This curriculum spans the design and operationalization of enterprise security controls across governance, identity, network, endpoint, cloud, and human risk domains, comparable in scope to a multi-phase security transformation program involving policy development, technology integration, and cross-functional process alignment.
Module 1: Security Governance and Risk Management Frameworks
- Establishing a risk appetite statement aligned with executive leadership and board oversight requirements
- Selecting and customizing a regulatory compliance framework (e.g., NIST CSF, ISO 27001) to match organizational maturity and industry obligations
- Conducting third-party risk assessments for vendors with access to critical systems or data
- Implementing a formal risk register with quantified likelihood and impact scoring for prioritization
- Defining roles and responsibilities across RACI matrices for security policies and incident response
- Reviewing and updating security policies annually with legal, compliance, and IT stakeholders
Module 2: Identity and Access Management (IAM) Architecture
- Designing role-based access control (RBAC) structures that reflect organizational hierarchy and least privilege principles
- Integrating multi-factor authentication (MFA) across cloud and on-premises applications with fallback mechanisms for break-glass accounts
- Implementing just-in-time (JIT) access for privileged users using identity governance tools
- Automating user provisioning and deprovisioning workflows across Active Directory, SaaS platforms, and HR systems
- Enforcing periodic access reviews for high-privilege roles with documented attestation from managers
- Migrating legacy shared accounts to individual accountable identities with session monitoring
Module 3: Network Security Infrastructure Design
- Segmenting network zones using firewalls and VLANs to isolate critical assets (e.g., PCI, R&D)
- Deploying next-generation firewalls with deep packet inspection and application-layer filtering rules
- Configuring secure remote access via IPsec or SSL VPNs with endpoint compliance checks
- Implementing netflow or packet capture systems for forensic network traffic analysis
- Managing firewall rule lifecycle including change control, rule deprecation, and audit logging
- Hardening perimeter DNS servers against cache poisoning and DDoS amplification attacks
Module 4: Endpoint Detection and Response (EDR) Operations
- Selecting EDR agents based on OS coverage, telemetry depth, and resource consumption benchmarks
- Creating custom detection rules for suspicious behaviors such as process injection or lateral movement
- Responding to EDR alerts with live memory and disk acquisition for compromised hosts
- Integrating EDR telemetry with SIEM for centralized correlation and case management
- Managing agent deployment, patching, and rollback procedures across global endpoints
- Conducting purple team exercises to validate EDR detection efficacy and reduce false positives
Module 5: Security Information and Event Management (SIEM) Configuration
- Normalizing and parsing log sources from heterogeneous systems (firewalls, servers, cloud services)
- Developing correlation rules to detect multi-stage attack patterns (e.g., failed logins followed by success)
- Archiving raw logs in compliance with data retention policies and legal hold requirements
- Optimizing SIEM performance by filtering low-value events and tuning data ingestion rates
- Mapping MITRE ATT&CK techniques to detection rules for threat-informed monitoring
- Granting tiered access to SIEM consoles with audit trails for analyst activity
Module 6: Cloud Security Posture and Workload Protection
- Configuring cloud provider security services (e.g., AWS GuardDuty, Azure Security Center) with alerting to SOC
- Enforcing Infrastructure-as-Code (IaC) scanning in CI/CD pipelines to prevent misconfigurations
- Implementing workload protection platforms (CWP) for runtime threat detection in containers
- Managing encryption keys for cloud storage using customer-managed key (CMK) services
- Establishing secure cross-account access patterns using role chaining and boundary policies
- Monitoring public cloud storage buckets and databases for unintended exposure via automated scanners
Module 7: Incident Response and Digital Forensics
- Activating incident response playbooks based on incident classification (e.g., ransomware, data exfiltration)
- Preserving volatile data from affected systems using forensically sound collection methods
- Coordinating communication with legal, PR, and regulatory bodies during active incidents
- Conducting root cause analysis using timeline reconstruction and artifact correlation
- Engaging external forensic firms under legal privilege for breach investigations
- Updating detection and prevention controls based on post-incident review findings
Module 8: Security Awareness and Insider Threat Programs
- Designing phishing simulation campaigns with escalating complexity and targeted user groups
- Developing role-specific training content for finance, HR, and executive staff
- Deploying user and entity behavior analytics (UEBA) to detect anomalous data access patterns
- Integrating DLP systems with email and cloud storage to prevent unauthorized data transfers
- Establishing cross-functional review boards for investigating potential insider threats
- Logging and reviewing privileged user activity, including database queries and file access