This curriculum spans the design and operationalization of enterprise security programs comparable to multi-workshop advisory engagements, covering governance, identity, infrastructure, cloud, incident response, data protection, human risk, and architecture initiatives typically led by senior security teams within large organisations.
Module 1: Security Governance and Risk Management Frameworks
- Establish a risk appetite statement aligned with board-level business objectives and regulatory requirements.
- Select and adapt a control framework (e.g., NIST CSF, ISO 27001) based on industry-specific compliance obligations.
- Define ownership of critical data assets across business units and assign data stewards.
- Conduct annual risk assessments using threat modeling and asset valuation methodologies.
- Negotiate security clauses in third-party contracts, including audit rights and breach notification timelines.
- Implement a formal exception management process for control deviations with executive approval.
Module 2: Identity and Access Management at Scale
- Design role-based access control (RBAC) structures integrated with HR systems for automated provisioning.
- Enforce multi-factor authentication (MFA) policies across cloud and on-premises applications with risk-based exemptions.
- Implement just-in-time (JIT) access for privileged accounts using identity governance tools.
- Conduct quarterly access reviews for high-privilege roles with documented attestations.
- Integrate identity providers (IdPs) across hybrid environments using SAML or OIDC standards.
- Respond to orphaned accounts by automating deprovisioning workflows upon employee offboarding.
Module 3: Enterprise Network and Infrastructure Security
- Architect micro-segmentation policies in data centers to limit lateral movement during breaches.
- Deploy and manage next-generation firewalls with deep packet inspection and TLS decryption.
- Enforce network access control (NAC) for IoT and contractor devices using 802.1X or certificate-based authentication.
- Maintain an accurate network topology inventory with automated discovery tools.
- Configure DNS filtering and sinkholing to block command-and-control traffic.
- Implement secure VLAN designs with strict inter-zone routing policies and logging.
Module 4: Cloud Security and Shared Responsibility Models
- Map security controls to the shared responsibility model for AWS, Azure, or GCP environments.
- Configure cloud storage buckets with least-privilege access and versioning enabled.
- Deploy cloud security posture management (CSPM) tools to detect misconfigurations in real time.
- Encrypt data at rest using customer-managed keys in cloud key management systems.
- Enforce infrastructure-as-code (IaC) scanning in CI/CD pipelines to prevent insecure deployments.
- Monitor cloud API activity using native logging services and set alerts for anomalous actions.
Module 5: Threat Detection and Incident Response
- Deploy endpoint detection and response (EDR) agents with behavioral analytics enabled.
- Configure SIEM correlation rules to detect lateral movement and data exfiltration patterns.
- Conduct tabletop exercises simulating ransomware and insider threat scenarios.
- Establish an incident response playbook with defined roles, communication trees, and escalation paths.
- Preserve forensic evidence using write-blockers and chain-of-custody documentation.
- Coordinate with legal and PR teams before disclosing breaches to regulators or the public.
Module 6: Data Protection and Privacy Compliance
- Classify data based on sensitivity (e.g., PII, IP, financial) using automated discovery tools.
- Implement data loss prevention (DLP) policies on endpoints, email gateways, and cloud apps.
- Encrypt databases containing regulated data and manage key rotation schedules.
- Conduct data protection impact assessments (DPIAs) for new system implementations.
- Respond to data subject access requests (DSARs) within regulatory timeframes (e.g., GDPR, CCPA).
- Audit data retention and deletion processes to ensure compliance with policy.
Module 7: Security Awareness and Human Risk Management
- Develop role-specific training content for finance, HR, and executive teams.
- Launch simulated phishing campaigns with progressive difficulty and targeted follow-up training.
- Measure behavior change using metrics such as click rates and reporting rates over time.
- Integrate security KPIs into performance reviews for IT and security staff.
- Address shadow IT by establishing a formal application approval process with business units.
- Manage insider threat risks through user behavior analytics and HR collaboration.
Module 8: Security Architecture and Technology Integration
- Design zero trust network access (ZTNA) solutions to replace traditional VPNs for remote users.
- Integrate security tools via APIs to enable automated threat response workflows.
- Evaluate point solutions against enterprise architecture standards for scalability and supportability.
- Consolidate security consoles to reduce analyst fatigue and improve mean time to respond (MTTR).
- Enforce secure configuration baselines using configuration management databases (CMDBs).
- Perform architecture reviews for major IT projects before funding approval.