“Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security ICs can perform most tasks in isolation, a manager needs to regularly interact with people both inside and outside of the team. Further, “security” has its own language which can be completely foreign to people outside of the discipline. How do you take security concerns and convert them into a language that senior leaders and “C” levels can understand? Honing these skills will be the primary objective of this course.
In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.
The goal is to help you build an effective security team in as little time as possible.
WHO SHOULD TAKE THIS COURSE
- Security managers that are struggling for budget
- Security managers that face challenges when communicating with “C” level roles
- Individual contributors looking to move to security management
- Existing security managers looking to improve their execution
- Individuals that are struggling to stand up a full security program
AUDIENCE SKILL LEVEL
Students should have a basic understanding of multiple security disciplines. You need to be able to bring a holistic view of how different security technologies fit together. For example, you don’t need to be a seasoned pentester, but you should understand the value a pentest can provide and how it fits into a layered security model.
A system capable of participating in the video session. A stable Internet connection with sufficient speeds for video conferencing. Software capable of reading standard documents (MS Office, Google Drive, LibreOffice, etc).
WHAT EACH STUDENT SHOULD BRING
An open mind, a positive attitude, and a curiosity to improve their skills.
WHAT STUDENTS WILL BE PROVIDED WITH
- A full set of example security policies
- A full security awareness training program
- Example questionnaire for validating vendor security
- Course slides and additional collateral
- Much more!
Learn via live stream from instructors that are in the field utilizing the techniques they teach. Classes are split into four training days that are each four hours long. Live Online training includes six months access to dedicated class channels in the Antisyphon Discord server, six months access to live class recordings, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Learn at your own pace with access to course content, lectures, and demos in the Antisyphon On-demand learning platform. Most courses are offered with lifetime access to the course and content updates. All On-demand courses include content update alerts, access to dedicated support channels in the Antisyphon Discord server, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
Live Online w/ On-Demand Bundle
This is the best of both worlds! Attend the live online class at its next scheduled interval and gain access to the online training modules in the Antisyphon On-demand training platform. Bundle also includes six months access to dedicated class channels in the Antisyphon Discord server, six months access to live class recordings, a certificate of participation, and 12 months complimentary access to the Antisyphon Cyber Range.
TRAINER & AUTHOR
Chris, COO of Active Countermeasures, has been a leader in the IT and security industry for over 20 years. He’s a published author of multiple security books and the primary author of the Cloud Security Alliance’s online training material. As a Fellow Instructor, Chris developed and delivered multiple courses for the SANS Institute. As an alumni of Y-Combinator, Chris has assisted multiple startups, helping them to improve their product security through continuous development, and identifying their product-market fit.