homepage
Open menu Go one level top
  • Train and Certify
    • Get Started in Cyber
    • Courses & Certifications
    • Training Roadmap
    • Search For Training
    • Online Training
    • OnDemand
    • Live Training
    • Summits
    • Cyber Ranges
    • College Degrees & Certificates
    • NICE Framework
    • DoDD 8140
    • Specials
  • Manage Your Team
    • Overview
    • Security Awareness Training
    • Voucher Program
    • Private Training
    • Workforce Development
    • Skill Assessments
    • Hiring Opportunities
  • Resources
    • Overview
    • Reading Room
    • Webcasts
    • Newsletters
    • Blog
    • Tip of The Day
    • Posters
    • Top 25 Programming Errors
    • The Critical Security Controls
    • Security Policy Project
    • Critical Vulnerability Recaps
    • Affiliate Directory
  • Focus Areas
    • Blue Team Operations
    • Cloud Security
    • Digital Forensics & Incident Response
    • Industrial Control Systems
    • Leadership
    • Offensive Operations
  • Get Involved
    • Overview
    • SANS Community
    • CyberTalent
    • Work Study
    • Instructor Development
    • Sponsorship Opportunities
    • COINS
  • About
    • About SANS
    • Why SANS?
    • Instructors
    • Cybersecurity Innovation Awards
    • Contact
    • Frequently Asked Questions
    • Customer Reviews
    • Press Room
  • Log In
  • Join
  • Contact Us
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  1. Home >
  2. Blog >
  3. SANS Cybersecurity Leadership Curriculum
370x370_Frank-Kim.jpg
Frank Kim

SANS Cybersecurity Leadership Curriculum

Developing World Class Cybersecurity Leaders

December 16, 2020

To be effective as cybersecurity leaders, security managers need both technical knowledge and management skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. The Cybersecurity Leadership Curriculum develops cyber leaders who have the practical skills to build and lead security teams, communicate with technical and business leaders alike, and develop capabilities that build your organization's success.

CoursewareVersion_MGTCurriculum_201210.png

Current SANS Cybersecurity Leadership Curriculum

NEW Cybersecurity Leadership Courses in 2020 and Q1-2021

MGT433: Managing Human Risk: Mature Security Awareness Programs

MGT520: Leading Cloud Security Design and Implementation

MGT521: Leading Cybersecurity Change: Building a Security-Based Culture

MGT516: Managing Security Vulnerabilities: Enterprise & Cloud

MGT551: Building and Leading Security Operations Centers

SEC557: Continuous Automation for Enterprise & Cloud Compliance

Courses Coming Soon / In Development

MGT416: Vendor Risk Management & Data Privacy

Pyramid_MGT_201214.png


Cybersecurity requires engagement from all levels of leadership throughout an organization. The key differentiator between these various levels is the amount of technical knowledge and business knowledge that is required to succeed. Technology knowledge is invariably greater as you move down the pyramid while business knowledge increases as you move up the pyramid with increasingly more responsibility. Roles and titles will vary across organizations of different sizes and industries but the amount of technical knowledge that an engineer or analyst requires is vastly different from that which a CISO or even a VP of Security requires.

However, as a security leader or manager we are in a difficult situation. We need to have enough technical acumen to understand our team, resolve technical disagreements, and weigh in on appropriate technical direction. At the same time, we must have enough business understanding to convey technical security topics in ways that non-technical leaders can understand and translate business drivers to our teams in ways that they in turn can understand.

That is the focus of this curriculum. To give security leaders both the technical knowledge and management skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives.

Cybersecurity Leadership Triads

In an effort to help our students find the right path, SANS Cybersecurity Leadership Curriculum has created two triads of courses and certifications that align to help create stronger, more well-rounded cybersecurity leaders. This entire blog post is dedicated to describing these triads in detail as well as providing a series of related resources.

Triads-Both-1245x705.png


Cyber42 Leadership Simulation

In 2020 we added something new to the mix. We call it Cyber42. This cybersecurity leadership simulation game has been added to a number of SANS Cybersecurity Leadership courses. Additionally, starting in January 2021, we are offering monthly, free Cyber42 Game Days in our various versions, including:

  • Security Capabilities
  • CISO For A Day
  • Vulnerability Management

Learn more about the game and find the Game Day schedule in this blog post.

Cyber42_Logo_black_370x370.png


Why Take Cybersecurity Leadership Training With SANS?

  • Leadership Focused – appropriately plan and manage security projects and initiatives
  • Technical Focused – gain the respect of technical team members and understand what technical staff are actually doing
  • Holistic, Curated Curriculum – based on various job roles and focus areas
  • Hands-On Labs – extensively focused on “the how” through non-traditional “lab work” such as analyzing case-studies, participating in team exercises, and competing against classmates in Cyber42 games
  • World-Class Instructors – versatile, real-world security practitioners authoring & instructing
  • Comprehensive Courseware – access to slides, notes, audio files, labs, and additional resources for future reference
  • Certification Prep – specialized training that will help you prepare for a GIAC certification attempt

GIAC Certifications

In addition to courses, we offer six GIAC certifications, one SSA certification, and plans for more in 2021.

  • GSLC: GIAC Security Leadership Certification
  • GSTRT: GIAC Strategic Planning, Policy, and Leadership
  • GCPM: GIAC Certified Project Manager
  • GSNA: GIAC Systems Network Auditor
  • GLEG: GIAC Law of Data Security & Investigations
  • GCCC: GIAC Critical Controls Certification
  • SSAP: SANS Security Awareness Professional
MGT_GIAC_Certs.png


Challenge Coins

Hundreds of SANS Institute students have stepped up to the challenge and conquered. They’ve mastered the concepts and skills, beat out their classmates, and proven their prowess. These are the elite, the recipients of a SANS Challenge Coin, an award given to a select portion of the thousands of students that have taken any of the SANS courses. More Cybersecurity Leadership Challenge Coins are on the radar for 2021!

Leadership_Coins_for_Blog_900x500.png

More exciting milestones are on the horizon with the SANS Cybersecurity Leadership Curriculum such as a web page, additional courses, more GIAC certifications, new posters and free resources. Stay tuned!

Access Our Free Resources

Cybersecurity Leadership Website

Recommended Reading List

Cybersecurity Leadership Webcasts

Blogs & Whitepapers

Posters

Course Demos

SANS offers free course demos for all courses available on the SANS OnDemand platform. Browse them here. 

Join Us On Social

Twitter - @SecLeadership

LinkedIn - SANS Security Leadership

Complete Cybersecurity Leadership Curriculum

Long Courses

MGT512: Security Leadership Essentials for Managers

MGT514: Security Strategic Planning, Policy, and Leadership

MGT516: Managing Security Vulnerabilities: Enterprise and Cloud

MGT521: Leading Cybersecurity Change: Building a Security-Based Culture

MGT525: IT Project Management and Effective Communication

AUD507: Auditing and Monitoring Networks, Perimeters & Systems

LEG523: Law of Data Security and Investigations

SEC557: Continuous Automation for Enterprise and Cloud Security Compliance

SEC566: Implementing and Auditing the Critical Security Controls

Short Courses

MGT415: A Practical Introduction to Cyber Security Risk Management

MGT433: Managing Human Risk: Mature Security Awareness Programs

MGT520: Leading Cloud Security Design and Implementation

MGT551: Building and Leading Security Operations Centers

SEC440: Critical Security Controls: Planning, Implementing, and Auditing



Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Join the SANS Community to receive the latest curated cybersecurity news, vulnerabilities, and mitigations, training opportunities, plus our webcast schedule.
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe

Recommended Training

  • SEC501: Advanced Security Essentials - Enterprise Defender
  • SEC545: Cloud Security Architecture and Operations
  • SEC580: Metasploit Kung Fu for Enterprise Pen Testing

Tags:
  • Security Management, Legal, and Audit

Related Content

Blog
MGT_Triads_400x227.png
Security Management, Legal, and Audit
December 16, 2020
SANS Cybersecurity Leadership Curriculum Triads
Go Beyond Good Enough. Become A Transformational Cybersecurity Leader or an Operational Cybersecurity Executive.
370x370_Frank-Kim.jpg
Frank Kim
read more
Blog
Security Management, Legal, and Audit, Cloud Security
October 15, 2020
Vulnerability Management Maturity Model Part II
Taming the Beast of Vulnerability Management
Jonathan_Risto_370x370.png
Jonathan Risto
read more
Blog
Security Management, Legal, and Audit, Cloud Security
July 6, 2020
Vulnerability Management Maturity Model Part I
Taming the beast of Vulnerability Management
Jonathan_Risto_370x370.png
Jonathan Risto
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters
  • The Critical Security Controls
  • Focus Areas
  • Blue Team Operations
  • Cloud Security
  • Cybersecurity Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Join the SANS Community to receive the latest curated cybersecurity news, vulnerabilities, and mitigations, training opportunities, plus our webcast schedule.
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe
  • © 2021 SANS™ Institute
  • Privacy Policy
  • Contact
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn