Skip to main content

Security Management in IT Operations Management

$249.00
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
Adding to cart… The item has been added

This curriculum spans the design and operationalization of enterprise security programs with the breadth and technical specificity typical of multi-phase advisory engagements, covering governance, identity, infrastructure, cloud, and human factors across 48 implementation-focused practices.

Module 1: Security Governance and Risk Management Frameworks

  • Establishing a risk register aligned with ISO/IEC 27001 and NIST CSF, including ownership, likelihood, impact, and mitigation timelines.
  • Defining roles and responsibilities across RACI matrices for security decision-making involving IT, legal, and business units.
  • Conducting annual risk assessments with business impact analysis (BIA) to prioritize controls based on critical systems and data.
  • Negotiating acceptable risk thresholds with executive stakeholders when remediation costs exceed perceived business impact.
  • Integrating third-party vendor risk assessments into procurement workflows with mandatory security questionnaires and audit rights.
  • Maintaining documented exception processes for control waivers, including justification, compensating controls, and expiration dates.

Module 2: Identity and Access Management (IAM) Implementation

  • Designing role-based access control (RBAC) structures that reflect organizational hierarchy and job function, avoiding role explosion.
  • Implementing just-in-time (JIT) access for privileged accounts using privileged access management (PAM) tools with approval workflows.
  • Enforcing multi-factor authentication (MFA) across cloud and on-premises systems, including fallback mechanisms for break-glass accounts.
  • Automating user provisioning and deprovisioning via SCIM or HR feed integrations to reduce orphaned accounts.
  • Conducting quarterly access reviews with system owners to validate continued access necessity for all users.
  • Managing shared service account risks by eliminating static credentials and rotating secrets using vault solutions.

Module 3: Security Operations and Monitoring

  • Configuring SIEM correlation rules to reduce false positives while maintaining detection coverage for lateral movement and data exfiltration.
  • Establishing log retention policies that balance compliance requirements (e.g., PCI DSS 1-year) with storage cost constraints.
  • Defining escalation paths and SLAs for incident response teams based on incident severity levels.
  • Deploying EDR agents across endpoints with performance tuning to minimize user impact on legacy systems.
  • Integrating threat intelligence feeds into SOAR platforms to automate IOC lookups and enrich alerts.
  • Conducting tabletop exercises to validate detection coverage and response playbooks for ransomware and insider threats.

Module 4: Network and Infrastructure Security

  • Segmenting network zones using firewalls and VLANs to isolate critical systems (e.g., payment processing, HR databases).
  • Enforcing zero-trust principles by implementing micro-segmentation for east-west traffic in virtualized environments.
  • Hardening network devices via configuration baselines (e.g., DISA STIGs) and automated compliance scanning.
  • Managing firewall rule lifecycle with regular reviews to remove stale rules and prevent rulebase bloat.
  • Deploying DNS filtering and secure web gateways to block access to known malicious domains and phishing sites.
  • Configuring secure remote access using IPsec or SSL VPNs with endpoint compliance checks before granting network access.

Module 5: Cloud Security and Shared Responsibility Models

  • Mapping cloud provider responsibilities (e.g., AWS, Azure) to internal controls using shared responsibility matrix documentation.
  • Enforcing encryption of data at rest and in transit across cloud storage services using customer-managed keys (CMKs).
  • Implementing cloud security posture management (CSPM) tools to detect misconfigurations in IAM, storage, and network settings.
  • Restricting public access to cloud storage buckets and databases through policy-as-code (e.g., AWS SCPs, Azure Policies).
  • Designing secure hybrid connectivity between on-premises and cloud environments using Direct Connect or ExpressRoute.
  • Applying tagging standards across cloud resources to enable cost tracking, ownership assignment, and security policy enforcement.

Module 6: Incident Response and Business Continuity

  • Developing and maintaining an incident response plan with defined roles, communication templates, and legal reporting obligations.
  • Creating forensic imaging procedures that preserve chain of custody for evidence in regulatory or legal investigations.
  • Establishing data backup schedules and retention policies aligned with RPO and RTO requirements for critical systems.
  • Testing backup restoration processes annually to validate recoverability and data integrity.
  • Coordinating with external parties (e.g., law enforcement, forensic firms, insurers) under pre-approved engagement agreements.
  • Conducting post-incident reviews to update controls and playbooks based on root cause analysis findings.

Module 7: Compliance, Audits, and Regulatory Alignment

  • Mapping security controls to multiple regulatory frameworks (e.g., GDPR, HIPAA, SOX) to avoid redundant audits.
  • Preparing for external audits by compiling evidence packages with system configurations, access logs, and policy documents.
  • Responding to audit findings with remediation plans that include timelines, resource allocation, and verification steps.
  • Implementing data classification policies to identify and protect sensitive information across storage and transmission channels.
  • Managing data subject access requests (DSARs) under GDPR with defined workflows for identification, retrieval, and redaction.
  • Conducting internal compliance scans using automated tools to detect deviations from configuration baselines and policies.

Module 8: Security Awareness and Change Management

  • Designing role-specific security training content for developers, finance staff, and executives based on risk exposure.
  • Scheduling phishing simulation campaigns with progressive difficulty to measure and improve user detection rates.
  • Tracking completion rates and assessment scores for mandatory training, with escalation to HR for non-compliance.
  • Integrating security checkpoints into change management processes to assess risk before deploying system modifications.
  • Engaging business units in security decisions through cross-functional working groups to reduce resistance to controls.
  • Measuring security culture through annual surveys and using results to adjust communication and training strategies.