Objective
Security leaders need both technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. This course empowers you to become an effective security leader and get up to speed quickly on information security issues and terminology. You won't just learn about security, you will learn how to lead security teams and manage programs.
What You Will Learn
Take this course to learn the key elements of any modern security program. it covers a wide range of security topics across the entire security stack. Learn to quickly grasp critical information security issues and terminology, with a focus on security frameworks, security architecture, security engineering, computer/network security, vulnerability management, cryptography, data protection, security awareness, application security, cloud security, and security operations.
BUSINESS TAKEAWAYS:
- Develop leaders that know how to build a modern security program.
- Anticipate what security capabilities need to build to enable the business and mitigate threats
- Create higher performing security teams.
SKILLS LEARNED:
- Make sense of different cybersecurity frameworks
- Understand and analyze risk.
- Understand the pros and cons of different reporting relationships.
- Manage and lead technical teams and projects.
- Build a vulnerability management program.
- Inject security into modern DevOps workflows.
- Strategically leverage a SIEM
- Lead a Security Operations Center (SOC)
- Change behavior and build a security-aware culture.
- Effectively manage security projects
- Enable modern security architectures and the cloud.
- Build security engineering capabilities using automation and Infrastructure as Code (IaC)
- Get up to speed quickly on information security issues and terminology.
- Establish a minimum standard of security knowledge, skills, and abilities.
- Speak the same language as technical security professionals.
Topics
- Security Frameworks
- Control, Program, and Risk Frameworks
- Understanding Risk
- Risk Concepts
- Calibration
- Risk Assessment and Management
- Security Policy
- Purpose of Policy
- Risk Appetite Statement
- Policy Planning
- Managing Policy
- Program Structure
- Reporting Relationships
- Three Lines of Defense
- Roles and Responsibilities
- Security Functions
- Security Architecture Overview
- Models and Trends
- Security Architecture Frameworks
- Cyber Defense Matrix
- Network Security
- Layer 1 and 2
- Layer 3
- Layer 4
- Application Layer
- Proxies, NGFW, IDS/IPS, NSM
- Host Security
- Malware and Attack Examples
- Host Security Controls
- EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing
- Cloud Security
- Cloud Security Fundamentals
- AWS Security Reference Architecture
- AWS Overview
- Cloud Security Attack Example and Controls
- Cloud Security Tools
- Cloud Security Models
- Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks
- Zero Trust
- Principles and Best Practices
- Zero Trust Network Access (ZTNA)
- Variable Trust
- Security Engineering
- Data Protection
- Cryptography Concepts
- Confidentiality, Integrity, Authentication, Non-Repudiation
- Encryption Algorithms
- Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature
- Encryption Applications
- TLS, PKI, Blockchain, Quantum
- Privacy Primer
- Privacy and Security
- Requirements and Regulations
- Privacy Engineering
- Vulnerability Management
- PIACT Process
- Prioritizing Vulnerabilities
- Common Vulnerability Scoring System (CVSS)
- Finding and Fixing Vulnerabilities
- Communicating and Managing Vulnerabilities
- Security Awareness
- Maturity Model
- Human Risks
- Negotiations Primer
- Vendor Analysis
- Product Analysis and Selection
- Analytical Hierachy Process (AHP)
- Managing and Leading Teams
- Managing Projects
- Leading Teams
- Going From Good to Great
- Logging and Monitoring
- SIEM Deployment Best Practices
- Security Operations Center (SOC)
- SOC Functional Components
- Models and Structure
- Tiered vs. Tierless SOCs
- Managing and Organizing a SOC
- Incident Handling
- PICERL Process
- Incident Handling Lifecycle
- Contingency Planning
- Business Continuity Planning (BCP)
- Disaster Recovery (DR)
- Physical Security