SANS Institute LDR512 Brochure
SANS Institute LDR512 Brochure
SANS Institute LDR512 Brochure
SECTION 1: Building Your Security Program SECTION 4: Security Management and Who Should Attend
The course starts with a tour of the information that effective Leadership • CISOs
security managers and leaders must know to function in the Section 4 covers what managers need to know • Information security officers
modern security environment. This includes an understanding about leading security initiatives. Every security
of the different types of cybersecurity frameworks available • Security directors
leader should know how to build a vulnerability
to structure your security team and program. Risk is central to management program and the associated process to • Security managers
effective information security management, so we’ll discuss key successfully find and fix vulnerabilities. Additionally, • Aspiring security leaders
risk concepts in order to lay the foundation for effective risk security awareness is a huge component of any
assessment and management. Security policy is a key tool that • Security personnel who have team
security program that helps drive activities to change
security managers use to manage risk. We’ll cover approaches to lead or management responsibilities
human behavior and create a more risk-aware and
policy to help you plan and manage your policy process. Finally, security-aware culture. To implement new initiatives, • Anyone who wants to go beyond
we’ll discuss security functions, reporting relationships, and security leaders must also develop negotiation skills technical skills
roles and responsibilities to give the advancing manager a view and conduct thorough analysist of vendors. Finally, • Technical professionals who want to
into effective security team and program structure. for any project or initiative, security leaders must also learn to communicate with senior
TOPICS: Security Frameworks; Understanding Risk; Security be able to drive effective project execution. Having leaders in business terms
Policy; Program Structure a well-grounded understanding of the management
and leadership practices makes it easier to move
your projects forward.
SECTION 2: Technical Security Architecture TOPICS: Vulnerability Management; Security
NICE Framework Work Roles
Section 2 provides coverage of traditional and modern security Awareness; Negotiations Primer; Vendor Analysis; • Information Systems Security
architectures focused on technical topics. This includes a Managing and Leading Teams Manager (OPM 722)
thorough discussion of network security that is modeled around • Cyber Workforce Developer and
the various layers of the network stack. As modern attacks are Manager (OPM 751)
also focused on the computing devices we cover malware and SECTION 5: Detecting and Responding
• Cyber Policy and Strategy Planner
attack examples along with corresponding host security controls to Attacks (OPM 752)
for the endpoint and server. The cloud is a major initiative that
Section 5 focuses on detection and response
many organizations is changing the way organizations operate • Executive Cyber Leadership (OPM 901)
capabilities. This includes gaining appropriate
and design their controls. To get ready for these initiatives, we • Program Manager (OPM 801)
visibility via logging, monitoring, and strategic
provide an overview of Amazon Web Services (AWS) to serve as a
thinking about a security information and event • IT Project Manager (OPM 802)
reference point and discuss key cloud security issues. The cloud,
management (SIEM) system. Once implemented,
the rise of mobile devices, and other factors are highlighting
the logs in a SIEM are a core component of any
weaknesses in traditional, perimeter-oriented security
Security Operations Center (SOC). We’ll discuss the
architecture which leads into a discussion of the Zero Trust Model.
key functions of a SOC along with how to manage
TOPICS: Security Architecture Overview; Network Security; and organize your organization’s security operations.
Host Security; Cloud Security; Identity and Access Management; The incident response process is discussed in
Zero Trust relation to identifying, containing, eradicating, and
recovering from security incidents. This leads into
a discussion of longer-term business continuity
SECTION 3: Security Engineering planning and disaster recovery. Managers must also “This course is great
Section 3 focuses on security engineering best practices. This understand physical security controls that, when content for leaders within
includes building an understanding of cryptography concepts, not implemented appropriately, can cause technical
encryption algorithms, and applications of cryptography which security controls to fail or be bypassed. the field. It pushes people
are foundational elements of building any secure system. TOPICS: Logging and Monitoring; Security Operations to stop always focusing
Since encrypting data alone is not sufficient, we discuss the Center (SOC); Incident Handling; Contingency
distinction between privacy and security to give managers Planning; Physical Security
on the technical aspects
a primer on key privacy concepts. Managers must also be of cybersecurity and
knowledgeable about software development processes, issues,
and application vulnerabilities. We cover application security really understand what
and leading development processes built on DevSecOps. Current
engineering approaches also include modern infrastructure as
the business needs from
code approaches and tools to automate consistent deployment its security function as
of standard configurations. Finally, generative AI has led to the
growth of AI usage and newer Large Language Model application a whole to enable the
architectures which need to be secured. business.”
TOPICS: Security Engineering; Data Protection; Privacy Primer;
—Alexander Walker, TechVets
Application Security; Privacy Engineering