Health, Safety, Security , Environment Training Courses

Security Leadership Essentials for Managers

Duration
2025-08-17 5 Days 2025-08-21
Attendance

Hotel Meeting Room

Hotel Meeting Room
Course code
HS-768
Copied !
City / venue
Marrakesh

Classroom

Fees / hours
3450 $ | 25 Hours

Course registration form

Candidate Data

Candidate full name *
Email *
Private phone number *

Work phone number

Optional

Country & City *
Company / Employer *

Invoice Recipient Data

Recipient name *
Recipient phone number *
work phone number *

Recipient email

Optional

Recipient work address details

Optional



Sending course brochure to my e-mail

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Email *

Private phone number

Optional



Call me back

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Private phone number *
Company / Employer *


Course Inquiry

Please provide us with your contacts with your inquiry, and we will answer it as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



In-house proposal

Please provide us with your contacts and the details of the needed in-house proposal, and we will contact you as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



Course details

Overview ?

Security leaders need both technical knowledge and leadership skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. This course empowers you to become an effective security leader and get up to speed quickly on information security issues and terminology. You won't just learn about security, you will learn how to lead security teams and manage programs.

What You Will Learn

Leading Security Initiatives to Manage Information Risk

Take this course to learn the key elements of any modern security program. it covers a wide range of security topics across the entire security stack. Learn to quickly grasp critical information security issues and terminology, with a focus on security frameworks, security architecture, security engineering, computer/network security, vulnerability management, cryptography, data protection, security awareness, application security, DevSecOps, cloud security, and security operations.

BUSINESS TAKEAWAYS:

This course will help your organization:

  • Develop leaders that know how to build a modern security program.
  • Anticipate what security capabilities need to build to enable the business and mitigate threats
  • Create higher performing security teams.
SKILLS LEARNED:
  • Make sense of different cybersecurity frameworks
  • Understand and analyze risk.
  • Understand the pros and cons of different reporting relationships.
  • Manage and lead technical teams and projects.
  • Build a vulnerability management program.
  • Inject security into modern DevOps workflows.
  • Strategically leverage a SIEM
  • Lead a Security Operations Center (SOC)
  • Change behavior and build a security-aware culture.
  • Effectively manage security projects
  • Enable modern security architectures and the cloud.
  • Build security engineering capabilities using automation and Infrastructure as Code (IaC)
  • Get up to speed quickly on information security issues and terminology.
  • Establish a minimum standard of security knowledge, skills, and abilities.
  • Speak the same language as technical security professionals.
SYLLABUS SUMMARY:
  • Section 1 - Governance to plan your security program.
  • Section 2 - Architecture to design your security capabilities.
  • Section 3 - Engineering to build your security capabilities.
  • Section 4 - Build and lead the team, process, and culture.
  • Section 5 - Run operations to manage and mitigate attacks.
Topics
  • Security Frameworks
  • Control, Program, and Risk Frameworks
  • Understanding Risk
  • Risk Concepts
  • Calibration
  • Risk Assessment and Management
  • Security Policy
  • Purpose of Policy
  • Risk Appetite Statement
  • Policy Planning
  • Managing Policy
  • Program Structure
  • Reporting Relationships
  • Three Lines of Defense
  • Roles and Responsibilities
  • Security Functions
  • Security Architecture Overview
  • Models and Trends
  • Security Architecture Frameworks
  • Cyber Defense Matrix
  • Network Security
  • Layer 1 and 2
    • Overview and Attacks
  • Layer 3
    • VPNs and IPSec
  • Layer 4
    • TCP and UDP
  • Application Layer
    • Proxies, NGFW, IDS/IPS, NSM
  • Host Security
  • Malware and Attack Examples
  • Host Security Controls
    • EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing
  • Cloud Security
  • Cloud Security Fundamentals
  • AWS Security Reference Architecture
  • AWS Overview
  • Cloud Security Attack Example and Controls
  • Cloud Security Tools
    • CSPM, CWPP, CASB
  • Cloud Security Models
    • Cloud Security Alliance (CSA) Guidance, Well-Architected Frameworks, Cloud Apoption Frameworks
  • Zero Trust
  • Principles and Best Practices
  • Zero Trust Network Access (ZTNA)
  • Variable Trust
  • Security Engineering
  • Overview
  • Data Protection
  • Cryptography Concepts
    • Confidentiality, Integrity, Authentication, Non-Repudiation
  • Encryption Algorithms
    • Symmetric, Asymmetric, Key Exchange, Hashing, Digital Signature
  • Encryption Applications
    • TLS, PKI, Blockchain, Quantum
  • Privacy Primer
  • Privacy and Security
  • Requirements and Regulations
  • Privacy Engineering
  • Vulnerability Management
  • PIACT Process
  • Prioritizing Vulnerabilities
    • Common Vulnerability Scoring System (CVSS)
  • Finding and Fixing Vulnerabilities
  • Communicating and Managing Vulnerabilities
  • Security Awareness
  • Maturity Model
  • Human Risks
  • Negotiations Primer
  • Negotiations Strategies
  • Vendor Analysis
  • Product Analysis and Selection
  • Analytical Hierachy Process (AHP)
  • Managing and Leading Teams
  • Managing Projects
  • Leading Teams
  • Going From Good to Great
  • Logging and Monitoring
  • SIEM Deployment Best Practices
  • Security Operations Center (SOC)
  • SOC Functional Components
  • Models and Structure
  • Tiered vs. Tierless SOCs
  • Managing and Organizing a SOC
  • Incident Handling
  • PICERL Process
  • Incident Handling Lifecycle
  • Contingency Planning
  • Business Continuity Planning (BCP)
  • Disaster Recovery (DR)
  • Physical Security
  • Issues and Controls

Day 1

Asset Cost Management Introduction

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 2

Laying the Groundwork

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 3

Applying the Value based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 4

Ensuring the Continuity of the Value-based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 5

Supporting Process that Lower Life-cycle costs

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Training Methodology

Pathways Training and consulting adopts the newest techniques of human resources Training and consulting and, with the following:

  • Theoretical lectures are delivered via PowerPoint and visual displays (videos and short films)
  • Making scientific evaluation to the trainee (before and after)
  • Brainstorming and role-playing
  • Using case studies related to the scientific material being delivered and the trainees' work.
  • The participants get the scientific and practical material printed and on CDs and Flash memories.
  • Preparing records and reports of the participants' attendance and results, with a general evaluation of the training program.
  • A group of the best trainers and experts in all fields and specialties professionally prepares the scientific material.
  • After finishing the course, the participants get certificates of attendance signed, certified, and issued by pathways Training and consulting.
  • Our training programs start at 9:00 o'clock in the morning and end at 2:00 in the afternoon, with snack buffet during the lectures.
  • Providing a lunch buffet during the training program period, with organizing a lunch party on the training program final day for taking some photos and certificate awarding.
Different venues & timings for this course

Course name

Duration

City

Price

Security Leadership Essentials for Managers

17, Feb 2025 21, Feb 2025

Zurich

5250$

Security Leadership Essentials for Managers

23, Feb 2025 27, Feb 2025

Sharm ElShaikh

3250$

Security Leadership Essentials for Managers

03, Mar 2025 07, Mar 2025

Vienna

5250$

Security Leadership Essentials for Managers

09, Mar 2025 13, Mar 2025

Beirut

3250$

Security Leadership Essentials for Managers

23, Mar 2025 27, Mar 2025

Khobar

3250$

Security Leadership Essentials for Managers

24, Mar 2025 28, Mar 2025

London

5250$

Security Leadership Essentials for Managers

31, Mar 2025 04, Apr 2025

Trabzon

4000$

Security Leadership Essentials for Managers

06, Apr 2025 10, Apr 2025

Marrakesh

3450$

Security Leadership Essentials for Managers

06, Apr 2025 10, Apr 2025

Tunisia

3750$

Security Leadership Essentials for Managers

13, Apr 2025 17, Apr 2025

Tunisia

3750$

Security Leadership Essentials for Managers

13, Apr 2025 17, Apr 2025

Cairo

2950$

Security Leadership Essentials for Managers

27, Apr 2025 01, May 2025

Muscat

3250$

Security Leadership Essentials for Managers

28, Apr 2025 02, May 2025

Toronto

6000$

Security Leadership Essentials for Managers

05, May 2025 09, May 2025

Madrid

5250$

Security Leadership Essentials for Managers

05, May 2025 09, May 2025

Kuala Lumpur

3750$

Security Leadership Essentials for Managers

12, May 2025 16, May 2025

Bangkok

5450$

Security Leadership Essentials for Managers

19, May 2025 23, May 2025

Amsterdam

5250$

Security Leadership Essentials for Managers

25, May 2025 29, May 2025

Riyadh

3250$

Security Leadership Essentials for Managers

26, May 2025 30, May 2025

Barcelona

5250$

Security Leadership Essentials for Managers

01, Jun 2025 05, Jun 2025

DUBAI

3450$

Security Leadership Essentials for Managers

08, Jun 2025 12, Jun 2025

DUBAI

3450$

Security Leadership Essentials for Managers

09, Jun 2025 13, Jun 2025

Milan

5250$

Security Leadership Essentials for Managers

16, Jun 2025 20, Jun 2025

Berlin

5250$

Security Leadership Essentials for Managers

22, Jun 2025 26, Jun 2025

Kuwait

3250$

Security Leadership Essentials for Managers

23, Jun 2025 27, Jun 2025

Beijing

5450$

Security Leadership Essentials for Managers

13, Jul 2025 17, Jul 2025

Beirut

3250$

Security Leadership Essentials for Managers

20, Jul 2025 24, Jul 2025

Jeddah

3250$

Security Leadership Essentials for Managers

21, Jul 2025 25, Jul 2025

Paris

5250$

Security Leadership Essentials for Managers

27, Jul 2025 31, Jul 2025

Sharm ElShaikh

3250$

Security Leadership Essentials for Managers

04, Aug 2025 08, Aug 2025

Prague

5250$

Security Leadership Essentials for Managers

11, Aug 2025 15, Aug 2025

Marbella

5250$

Security Leadership Essentials for Managers

17, Aug 2025 21, Aug 2025

Marrakesh

3450$

Security Leadership Essentials for Managers

24, Aug 2025 28, Aug 2025

Jeddah

3250$

Security Leadership Essentials for Managers

01, Sep 2025 05, Sep 2025

Istanbul

3450$

Security Leadership Essentials for Managers

08, Sep 2025 12, Sep 2025

Geneva

5250$

Security Leadership Essentials for Managers

14, Sep 2025 18, Sep 2025

Manama

3250$

Security Leadership Essentials for Managers

28, Sep 2025 02, Oct 2025

Manama

3250$

Security Leadership Essentials for Managers

29, Sep 2025 03, Oct 2025

Singapore

5450$

Security Leadership Essentials for Managers

05, Oct 2025 09, Oct 2025

Muscat

3250$

Security Leadership Essentials for Managers

13, Oct 2025 17, Oct 2025

Milan

5250$

Security Leadership Essentials for Managers

03, Nov 2025 07, Nov 2025

Rome

5250$

Security Leadership Essentials for Managers

09, Nov 2025 13, Nov 2025

Doha

4000$

Security Leadership Essentials for Managers

16, Nov 2025 20, Nov 2025

Casablanca

3450$

Security Leadership Essentials for Managers

23, Nov 2025 27, Nov 2025

Riyadh

3250$

Security Leadership Essentials for Managers

15, Dec 2025 19, Dec 2025

Brussels

5250$

Security Leadership Essentials for Managers

28, Dec 2025 01, Jan 2026

Doha

4000$

Security Leadership Essentials for Managers

29, Dec 2025 02, Jan 2026

Jakarta

4000$

Have a look too on these courses