Get Training Advice
Major updates

LDR520: Emerging Trends for Cyber Leaders: AI and Cloud

LDR520Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course authored by:
Jason Lam
Jason Lam
LDR520: Cloud Security for Leaders
Course authored by:
Jason Lam
Jason Lam
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 13 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Lead AI and cloud security transformation with clarity. Master strategic frameworks to drive business innovation and build defenses against tomorrow's threats.

Course Overview

LDR520: Emerging Trends for Cyber Leaders: AI and Cloud empowers leaders to navigate the complex, interconnected risks of AI and cloud transformation. You will master AI security by establishing robust governance frameworks and building practical implementation roadmaps to defend against modern threats. The course then establishes a critical foundation in cloud security, covering everything from identity and infrastructure protection to advanced data operations and multicloud governance. Finally, you will look ahead to post-quantum cryptography and apply all learned concepts in a comprehensive, executive-level capstone exercise.

What You'll Learn

  • Build and defend the AI security business case
  • Identify and mitigate AI-specific vulnerabilities
  • Design and execute AI implementation roadmaps
  • Establish secure cloud foundations
  • Protect cloud data and operations
  • Prepare for post-quantum cryptographic transitions

Business Takeaways

  • Reduce AI security incidents and associated costs
  • Avoid regulatory penalties and insurance premium increases
  • Prevent catastrophic deepfake and AI-enhanced fraud losses
  • Future-proof cryptographic infrastructure
  • Accelerate secure cloud adoption
  • Enhance board-level strategic decision making

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR520: Emerging Trends for Cyber Leaders: AI and Cloud.

Section 1AI Strategic Imperatives: Governance & Threat Assessment

This section establishes the critical business case for AI leadership, anchoring on the 'Govern AI' pillar with deep dives into essential compliance frameworks. This section then transitions to the 'Protect AI' pillar, defining the modern threat landscape and the specific vulnerabilities leaders must mitigate.

Topics covered

  • Build the urgent financial case for AI security
  • Master key governance frameworks: NIST, EU AI Act & ISO
  • Identify and counter the "Shadow AI" epidemic
  • Explore the OWASP Top 10 for Large Language Models
  • Defend against AI-enhanced attacks such as phishing and deepfakes

Labs

  • Design governance frameworks for industry-specific compliance scenarios
  • Conduct threat modeling using OWASP LLM vulnerabilities
  • Build risk-based security controls for AI systems

Section 2AI Defense and Enterprise Implementation

This section delivers practical defensive strategies against AI-enabled threats and adversarial attacks while leveraging AI to transform security operations. Participants build comprehensive implementation roadmaps including vendor selection, resource planning, and measurable ROI targets for organizational deployment.

Topics covered

  • Defending against adversarial machine learning and model attacks
  • Leveraging AI for SOC transformation and alert reduction
  • Navigating vendor ecosystem: Platform vs point solutions
  • Building phased implementation roadmaps with budget models
  • Achieving measurable outcomes: enterprise implementation frameworks

Labs

  • Assess vendor solutions using weighted scorecard methodologies
  • Build 30/60/90-day implementation plans with resource modeling
  • Develop stakeholder engagement and communication strategies

Section 3Cloud Security Foundations, Identity, and Infrastructure

This section establishes the critical foundation for cloud security, covering fundamental adoption models, identity management, and core infrastructure protection. It provides the essential building blocks for creating a secure and resilient cloud environment from the ground up.

Topics covered

  • Cloud Fundamentals and Landing Zones
  • Identity and Access Management (IAM)
  • Multi-Account and Segregation Strategies
  • Environment and Configuration Protection
  • Secure Cloud Network Architecture

Labs

  • Cloud Security Planning and IAM
  • Landing Zone and Network Design
  • Configuration and Resource Protection

Section 4Cloud Data Protection, Operations, and Governance

This section focuses on protecting your most critical assets and managing ongoing security operations, from data encryption and incident response to securing workloads. It also covers the strategic aspects of multicloud governance, compliance, and organizational alignment for a mature security posture.

Topics covered

  • Data Protection and Encryption
  • Security Monitoring and Incident Response
  • Application Security and DevSecOps
  • Security Assurance and Compliance
  • Multicloud and SaaS Governance

Labs

  • Data Protection and Monitoring
  • Application (DevSecOps) Protection
  • Multicloud and SaaS Governance

Section 5Post Quantum Crypto and Capstone Exercise

This section addresses the modern crypto transition to post-quantum security management, a critical future-proofing strategy. It culminates in a capstone exercise where students apply all concepts and skills learned throughout the course in a practical, executive-level scenario.

Topics covered

  • Post-Quantum Threats to Crypto
  • Crypto Inventory and Transition
  • Post-Quantum Migration Process

Labs

  • Executive Level Capstone Exercise
  • Security Strategy Presentation

Things You Need To Know

Relevant Job Roles

Cloud Security Manager

Cloud Security

Developing cloud security roadmaps, plans and procurement models to mature cloud security.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the oversight of technical teams while aligning them to overall business strategies. Includes titles such as Technical Director, Information Security Officer, and CISO.

Explore learning path

Cloud Security Architect

Cloud Security

Designs and secures the defensive architecture of secure cloud environments.

Explore learning path

Leadership

SCyWF: Leadership And Workforce Development

This role conducts supervises, manages and leads cybersecurity teams and work. Find the SANS courses that map to the Leadership SCyWF Work Role.

Explore learning path

Program Management (OPM 801)

NICE: Oversight and Governance

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational  priorities.

Explore learning path

Chief Information Security Officer (CISO)

European Cybersecurity Skills Framework

Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchasing Options?Contact Us
Showing 5 of 5

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources