Skip to main content

Information Security in Technical management

$249.00
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
How you learn:
Self-paced • Lifetime updates
When you get access:
Course access is prepared after purchase and delivered via email
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Adding to cart… The item has been added

This curriculum spans the design and operationalization of enterprise security programs with the breadth and technical specificity typical of a multi-workshop advisory engagement for mid-to-large organizations undergoing digital transformation.

Module 1: Security Governance and Risk Management Frameworks

  • Establishing a risk appetite statement aligned with board-level business objectives and regulatory exposure
  • Selecting and tailoring a compliance framework (e.g., NIST CSF, ISO 27001, or CIS Controls) based on industry sector and audit requirements
  • Conducting third-party risk assessments for cloud service providers using standardized questionnaires (e.g., CAIQ or SIG)
  • Implementing a risk register with quantified likelihood and impact metrics for executive reporting
  • Defining roles and responsibilities across CISO, legal, and business unit leaders in a RACI matrix for security incidents
  • Negotiating cyber insurance terms with underwriters based on current control maturity and historical breach data

Module 2: Identity and Access Management at Scale

  • Designing role-based access control (RBAC) structures that balance least privilege with operational efficiency in hybrid environments
  • Integrating enterprise identity providers (e.g., Azure AD, Okta) with legacy on-premises applications using SAML or SCIM
  • Enforcing multi-factor authentication (MFA) policies with adaptive risk scoring for high-value systems
  • Automating user provisioning and deprovisioning workflows across SaaS platforms using identity governance tools
  • Managing privileged access for third-party vendors through time-bound, audited jump hosts or PAM solutions
  • Conducting quarterly access reviews for sensitive data repositories with documented business justifications

Module 3: Secure Network Architecture and Zero Trust Implementation

  • Segmenting corporate networks using micro-segmentation policies in virtualized data centers
  • Replacing traditional perimeter firewalls with zero trust network access (ZTNA) for remote workforce connectivity
  • Enforcing DNS filtering and TLS inspection at the edge to prevent data exfiltration and malware callbacks
  • Deploying network detection and response (NDR) sensors to monitor east-west traffic for lateral movement
  • Negotiating firewall rule change processes that require peer review and change ticket justification
  • Designing secure hybrid cloud connectivity between on-premises infrastructure and AWS/Azure using encrypted transit gateways

Module 4: Endpoint Security and Device Hardening

  • Standardizing endpoint detection and response (EDR) agent deployment across Windows, macOS, and Linux fleets
  • Enforcing disk encryption, firmware password protection, and secure boot policies on corporate devices
  • Implementing application allow-listing on critical servers to prevent unauthorized code execution
  • Configuring mobile device management (MDM) profiles to enforce passcode policies and remote wipe capabilities
  • Managing patch compliance for operating systems and third-party software using automated deployment schedules
  • Responding to compromised endpoint alerts by isolating devices and initiating forensic memory capture

Module 5: Cloud Security and Configuration Management

  • Applying infrastructure-as-code (IaC) scanning tools to detect misconfigurations in Terraform or CloudFormation templates
  • Enabling cloud-native logging (e.g., AWS CloudTrail, Azure Monitor) with centralized SIEM ingestion
  • Implementing least privilege IAM policies in cloud environments using policy-as-code frameworks
  • Conducting regular reviews of public cloud storage bucket permissions to prevent data exposure
  • Integrating container security scanning into CI/CD pipelines for Kubernetes workloads
  • Establishing cloud security posture management (CSPM) dashboards for continuous compliance monitoring

Module 6: Incident Response and Threat Intelligence Integration

  • Activating incident response playbooks for ransomware events, including communication protocols and system isolation steps
  • Coordinating with legal and PR teams during breach disclosure to meet GDPR, HIPAA, or CCPA notification timelines
  • Deploying threat intelligence feeds (e.g., STIX/TAXII) to enrich SIEM correlation rules with IOCs
  • Conducting tabletop exercises with cross-functional teams to validate IR plan effectiveness
  • Preserving forensic evidence from affected systems in a chain-of-custody-compliant manner
  • Engaging third-party forensic firms under legal privilege for major incidents involving regulated data

Module 7: Secure Software Development Lifecycle (SDLC) Integration

  • Embedding security champions within development teams to review architecture and threat models
  • Integrating static application security testing (SAST) tools into CI pipelines with defined pass/fail criteria
  • Conducting threat modeling sessions for new applications using STRIDE or PASTA methodologies
  • Managing open-source software (OSS) risk through SBOM generation and vulnerability scanning tools
  • Enforcing secure coding standards for input validation, authentication, and session management
  • Performing penetration testing on production-like environments prior to major releases

Module 8: Security Metrics, Reporting, and Executive Communication

  • Defining key security performance indicators (KPIs) such as mean time to detect (MTTD) and patch latency
  • Translating technical vulnerabilities into business risk terms for board-level dashboards
  • Aligning security investment decisions with risk reduction outcomes using cost-benefit analysis
  • Conducting maturity assessments using models like CMMI or OWASP ASVS to prioritize improvement areas
  • Reporting on control effectiveness to auditors using evidence from automated compliance tools
  • Adjusting security strategy based on industry threat landscape shifts and emerging attack trends