*Friday CLOSED

Timings 10.00 am - 08.00 pm

Call : 021-3455-6664, 0312-216-9325 DHA 021-35344-600, 03333808376, ISB 03333808376

Leadership Essentials -Security Leadership Essentials for Managers


Be the first to rate Leadership Essentials -Security Leadership Essentials for Managers
Or log in to access your purchased courses
by fatima
Price:  160,000
2 Months/20 Hours
0 Lessons

Leadership Essentials -Security Leadership Essentials for Managers

Leadership Essentials -Security Leadership Essentials for Managers

Security leaders need both technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives.  This security managers training course will teach leaders about the key elements of any modern security program. (Online classes available)

What is Security Management?

Security management is all about managing information risk. This means that you need the appropriate level of technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. Being an effective security leader requires you to get up to speed quickly on information security issues and terminology to build a modern security program. Creating a high performing security team means that you can anticipate what security capabilities need to built to enable the business and mitigate threats
Course Key Learnings: 
  • Make sense of different cybersecurity frameworks
  • Understand and analyze risk
  • Understand the pros and cons of different reporting relationships
  • Manage and lead technical teams and projects
  • Build a vulnerability management program
  • Inject security into modern DevOps workflows
  • Strategically leverage a SIEM
  • Lead a Security Operations Center (SOC)
  • Change behavior and build a security-aware culture
  • Effectively manage security projects
  • Enable modern security architectures and the cloud
  • Build security engineering capabilities using automation and Infrastructure as Code (IaC)
  • Get up to speed quickly on information security issues and terminology
  • Establish a minimum standard of security knowledge, skills, and abilities
  • Speak the same language as technical security professionals

Course Content: Module1: Building Your Security Program
Overview

The course starts with a tour of the information that effective security managers and leaders must know to function in the modern security environment. This includes an understanding of the different types of cybersecurity frameworks available to structure your security team and program. Risk is central to effective information security management, so we’ll discuss key risk concepts in order to lay the foundation for effective risk assessment and management. Security policy is a key tool that security managers use to manage risk. We’ll cover approaches to policy to help you plan and manage your policy process. Finally, we’ll discuss security functions, reporting relationships, and roles and responsibilities to give the advancing manager a view into effective security team and program structure.

Exercises
  • Cyber42 Watt’s Warehouse Company Overview
  • Calibration Lab
  • Cyber42 Round 1 Initiative Selection
  • Cyber42 Round 1 Event #1: Whither Watt’s Warehouse
  • Cyber42 Round 1 Event #2: Institutionalizing Security
  • Cyber42 Round 1 Event #3: Board Briefing
Topics

Security Frameworks

  • Control, Program, and Risk Frameworks

Understanding Risk

  • Risk Concepts
  • Calibration
  • Risk Assessment and Management

Security Policy

  • Purpose of Policy
  • Risk Appetite Statement
  • Policy Planning
  • Managing Policy

Program Structure

  • Reporting Relationships
  • Three Lines of Defense
  • Roles and Responsibilities
  • Security Functions

Module2: : Technical Security Architecture
Overview

Section Two provides coverage of traditional and modern security architectures focused on technical topics. This includes a thorough discussion of network security that is modeled around the various layers of the network stack. As modern attacks are also focused on the computing devices we cover malware and attack examples along with corresponding host security controls for the endpoint and server. The cloud is a major initiative that many organizations is changing the way organizations operate and design their controls. To get ready for these initiatives, we provide an overview of Amazon Web Services (AWS) to serve as a reference point and discuss key cloud security issues. The cloud, the rise of mobile devices, and other factors are highlighting weaknesses in traditional, perimeter-oriented security architecture which leads into a discussion of the Zero Trust Model.

Exercises
  • Cyber42 Round 1 Event #4: Network Security Implementation
  • Cyber42 Round 1 Event #5: End User Security
  • Cyber42 Round 1 Event #6: To Serve and Protect
Topics

1- Security Architecture Overview

  • Models and Trends
  • Security Architecture Frameworks
  • Cyber Defense Matrix

2-Network Security

  • Layer 1 and 2

    • Overview and Attacks
  • Layer 3

    • VPNs and IPSec
  • Layer 4

    • TCP and UDP
  • Application Layer

    • Proxies, NGFW, IDS/IPS, NSM

3- Host Security

  • Malware and Attack Examples
  • Host Security Controls

    • EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing

4- Cloud Security

  • Cloud Security Fundamentals
  • AWS Security Reference Architecture
  • AWS Overview
  • Cloud Security Attack Example and Controls
  • Cloud Security Tools

    • CSPM, CWPP, CASB
  • Cloud Security Models

    • Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks

5- Zero Trust

  • Principles and Best Practices
  • Zero Trust Network Access (ZTNA)
  • Variable Trust

Module3: Security Engineer
Overview

Section Three focuses on security engineering best practices. This includes building an understanding of cryptography concepts, encryption algorithms, and applications of cryptography which are foundational elements of building any secure system. Since encrypting data alone is not sufficient, we discuss the distinction between privacy and security to give managers a primer on key privacy concepts. Managers must also be knowledgeable about software development processes, issues, and application vulnerabilities. We cover application security and leadin development processes built on DevSecOps. Current engineering approaches also include modern Infrastructure as Code (IaC) approaches and tools to automate consistent deployment of standard configurations.

Exercises
  • Cyber42 Round 2 Initiative Selection
  • Cyber42 Round 2 Event #7: Industry Breach
  • Cyber42 Round 2 Event #8: Shadow IT
  • Cyber42 Round 2 Event #9: Security Misconfiguration
  • Cyber42 Round 2 Event #10: Miracle on DevOps Way
Topics

1-Security Engineering

  • Overview

2-Data Protection

  • Cryptography Concepts

    • Confidentiality, Integrity, Authentication, Non-Repudiation
  • Encryption Algorithms

    • Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature
  • Encryption Applications

    • TLS, PKI, Blockchain, Quantum

3-Privacy Primer

  • Privacy and Security
  • Requirements and Regulations

Privacy Engineering


Module4: Security Management & Leadership

Overview

Section Four covers what managers need to know about leading security initiatives. Every security leader should know how to build a vulnerability management program and the associated process to successfully find and fix vulnerabilities. Additionally, security awareness is a huge component of any security program that helps drive activities to change human behavior and create a more risk-aware and security-aware culture. To implement new initiatives, security leaders must also develop negotiation skills and conduct thorough analysist of vendors. Finally, for any project or initiative, security leaders must also be able to drive effective project execution. Having a well-grounded understanding of the management and leadership practices makes it easier to move your projects forward.

Exercises
  • Cyber42 Round 3 Initiative Selection
  • Cyber42 Round 3 Event #11: Patching Problems
  • Cyber42 Round 3 Event #12: Let It Be Known!
  • Cyber42 Round 3 Event #13: Tough Negotiations
  • Cyber42 Round 3 Event #14: Managing Resistance
Topics

1-Vulnerability Management

  • PIACT Process
  • Prioritizing Vulnerabilities

    • Common Vulnerability Scoring System (CVSS)
  • Finding and Fixing Vulnerabilities
  • Communicating and Managing Vulnerabilities

2-Security Awareness

  • Maturity Model
  • Human Risks

3-Negotiations Primer

  • Negotiations Strategies

4-Vendor Analysis

  • Product Analysis and Selection
  • Analytical Hierachy Process (AHP)

5-Managing and Leading Teams

  • Managing Projects
  • Leading Teams
  • Going From Good to Great

Module5: Security Engineering
Overview

Section Five focuses on detection and response capabilities. This includes gaining appropriate visibility via logging, monitoring, and strategic thinking about a security information and event management (SIEM) system. Once implemented, the logs in a SIEM are a core component of any Security Operations Center (SOC). We’ll discuss the key functions of a SOC along with how to manage and organize your organization’s security operations. The incident response process is discussed in relation to identifying, containing, eradicating, and recovering from security incidents. This leads into a discussion of longer-term business continuity planning and disaster recovery. Managers must also understand physical security controls that, when not implemented appropriately, can cause technical security controls to fail or be bypassed.

Exercises
  • Cyber42 Round 4 Initiative Selection
  • Cyber42 Round 4 Event #15: New Guy in Town
  • Cyber42 Round 4 Event #16: Cost Cutting
  • Cyber42 Round 4 Event #17: Ransomware Response
  • Cyber42 Round 4 Event #18: Opportunity Knocks
Topics

1-Logging and Monitoring

  • SIEM Deployment Best Practices

2- Security Operations Center (SOC)

  • SOC Functional Components
  • Models and Structure
  • Tiered vs. Tierless SOCs
  • Managing and Organizing a SOC

3-Incident Handling

  • PICERL Process
  • Incident Handling Lifecycle

4-Contingency Planning

  • Business Continuity Planning (BCP)
  • Disaster Recovery (DR)

5-Physical Security

  • Issues and Controls

Prerequisites

This security management course covers the core areas of security leadership and assumes a basic understanding of technology, networks, and security. For those who are new to the field and have no background knowledge, the recommended starting point is the Introduction to Information Security course.


International Student Fee: 500 US$

Flexible Class Options
  • Week End Classes For Professionals  SAT | SUN
  • Corporate Group Trainings Available
  • Online Classes – Live Virtual Class (L.V.C), Online Training

Related Courses Leadership Essentials -Security Leadership Essentials for Managers
Implementing and Auditing Security Frameworks and Controls
Implementing and Auditing Security Frameworks and Controls
Security Essentials – Network, Endpoint, and Cloud
Hacker Tools, Techniques, and Incident Handlingnternational Student Fee: 500 US$

Stay connected even when you’re apart Join our WhatsApp Channel – Get discount offers  500+ Free Certification Exam Practice Question and Answers  Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities  Join Internships and Referral Program (click for details)  Work as Freelancer or Full-Time Employee (click for details) Hire an Intern
Flexible Class Options
  • Week End Classes For Professionals  SAT | SUN
  • Corporate Group Trainings Available
  • Online Classes – Live Virtual Class (L.V.C), Online Training

Related Courses

Security Awareness – Managing Human Risk

KEY FEATURES

Flexible Classes Schedule

Online Classes for out of city / country students

Unlimited Learning - FREE Workshops

FREE Practice Exam

Internships Available

Free Course Recordings Videos

Register Now

Print Friendly, PDF & Email

Lessons

Or log in to access your purchased courses
ABOUT US

OMNI ACADEMY & CONSULTING is one of the most prestigious Training & Consulting firm, founded in 2010, under MHSG Consulting Group aim to help our customers in transforming their people and business - be more engage with customers through digital transformation. Helping People to Get Valuable Skills and Get Jobs.

Read More

Contact Us

Get your self enrolled for unlimited learning 1000+ Courses, Corporate Group Training, Instructor led Class-Room and ONLINE learning options. Join Now!
  • Head Office: A-2/3 Westland Trade Centre, Shahra-e-Faisal PECHS Karachi 75350 Pakistan Call 0213-455-6664 WhatsApp 0334-318-2845, 0336-7222-191, +92 312 2169325
  • Gulshan Branch: A-242, Sardar Ali Sabri Rd. Block-2, Gulshan-e-Iqbal, Karachi-75300, Call/WhatsApp 0213-498-6664, 0331-3929-217, 0334-1757-521, 0312-2169325
  • ONLINE INQUIRY: Call/WhatsApp +92 312 2169325, 0334-318-2845, Lahore 0333-3808376, Islamabad 0331-3929217, Saudi Arabia 050 2283468
  • DHA Branch: 14-C, Saher Commercial Area, Phase VII, Defence Housing Authority, Karachi-75500 Pakistan. 0213-5344600, 0337-7222-191, 0333-3808-376
  • info@omni-academy.com
  • FREE Support | WhatsApp/Chat/Call : +92 312 2169325
WORKING HOURS

  • Monday10.00am - 7.00pm
  • Tuesday10.00am - 7.00pm
  • Wednesday10.00am - 7.00pm
  • Thursday10.00am - 7.00pm
  • FridayClosed
  • Saturday10.00am - 7.00pm
  • Sunday10.00am - 7.00pm
Select your currency
PKR Pakistani rupee
WhatsApp Us