Dive into the world of cybersecurity leadership with our LDR512: Security Leadership Essentials for Managers program, designed specifically for professionals aiming to elevate their security management skills. This comprehensive program not only covers the fundamentals of building and managing a security program but also delves into the intricacies of risk assessment, policy development, and technical security architecture. By participating in our program, you'll gain the confidence to navigate the complex landscape of cybersecurity frameworks and controls. You’ll learn to identify vulnerabilities and implement proactive defenses against emerging threats. Our curriculum, crafted by industry experts, emphasizes real-world applicability, ensuring that you can apply what you've learned directly to your day-to-day operations. You'll also master cybersecurity strategic planning, develop policies that resonate with your team, and lead with assurance during critical cybersecurity incidents. Understanding the pivotal role of compliance, this program guides you through the legal and regulatory standards affecting cybersecurity, preparing you to lead your organization with integrity and foresight. Through engaging lectures, hands-on exercises, and real-world simulations, LDR512 offers a dynamic learning environment that fosters practical skills and strategic thinking. Join our network of cybersecurity professionals committed to excellence and take your leadership capabilities to the next level. Whether you're an aspiring manager or looking to strengthen your current leadership role, this program is designed to enhance your career and contribute significantly to your organization's security and resilience.
At the end of the training program, the participant should be able to:
1 Security Frameworks
Control, Program, and Risk Frameworks
2 Understanding Risk
Risk Concepts
Calibration
Risk Assessment and Management
3 Security Policy
Purpose of Policy
Risk Appetite Statement
Policy Planning
Managing Policy
4 Program Structure
Reporting Relationships
Three Lines of Defense
Roles and Responsibilities
Security Functions
5 Exercises:
Cyber42 Watt's Warehouse Company Overview
Calibration Lab
Cyber42 Round 1 Initiative Selection
Cyber42 Round 1 Event 1: Whither Watt's Warehouse
Cyber42 Round 1 Event 2: Institutionalizing Security
Cyber42 Round 1 Event 3: Board Briefing
1 Security Architecture Overview
Models and Trends
Security Architecture Frameworks
Cyber Defense Matrix
2 Network Security
Layer 1 and 2
Overview and Attacks
Layer 3
VPNs and IPSec
Layer 4
TCP and UDP
Application Layer
Proxies, NGFW, IDS/IPS, NSM
3 Host Security
Malware and Attack Examples
Host Security Controls
EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing
4 Cloud Security
Cloud Security Fundamentals
AWS Security Reference Architecture
AWS Overview
Cloud Security Attack Example and Controls
Cloud Security Tools
CSPM, CWPP, CASB
Cloud Security Models
Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks
5 Identity and Access Management (IAM)
Authentication Factors
Authentication and Access Attacks
IAM Security Capabilities
6 Zero Trust
Principles and Best Practices
Zero Trust Network Access (ZTNA)
Variable Trust
7 Exercises:
Cyber42 Round 1 Event 4: Network Security Implementation
Cyber42 Round 1 Event 5: End User Security
Cyber42 Round 1 Event 6: To Serve and Protect
1 Security Engineering
Overview
2 Data Protection
Cryptography Concepts
Confidentiality, Integrity, Authentication, Non-Repudiation
Encryption Algorithms
Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature
Encryptions Applications
TLS, PKI, Blockchain, Quantum
3 Privacy Primer
Privacy and Security
Requirements and Regulations
Privacy Engineering
4 Application Security
Secure SDLC
Application Attacks
OWASP Top Ten
Application Security Tools
SAST, SCA, DAST, WAF, RASP
5 DevSecOps
DevOps Toolchain and Pipeline
Continuous Integrations and Continuous Delivery (CI / CD)
Infrastructure as Code (IaC)
Container Security
6 Generative AI and Large Language Models (GenAI and LLMs)
Innovations in Artificial Intelligence
LLM Application Architecture
AWS Generative AI Security Scoping Matrix
LLM Attacks
OWASP Top Ten for LLMs
MITRE ATLAS
Overreliance, Prompt Injection, Sensitive Information Disclosure, Model Theft, Training Data Poisoning, Excessive Agency, Jailbreaking
GenAI Security Controls
NIST AI Risk Management Framework (RMF)
AI Security Policy
AI Security Tools and Mitigations
7 Exercises:
Cyber42 Round 2 Initiative Selection
Cyber42 Round 2 Event 7: Industry Breach
Cyber42 Round 2 Event 8: Shadow IT
Cyber42 Round 2 Event 9: Security Misconfiguration
Cyber42 Round 2 Event 10: Miracle on DevOps Way
1 Vulnerability Management
PIACT Process
Prioritizing Vulnerabilities
Common Vulnerability Scoring System (CVSS)
Finding and Fixing Vulnerabilities
Communicating and Managing Vulnerabilities
2 Security Awareness
Maturity Model
Human Risks
3 Negotiations Primer
Negotiations Strategies
4 Vendor Analysis
Product Analysis and Selection
Analytical Hierachy Process (AHP)
5 Managing and Leading Teams
Managing Projects
Leading Teams
Going From Good to Great
6 Exercises:
Cyber42 Round 3 Initiative Selection
Cyber42 Round 3 Event 11: Patching Problems
Cyber42 Round 3 Event 12: Let It Be Known!
Cyber42 Round 3 Event 13: Tough Negotiations
Cyber42 Round 3 Event 14: Managing Resistance
1 Logging and Monitoring
SIEM Deployment Best Practices
2 Security Operations Center (SOC)
SOC Functional Components
Models and Structure
Tiered vs. Tierless SOCs
Managing and Organizing a SOC
3 Incident Handling
PICERL Process
Incident Handling Lifecycle
4 Contingency Planning
Business Continuity Planning (BCP)
Disaster Recovery (DR)
5 Physical Security
Issues and Controls
6 Exercises:
Cyber42 Round 4 Initiative Selection
Cyber42 Round 4 Event 15: New Guy in Town
Cyber42 Round 4 Event 16: Cost Cutting
Cyber42 Round 4 Event 17: Ransomware Response
Cyber42 Round 4 Event 18: Opportunity Knocks
Not Available
Names of the training programs that are integrated (enriched) with the training program:
Names of the training programs that after the training program:
Add Comment