This course aims to develop and hone the business and technical skills to elevate cybersecurity professional into executive leadership roles, such as Chief Information Security Officer (CISO), Head of Cyber Security, and Cyber Security Architect. Industry-driven scenarios and case studies will be provided during the training. By completing the course, learners can enhance their job prospects and increase their chances of job promotions or upgrading their current roles to more strategic and leadership positions. This course is designed for intermediate to advanced learners who already have a foundational understanding of cybersecurity concepts.
Course Objectives
By the end of the course, the learner will be able to:
- Develop a cyber security governance and risk management program that aligns with business objectives.
- Manage the implementation of organisation’s cyber security program and cyber security operations.
- Review organisation’s information cyber defense against potential cyber attacks.
- Develop strategic cyber plan align to business goals complete with propose budget plan.
Course Outline
Lesson 1: Information Security Governance and Strategy
- What is Security Landscape and emerging security threat
- Information Security Drivers
- Laws, Regulations, and Industry Standards as Drivers of Organisation
- Security Strategy and Cyber Readiness/Posture
- Security Governance Program
- Security Management Structure
- Security Policy, Standards, and Procedures
- Enterprise Information Security Compliance Program
Lesson 2: Security Information Program and Security Operations
- Cyber Risk Assessment and the impact for Organizations
- Security Testing Policies and Activities
- Security Program Development
- Incident Response Plans
- Cyber Threat Management
- Threat Hunting and Detection
- Patch Management and Vulnerability Assessment
Lesson 3: Security Controls, Compliance, and Audit Management
- What is Cyber Threats and the business impact
- Industry Control Frameworks
- Assess Security Posture Through Security Audits and Assessments
- Reputation and Financial Risk through Compliance Audits
- Assess Security Risk, Governance, and Security Controls
- Assess Threats and Anomaly Through Continuous Security Monitoring
Lesson 4: Cyber Defense Management
- What are Cyber Security Landscape and Cybersecurity Defence
- System Authorisation through Access Control Models
- Overview of Endpoint Security to protect servers and desktop
- Overview of Application Security with Secure Software Design
- Overview of Corporate Network Security
- Overview of Physical Security to tighten physical assess
- Overview of Cloud Security for cloud applications
Lesson 5: Strategic Planning with Financial and Procurement
- Strategic Planning
- Designing, Developing, and Maintaining an Enterprise Information Security
Program - Cybersecurity Procurement
- Vendor Risk Management
- Cybersecurity Budgeting and Financial Management
- Contract and SLA Management
Lesson 6: Cyber Risk Management
- Cyber Risk Assessment Methodologies
- Industry Risk Management Frameworks
- Cyber Risk Management Plan and Program
- Response Strategies for addressing Cyber Risk
- Cyber Risk Treatment and Control Implementation
Course Duration
Course: 36 hours
Assessment: 1 hour