Security Awareness Summit 2014

Dallas, TX | Mon, Sep 8 - Wed, Sep 17, 2014

MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™

This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You won't just learn about security, you will learn how to manage security. Lecture sections are intense; the most common student comment is that it's like drinking from a fire hose. The diligent manager will gain vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Additionally, the course has been engineered to incorporate the NIST Special Publication 800 (series) guidance so that it can be particularly useful to US government managers and supporting contractors.

Essential security topics covered in this management track include: network fundamentals and applications, power, cooling and safety, architectural approaches to defense in depth, cyber attacks, vulnerability assessment and management, security policies, contingency and continuity planning, awareness management, risk management analysis, incident handling, Web application security, offensive and defensive information warfare, culminating with our management practicum. The material uses Knowledge Compression™, special charts, and other proprietary SANS techniques to help convey the key points of critical slides and keep the information flow rate at a pace senior executives demand every teaching hour of the course. The course has been evaluated and approved by CompTIA's CAQC program for Security + 2008 to ensure that managers and their direct reports have a common baseline for security terminology and concepts. You will be able to put what you learn into practice the day you get back into the office.

  1. Establish a minimum standard for IT security knowledge, skills, and abilities. In a nutshell, this course covers all of the non-operating system topics that are in SANS Security Essentials, though not to the same depth. The goal is to enable managers and auditors to speak the same language as system, security, and network administrators.
  2. Establish a minimum standard for IT management knowledge, skills, and abilities. I keep running into managers that don't know TCP/IP, and that is OK; but then they don't know how to calculate total cost of ownership (TCO), leaving me quietly wondering what they do know.
  3. Save the up-and-coming generation of senior and rapidly advancing managers a world of pain by sharing the things we wish someone had shared with us. As the saying goes, it is OK to make mistakes, just make new ones.

Notice:

Please note that some course material for SEC 401 and MGT 512 may overlap. We recommend SEC 401 for those interested in a more technical course of study, and MGT 512 for those primarily interested in a leadership-oriented but less technical learning experience.

This course prepares you for the GSLC certification which meets the requirement of the DoD 8570 IAM Level 1, 2, 3.

This course features Knowledge Compression™

Course Syllabus
Course Contents InstructorsSchedule
  MGT512.1: Managing the Enterprise, Planning, Network, and Physical Plant Richard Porter Fri Sep 12th, 2014
9:00 AM - 6:00 PM
Overview

The course starts with a whirlwind tour of the information an effective IT security manager must know to function in today's environment. We will cover safety, physical security, and how networks and the related protocols like TCP/IP work and equip you to review network designs for performance, security, vulnerability scanning, and return on investment. Learn more about secure IT operations in a single day than you ever thought possible.

CPE/CMU Credits: 7

Topics

Topics

  • Budget Awareness and Project Management
  • The Network Infrastructure; Computer and Network Addressing
  • IP Terminology and Concepts
  • Vulnerability Management
  • Managing Physical Safety, Security & the Procurement Process
 
  MGT512.2: IP Concepts, Attacks Against the Enterprise and Defense-in-Depth Richard Porter Sat Sep 13th, 2014
9:00 AM - 6:00 PM
Overview

Learn information assurance foundations, which are presented in the context of both current and historical computer security threats, and how they have impacted confidentiality, integrity, and availability. You will learn the methods of attack and the importance of managing attack surface.

CPE/CMU Credits: 7

Topics

Topics:

  • Attacks Against the Enterprise
  • Defense in Depth
  • Managing Security Policy
  • Access Control and Password Management
 
  MGT512.3: Secure Communications Richard Porter Sun Sep 14th, 2014
9:00 AM - 6:00 PM
Overview

Examine various cryptographic tools and technologies and how they can be used to secure a company's assets. A related area called steganography, or information hiding, is also covered. Learn how malware and viruses often employ cryptographic techniques in an attempt to evade detection. We will learn about managing privacy issues in communications, and investigate Web application security.

CPE/CMU Credits: 7

Topics

Topics:

  • Cryptography
  • Wireless Network Security
  • Steganography
  • Managing Privacy
  • Web Communications and Security
  • Operations Security, Defensive and Offensive Methods
 
  MGT512.4: The Value of Information Richard Porter Mon Sep 15th, 2014
9:00 AM - 6:00 PM
Overview

On this day, we consider the most valuable resource an organization has - its information. You will learn about intellectual property, incident handling, and how to identify and better protect the information that is the real value of your organization. We will then formally consider how to apply everything we have learned as well as practice briefing management on our risk architecture.

CPE/CMU Credits: 7

Topics

Topics:

  • Managing Intellectual Property
  • Incident Handling Foundations
  • Information Warfare
  • Disaster Recovery/Contingency Planning
  • Managing Ethics
  • IT Risk Management
 
  MGT512.5: Management Practicum Richard Porter Tue Sep 16th, 2014
9:00 AM - 4:00 PM
Overview

In the fifth and final day, we pull it all together and apply the technical knowledge to the art of management. The management practicum covers a number of specific applications and topics concerning information security. We'll explore proven techniques for successful and effective management, empowering managers to immediately apply what you've been taught your first day back at the office.

CPE/CMU Credits: 5

Topics

Topics:

  • The Mission
  • Globalization
  • IT Business and Program Growth
  • Security and Organizational Structure
  • The Total Cost of Ownership
  • Negotiations
  • Fraud
  • Legal Liability
  • Technical People
 
Additional Information
 
  Testimonial

"Thanks for a great class in Las Vegas! After taking your class I have been able to start the following projects:

  • Two-Factor authorization for remote users.
  • Web Filtering.
  • Intrusion detection systems for our internet facing offices.
  • Security awareness program. "

Jerry Farnstrom, Information Security Manager, Long Term Care Group Inc.

 
  Who Should Attend
  • All newly-appointed information security officers
  • Technically-skilled administrators that have recently been given leadership responsibilities
  • Seasoned managers who want to understand what your technical people are telling you
 
  Course Preparation

This course is taught MBA style and students are expected to be ready to work on the in-class exercises by preparing prior to the first day of instruction. When you enroll in MGT512, we suggest you review the following items before the course begins:

 
  You Will Be Able To
  • Establish a minimum standard for IT security knowledge, skills, and abilities. In a nutshell, this course covers all of the non-operating system topics that are in SANS Security Essentials, though not to the same depth. The goal is to enable managers and auditors to speak the same language as system, security, and network administrators.
  • Establish a minimum standard for IT management knowledge, skills and abilities. I keep running into managers that do not know TCP/IP, and that is okay; but then they do not know how to calculate total cost of ownership (TCO), leaving me quietly wondering what they do know.
  • Save the up-and-coming generation of senior and rapidly advancing managers a world of pain by sharing the things we wish someone had shared with us. As the saying goes, it is okay to make mistakes, just make new ones.

 

Author Statement

When SANS designed the Security Leadership for Managers course, we chose to emulate the format utilized by many executive MBA programs. While core source material is derived from our highly regarded SANS Security Essentials program, we decided to focus this program on the big picture of securing the enterprise: network fundamentals, security technologies, using cryptography, defense-in-depth, policy development, and management practicum. This course includes executive briefings designed to present a distilled summary of vitally important information security topics like operating system security and security threat forecasts. Ultimately, the goal of this program is to ensure that managers charged with the responsibility for information security can make informed choices and decisions that will improve their organization's security.

- Stephen Northcutt