This curriculum spans the design and operational execution of enterprise security controls across governance, identity, network, endpoint, cloud, and data domains, reflecting the multi-quarter implementation cycles and cross-functional coordination seen in large-scale IT security programs.
Module 1: Security Governance and Risk Management Frameworks
- Establishing a risk register aligned with NIST CSF or ISO 27001, including ownership, likelihood, impact scoring, and mitigation timelines.
- Defining roles and responsibilities in a RACI matrix for security incidents, audits, and policy enforcement across IT and business units.
- Conducting annual risk assessments that integrate threat intelligence, asset inventories, and business impact analysis.
- Negotiating acceptable risk thresholds with executive stakeholders during board-level risk committee meetings.
- Implementing a policy lifecycle management process that includes version control, review schedules, and attestation workflows.
- Integrating third-party vendor risk assessments into procurement workflows with standardized security questionnaires and audit rights.
Module 2: Identity and Access Management (IAM) in Enterprise Systems
- Designing role-based access control (RBAC) structures in Active Directory or cloud IAM platforms that reflect organizational hierarchy and least privilege.
- Enforcing multi-factor authentication (MFA) across remote access, administrative consoles, and SaaS applications using conditional access policies.
- Implementing automated provisioning and deprovisioning workflows via SCIM or HRIS integrations to reduce orphaned accounts.
- Managing privileged access using Just-In-Time (JIT) and Just-Enough-Access (JEA) principles with PAM solutions like CyberArk or BeyondTrust.
- Conducting quarterly access reviews for high-privilege roles with documented attestations from data owners.
- Responding to access anomalies detected by UEBA tools through integration with SIEM and ticketing systems.
Module 3: Secure Network Architecture and Segmentation
- Designing network zones (e.g., DMZ, internal, management) with firewall rules that enforce least privilege and are regularly audited.
- Implementing micro-segmentation in virtualized environments using VMware NSX or cloud-native tools like AWS Security Groups.
- Configuring logging and monitoring for all perimeter and internal firewalls to detect lateral movement and policy violations.
- Deploying network access control (NAC) systems to enforce device compliance before granting network access.
- Maintaining an up-to-date network diagram that reflects segmentation boundaries and security controls for audit purposes.
- Managing encrypted traffic inspection using SSL/TLS decryption policies while balancing privacy and performance concerns.
Module 4: Endpoint Security and Device Hardening
- Standardizing endpoint configurations using CIS benchmarks and deploying them via MDM or configuration management tools.
- Enforcing full-disk encryption on all corporate laptops and mobile devices with centralized key escrow procedures.
- Deploying EDR solutions with real-time monitoring, threat hunting capabilities, and automated response playbooks.
- Managing patch compliance for operating systems and third-party applications using automated patch management systems.
- Implementing application whitelisting or allowlisting policies to prevent execution of unauthorized binaries.
- Responding to compromised endpoints by isolating devices, collecting forensic artifacts, and initiating incident response protocols.
Module 5: Cloud Security and Shared Responsibility Models
- Mapping security controls to the shared responsibility model in AWS, Azure, or GCP to clarify ownership of configuration and monitoring tasks.
- Configuring cloud storage buckets with encryption, access logging, and public access blocking enabled by default.
- Implementing infrastructure-as-code (IaC) scanning tools to detect security misconfigurations in Terraform or CloudFormation templates.
- Establishing cloud security posture management (CSPM) workflows to continuously monitor compliance with security baselines.
- Managing secrets in cloud environments using dedicated vaults (e.g., HashiCorp Vault, AWS Secrets Manager) instead of hardcoded credentials.
- Designing cross-account access policies in multi-cloud environments with centralized logging and identity federation.
Module 6: Security Monitoring, Detection, and Incident Response
- Configuring SIEM correlation rules to detect suspicious activities such as failed logins, data exfiltration, or privilege escalation.
- Establishing a 24/7 SOC operating model with shift handovers, escalation paths, and integration with IT service management tools.
- Developing and testing incident response playbooks for common scenarios like ransomware, phishing, or insider threats.
- Conducting tabletop exercises with IT, legal, and PR teams to validate communication and containment procedures.
- Preserving chain of custody for digital evidence during forensic investigations in accordance with legal requirements.
- Integrating threat intelligence feeds into detection systems to prioritize alerts based on known IOCs and TTPs.
Module 7: Data Protection and Privacy Compliance
- Classifying data assets by sensitivity (e.g., public, internal, confidential) and applying encryption and access controls accordingly.
- Implementing DLP solutions to monitor and block unauthorized transfers of sensitive data via email, web, or USB.
- Mapping data flows across systems to support GDPR, CCPA, or other privacy regulation compliance efforts.
- Configuring database activity monitoring to log and alert on high-risk queries or schema changes.
- Managing data retention and secure disposal processes in alignment with legal hold and records management policies.
- Conducting privacy impact assessments (PIAs) for new applications or system integrations that process personal data.
Module 8: Security in Change and Configuration Management
- Integrating security reviews into the change advisory board (CAB) process for high-risk infrastructure or application changes.
- Automating configuration drift detection using tools like Ansible, Puppet, or AWS Config to maintain secure baselines.
- Requiring security sign-off for changes involving firewall rules, IAM policies, or database schema modifications.
- Enforcing segregation of duties between developers, operations, and security teams in deployment pipelines.
- Logging and auditing all configuration changes with immutable logs stored in a centralized repository.
- Performing post-implementation reviews for critical changes to verify security controls were not inadvertently disabled.