LDR512 : Security Leadership Essentials for Managers

Security leaders need both technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This security managers training course will teach leaders about the key elements of any modern security program. Learn to quickly grasp critical cybersecurity issues and terminology, with a focus on security frameworks, security architecture, security engineering, computer/network security, vulnerability management, cryptography, data protection, security awareness, cloud security, application security, DevSecOps, generative AI (GenAI) security, and security operations. This is more than security training. You will learn how to lead security teams and manage programs by playing through twenty-three Cyber42 activities throughout the class, approximately 60-80 minutes daily.

Ways to Learn

  • Cybersecurity learning – at YOUR pace! OnDemand provides unlimited access to your training wherever, whenever. All labs, exercises, and live support from SANS subject matter experts included.

The full SANS experience live at home! Get the ultimate in virtual, interactive SANS courses with leading SANS instructors via live stream. Following class, plan to kick back and enjoy a keynote from the couch

Did someone say ALL-ACCESS? On-site immersion via in-classroom course sessions led by world-class SANS instructors fill your day, while bonus receptions and workshops fill your evenings.

Instructor-led live online classes

LDR512 : Security Leadership Essentials for Managers

Instructor-led live online Training 

$9999  $8200

Who Should Attend LDR512?

  • CISOs
  • Information security officers
  • Security directors
  • Security managers
  • Aspiring security leaders
  • Security personnel who have team lead or management responsibilities
  • Anyone who wants to go beyond technical skills
  • Technical professionals who want to learn to communicate with senior leaders in business terms

NICE Framework Work Roles:

  • Information Systems Security Manager (OPM 722)
  • Cyber Workforce Developer and Manager (OPM 751)
  • Cyber Policy and Strategy Planner (OPM 752)
  • Executive Cyber Leadership (OPM 901)
  • Program Manager (OPM 801)
  • IT Project Manager (OPM 802)

 

“This course is great content for Leaders within the field. It pushes people to stop always focusing on the technical aspects of Cyber security and really understand what the business needs from its security function as a whole to enable the business.” – Alexander Walker, TechVet

Training Features

Live Interactive Learning

Lifetime Access

24x7 Support

Hands-On Project Based Learning

Industry Recognized Certification

Cloud

What You Will Learn

Take this security management course to learn the key elements of any modern security program. LDR512 covers a wide range of security topics across the entire security stack. Learn to quickly grasp critical information security issues and terminology, with a focus on security frameworks, security architecture, security engineering, computer/network security, vulnerability management, cryptography, data protection, security awareness, cloud security, application security, DevSecOps, generative AI (GenAI) security, and security operations.

The training course uses the Cyber42 leadership simulation game to put you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work. Throughout the class you will participate in twenty-three Cyber42 activities.

“This is an excellent primer for management types. I come from a technical background and can see the value there plain as day.” – Matt Zaycer, Pilot Flying J

Security management is all about managing information risk. This means that you need the appropriate level of technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. Being an effective security leader requires you to get up to speed quickly on information security issues and terminology to build a modern security program. Creating a high performing security team means that you can anticipate what security capabilities need to built to enable the business and mitigate threats.

This course will help your organization:

  • Develop leaders that know how to build a modern security program
  • Anticipate what security capabilities need to built to enable the business and mitigate threats
  • Create higher performing security teams
  • Make sense of different cybersecurity frameworks
  • Understand and analyze risk
  • Decipher the pros and cons of different reporting relationships
  • Manage and lead technical teams and projects
  • Build a vulnerability management program
  • Inject security into modern DevOps workflows
  • Strategically leverage a SIEM
  • Lead a Security Operations Center (SOC)
  • Change behavior and build a security-aware culture
  • Effectively manage security projects
  • Enable modern security architectures and the cloud
  • Build security engineering capabilities using automation and Infrastructure as Code (IaC)
  • Understand and secure generative AI (GenAI) services
  • Get up to speed quickly on information security issues and terminology
  • Establish a minimum standard of security knowledge, skills, and abilities
  • Speak the same language as technical security professionals

This leadership focused security training course uses case scenarios, group discussions, team-based exercises, in-class games, and a security leadership simulation to help students absorb both technical and management topics. About 60-80 minutes per day is dedicated to these learning experiences using the Cyber42 leadership simulation game.

This leadership simulation game is a continuous tabletop exercise where students play to improve security culture, manage budget and schedule, and improve security capabilities at a fictional organization. This puts you in real-world scenarios that spur discussion and critical thinking of situations that you will encounter at work.

  • Section 1: Cyber42 Watt’s Warehouse Company Overview, Calibration Lab, Round 1 Initiative Selection, Events 1-3: Whither Watt’s Warehouse, Institutionalizing Security, Board Briefing
  • Section 2: Cyber42 Round 1 Events 4-6: Network Security Implementation, End User Security, To Serve and Protect
  • Section 3: Cyber42 Round 2 Initiative Selection, Round 2 Events 7-10: Industry Breach, Shadow IT, Security Misconfiguration, Miracle on DevOps Way
  • Section 4: Cyber42 Round 3 Initiative Selection, Round 3 Events 11-14: Patching Problems, Let It Be Known!, Tough Negotiations, Managing Resistance
  • Section 5: Cyber42 Round 4 Initiative Selection, Round 4 Events 15-18: New Guy in Town, Cost Cutting, Ransomware Response, Opportunity Knocks

“Cyber42 was an amazing game and experience. Not only building connection with our peers, but also creating a rich dialogue. More importantly, the sharing and decision analysis really helped us learn the materials more effectively.” – Jay Bhalodia, Microsoft

“Labs reinforce everything you learn during the lessons and makes the teams think on how to proceed.” – German Regalado, CNRMC

“It’s a fun game. It makes me think through the process before making a decision. There is a lot to consider.” – Peter H., Law Enforcement

Course Details

The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle.

  • Building a security program that meets business needs
  • Managing security operations and teams
  • Managing security projects and the lifecycle of the program

This security management course covers the core areas of security leadership and assumes a basic understanding of technology, networks, and security. For those who are new to the field and have no background knowledge, the recommended starting point is the SEC301: Introduction to Information Security course. While SEC301 is not a prerequisite, it will provide the introductory knowledge to maximize the experience with LDR512.

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

MANDATORY LDR512 SYSTEM REQUIREMENTS
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
  • A laptop or mobile device with the latest web browser is required to play the Cyber42 leadership simulation game.
  • The Cyber42 game used in this course is hosted in the cloud. Students must have a computer that does not restrict access to the ranges.io web site. Corporate machines may have a VPN, intercepting proxy, or egress firewall filter that causes connection issues communicating with certain web sites. Students must be able to configure or disable these services to access the Cyber42 game.

If you have additional questions about the laptop specifications, please contact support.

  • “This course covers all the topics I should have known before I started my first security management job. I was thrust into a leadership position and realized I had to convey security concepts in ways that non-technical people could understand. At the same time, I needed a broad view of everything in the security program and the different domains of cybersecurity. In short, I had to learn about the work of managing security. That is why this course focuses on the big picture of securing the enterprise, from governance and architecture all the way to the technical security topics that serve as the foundation for any security manager. Ultimately, the goal of the course is to ensure that you, the advancing manager, can make informed choices to improve security at your organization.”

    – Frank Kim

    “Frank Kim is an awesome instructor! His teaching style is great and his grasp on the course material, live examples, and ability to bring people together is exceptional!!”  Arvin Bansal, Amerisource Bergen