top of page
bg01.jpg

CYBER FOR MANAGERS

bg02.jpg

AUDIENCE

  • Security Managers 

  • Newly appointed information security officers 

  • Recently promoted security leaders who want to build a security foundation for leading and building teams

  • Technically skilled security administrators who have recently been given leadership responsibilities 

  • Team leads with responsibility for a specific security function who want to understand what other teams are doing 

PRE-REQUISITES

Candidates with basic understanding of technology, networks, and security

LOCATION

  • Online

  • Face to face (bootcamp)

  • Hybrid

  • Train-the-Trainer

bg03.jpg

DESCRIPTION

Managers need cyber methodology knowledge together with technical and management skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan, act, prepare and manage security projects, incidents and initiatives. 
This is a big and important job that requires an understanding of a wide array of security topics. 
This course empowers you to become an effective manager and get up to speed quickly on information security issues and terminology. You won't just learn about security; you will learn how to manage security. 
Cyber for managers course covers a wide range of security topics across the entire security stack. Data, network, host, application, and user controls are covered in conjunction with key management topics that address the overall security lifecycle, including governance and technical controls focused on protecting, detecting, and responding to security issues.

COURSE OBJECTIVES

The approach of this course will prepare you to:

  • Make sense of different cybersecurity frameworks 

  • Understand and analyze risk 

  • Understand the pros and cons of different reporting relationships 

  • Manage technical personnel 

  • Build a vulnerability management program 

  • Effectively manage security projects 

  • Enable modern security architectures and the cloud 

  • Prepare your organization to handle with privacy and security regulations

bg01.jpg

COURSE SYLLABUS

bottom of page