“Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in isolation, a manager needs to regularly interact with people both inside and outside of the team. Further, “security” has its own language which can be completely foreign to people outside of the discipline. How do you take security concerns and convert them into a language that senior leaders and “C” levels can understand? Honing these skills will be the primary objective of this course.
Instructor: Chris Brenton
Course Length: 16 Hours
Price: $575 USD
This page is for the On-Demand version of this course. Please check our Live Events Calendar for any live presentations of this class currently scheduled.
In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.
The goal is to help you build an effective security team in as little time as possible.
Who Should Take This Course
- Security managers that are struggling for budget
- Security managers that face challenges when communicating with “C” level roles
- Individual contributors looking to move to security management
- Existing security managers looking to improve their execution
- Individuals that are struggling to stand up a full security program
Audience Skill Level
Students should have a basic understanding of multiple security disciplines. You need to be able to bring a holistic view of how different security technologies fit together. For example, you don’t need to be a seasoned pentester, but you should understand the value a pentest can provide and how it fits into a layered security model.
A system capable of participating in the video session. A stable Internet connection with sufficient speeds for video conferencing. Software capable of reading standard documents (MS Office, Google Drive, LibreOffice, etc.).
What Each Student Should Bring
An open mind, a positive attitude, and a curiosity to improve their skills.
What Students Will Be Provided
- A full set of example security policies
- A full security awareness training program
- Example questionnaire for validating vendor security
- Course slides and additional collateral
- Much more!
About Our On-Demand Courses…
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Many courses are offered with lifetime access to the course and content updates. On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of completion, and complimentary access to the Antisyphon Cyber Range*.
* Cyber Range access and other course features may vary from course to course. See the specific details for each course on its registration page.
Trainer & Author
Chris Brenton, COO of Active Countermeasures, has been a leader in the IT and security industry for over 20 years. He’s a published author of multiple security books and the primary author of the Cloud Security Alliance’s online training material. As a Fellow Instructor, Chris developed and delivered multiple courses for the SANS Institute. As an alumni of Y-Combinator, Chris has assisted multiple startups, helping them to improve their product security through continuous development, and identifying their product-market fit.