This curriculum spans the design and operational execution of enterprise security programs, comparable in scope to a multi-phase advisory engagement covering governance, technical controls, and human factors across complex organisational environments.
Module 1: Security Governance and Risk Management Frameworks
- Establishing a risk register aligned with ISO/IEC 27005 and NIST SP 800-30, including asset valuation and threat likelihood scoring.
- Defining board-level reporting metrics for security posture, such as mean time to detect (MTTD) and percentage of critical systems under continuous monitoring.
- Conducting third-party risk assessments for vendors with access to sensitive data, including contract clauses for audit rights and breach notification timelines.
- Implementing a formal risk acceptance process requiring documented sign-off from business owners and CISO for exceptions to security policy.
- Aligning security controls with business objectives by mapping control implementation to operational impact and regulatory requirements.
- Designing an information classification schema (e.g., Public, Internal, Confidential, Restricted) and enforcing labeling and handling procedures across departments.
Module 2: Identity and Access Management (IAM) Architecture
- Deploying role-based access control (RBAC) with periodic access reviews, including automated deprovisioning for terminated employees.
- Integrating privileged access management (PAM) solutions for just-in-time elevation and session recording of administrative accounts.
- Implementing multi-factor authentication (MFA) across all remote access points, with fallback mechanisms for high-availability systems.
- Designing federated identity systems using SAML or OIDC for secure cross-domain access with partners and cloud providers.
- Enforcing least privilege by analyzing user entitlements and removing excessive permissions through access certification campaigns.
- Managing service account lifecycle, including rotation of credentials and monitoring for anomalous usage patterns.
Module 4: Network and Endpoint Security Deployment
- Segmenting corporate networks using VLANs and firewalls to isolate critical systems (e.g., HR, finance) from general user traffic.
- Deploying next-generation firewalls with deep packet inspection and application-aware rules to block command-and-control traffic.
- Enforcing device compliance through endpoint detection and response (EDR) agents, including real-time threat hunting capabilities.
- Configuring host-based firewalls and disabling unnecessary services on workstations and servers according to CIS benchmarks.
- Implementing DNS filtering to prevent access to known malicious domains and phishing sites at the resolver level.
- Managing secure remote access via zero trust network access (ZTNA) instead of traditional VPNs for contractor and third-party access.
Module 5: Incident Response and Threat Intelligence Operations
- Developing and maintaining a cyber incident response plan with defined roles, communication trees, and escalation paths.
- Conducting tabletop exercises simulating ransomware, data exfiltration, and insider threat scenarios with legal and PR stakeholders.
- Integrating threat intelligence feeds (e.g., STIX/TAXII) into SIEM systems to enrich alerts with contextual indicators of compromise.
- Establishing a secure evidence chain for forensic data collection, including disk imaging and memory dumps under legal hold procedures.
- Coordinating with law enforcement and regulatory bodies during active breaches, including timely reporting under GDPR or HIPAA.
- Performing root cause analysis post-incident and updating controls to prevent recurrence, documented in a formal after-action report.
Module 6: Data Protection and Encryption Strategies
- Implementing data loss prevention (DLP) systems to monitor and block unauthorized transfers of sensitive data via email, web, or USB.
- Deploying full-disk encryption on all corporate laptops and enforcing pre-boot authentication with recovery key escrow.
- Using tokenization or masking for production data used in non-production environments to prevent exposure during testing.
- Applying application-layer encryption for sensitive fields (e.g., SSNs, credit card numbers) in databases and APIs.
- Managing cryptographic key lifecycle using hardware security modules (HSMs) with separation of duties for key generation and access.
- Classifying data at rest and in transit to determine appropriate encryption standards (e.g., AES-256, TLS 1.3) based on sensitivity.
Module 7: Security Awareness and Insider Threat Programs
- Designing role-specific security training content for executives, developers, and finance teams based on risk exposure.
- Conducting simulated phishing campaigns with follow-up coaching for users who fail, tracked over time for improvement.
- Monitoring privileged user activity for anomalies using UEBA tools to detect potential data exfiltration or sabotage.
- Establishing a confidential reporting channel for employees to report suspicious behavior without fear of retaliation.
- Integrating HR offboarding procedures with IT to ensure immediate revocation of access upon termination.
- Assessing organizational culture factors that may contribute to insider threats, such as employee dissatisfaction or burnout.
Module 8: Compliance, Audits, and Continuous Monitoring
- Preparing for external audits (e.g., SOC 2, ISO 27001) by maintaining documented evidence of control implementation and testing.
- Configuring SIEM systems to aggregate logs from critical systems and generate alerts based on correlation rules for suspicious activity.
- Performing regular vulnerability scans and prioritizing remediation based on exploitability and asset criticality.
- Implementing file integrity monitoring (FIM) on system-critical files and configuration files to detect unauthorized changes.
- Conducting internal compliance assessments to validate adherence to internal policies and regulatory mandates.
- Establishing a continuous improvement cycle for security controls using metrics such as patch latency and control coverage gaps.