mechanisms

                                                                                                                                                                    Choosing the right credit decision is the first line of defense for preserving lenders' capital, protecting creditors, and maximizing profitability for the bank. In this program, the participant gets familiar with the stages of credit decision-making according to the approved credit policy, the latest strategies for analyzing and calculating credit risks, local and international controls and standards, to be able to make a correct and successful credit decision that controls the expected risks.

                                                                                                                                                                    Details

                                                                                                                                                                    Preparing Financial Reports

                                                                                                                                                                    The financial reports issued by the facility are considered as the outputs of its accounting system through which the results of the financial events related to the reporting period are presented and that help the beneficiaries of those reports to judge the state of the facility in terms of financial balance and the structure of financing the acquisition of assets, as well as showing its ability to generate revenue, and enables them From the analysis of the cost component structure. This training program is designed to provide participants with the knowledge and skills necessary to read and understand the components of financial reports and how to prepare them, and to review the most important presentation and disclosure requirements for international accounting standards and financial reporting standards.

                                                                                                                                                                    Details

                                                                                                                                                                    Effective Manager

                                                                                                                                                                    Effective management has always been an important part of the working life of employees, as motivation, enthusiasm and productivity are closely related to how efficient and effective a manager is. The manager is not only responsible for the management’s output and reports, but also the responsibility of supporting and empowering employees by understanding their needs, motives, and guiding them in areas where they need to develop. The best leaders are those who communicate effectively with their employees and have high levels of emotional intelligence. So, what are some characteristics of an effective manager and how should he motivate and empower his employees and team members to achieve the best results? This training program focuses on effective management methods and basic skills for managers, as well as a review of the concepts and methods of guidance and how to set smart goals for employees, in addition to identifying motivation methods and its obstacles, and addressing the challenges facing managers to increase their ability to empower employees and direct them towards achieving the organization's desired goals.

                                                                                                                                                                    Details

                                                                                                                                                                    CMA Advanced Qualification Examination in AML/CTF

                                                                                                                                                                    This training program is to provide participants with knowledge and skills necessary to pass the Advanced Qualification Exam in AML/CTF, presented by the CMA and TFA. The exam is designed for CMA-licensed compliance and AML officers. This program is tailored to familiarize participants with AMC/CTF international and KSA efforts, as well as the National AML Framework. It also provides participants with key AML/CTF skills, identifies Customer Due Diligence and suspicious activities reporting.

                                                                                                                                                                    Details

                                                                                                                                                                    Digitalisation of Fund Management

                                                                                                                                                                    This comprehensive program is designed to explore the transformative impact of technology on the fund management industry over the past two decades. This course will provide an in-depth overview of both technology and regulatory trends, highlighting key changes that have shaped the digital era. We will delve into enduring themes such as data, resilience, and connectivity, and discuss the importance of regulatory consistency. The program will also examine the implications of real-time connectivity, including the necessary technological and policy frameworks, obstacles, and risks, and how these can be leveraged in fund management for strategy, trading, risk management, and liquidity management. We will take a closer look at distributed ledger technologies (DLT), assessing their progress, limitations, and potential for liquidity management. Additionally, we will cover global regulatory trends with a focus on transparency and ESG. A dedicated section on AI will explore its applications, challenges, and opportunities in the investment world. Finally, we will address the organizational and operational challenges in a rapidly evolving landscape, emphasizing risk and governance, talent management, and the importance of building a learning organization.

                                                                                                                                                                    Details
                                                                                                                                                                    We value your feedback

                                                                                                                                                                    Dear visitor, we hope that you will participate in improving and developing the services provided by the academy on the website.

                                                                                                                                                                    Was it easy to find what you were looking for on the Academy's website?
                                                                                                                                                                    Was the information presented on the Academy’s website sufficient and useful?
                                                                                                                                                                    Please share with us your suggestions for developing the website
                                                                                                                                                                    Thank you!