Talk With an Expert

LDR512: Security Leadership Essentials for Managers

LDR512Cybersecurity Leadership, Artificial Intelligence
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course authored by:
Frank Kim
Frank Kim
LDR512: Security Leadership Essentials for Managers
Course authored by:
Frank Kim
Frank Kim
  • GIAC Security Leadership (GSLC)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • 22 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Gain essential technical and leadership skills to effectively manage security programs, covering key topics like security architecture, vulnerability management, cloud security, and GenAI security.

Course Overview

LDR512 is security manager training that equips security leaders with the technical and leadership skills needed to manage security programs, covering essential topics like frameworks, vulnerability management, and cloud security. As a foundational cyber security management course, it also prepares professionals for the GSLC certification (GIAC Security Leadership Certification). Through hands-on Cyber42 simulations, participants build real-world skills for developing effective security teams and managing information risk.

What You’ll Learn

  • Apply cybersecurity frameworks and assess risks
  • Lead technical teams and manage security projects
  • Develop vulnerability management and SOC programs
  • Integrate security in DevOps and automate with IaC
  • Foster a security-aware culture and shared knowledge
  • Secure modern architectures, including cloud and GenAI
  • Communicate effectively with technical teams

Business Takeaways

  • Develop leaders that know how to build a modern security program
  • Anticipate what security capabilities need to be built to enable the business and mitigate threats
  • Create higher performing security teams

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR512: Security Leadership Essentials for Managers.

Section 1Building Your Security Program

This section introduces essential knowledge for security leaders, covering cybersecurity frameworks, risk management, policy development, and team structure to support effective security program management.

Topics covered

  • Security Frameworks
  • Understanding Risk
  • Security Policy
  • Program Structure

Labs

  • Calibration Lab
  • Cyber42 Round 1 Initiative Selection
  • Whither Watt's Warehouse
  • Institutionalizing Security
  • Board Briefing

Section 2Technical Security Architecture

This section covers traditional and modern security architectures, focusing on network security, endpoint controls, cloud security with AWS, IAM risks, and the Zero Trust Model to address evolving security challenges.

Topics covered

  • Security Architecture Overview
  • Network Security
  • Host Security
  • Cloud Security
  • Identity and Access Management (IAM)

Labs

  • Network Security Implementation
  • End User Security
  • To Serve and Protect

Section 3Security Engineering

Section three covers security engineering best practices, including cryptography, privacy concepts, application security with DevSecOps, Infrastructure as Code (IaC), and securing generative AI (GenAI) and Large Language Models (LLMs).

Topics covered

  • Security Engineering
  • Data Protection
  • Privacy Primer
  • Application Security
  • DevSecOps

Labs

  • Cyber42 Round 2 Initiative Selection
  • Industry Breach
  • Shadow IT
  • Security Misconfiguration
  • Miracle on DevOps Way

Section 4Security Management & Leadership

This section equips managers to lead security initiatives, covering vulnerability management, security awareness, vendor negotiation, and effective project execution to foster a security-aware culture and drive project success.

Topics covered

  • Vulnerability Management
  • Security Awareness
  • Negotiations Primer
  • Vendor Analysis
  • Managing and Leading Teams

Labs

  • Cyber42 Round 3 Initiative Selection 
  • Patching Problems
  • Let It Be Known!
  • Tough Negotiations
  • Managing Resistance

Section 5Detecting and Responding to Attacks

Section five focuses on detection and response, covering SIEM and SOC functions, incident response, business continuity, disaster recovery, and physical security controls for comprehensive security operations management.

Topics covered

  • Logging and Monitoring
  • Security Operations Center (SOC)
  • Incident Handling
  • Contingency Planning
  • Physical Security

Labs

  • Cyber42 Round 4 Initiative Selection
  • New Guy in Town
  • Cost Cutting
  • Ransomware Response
  • Opportunity Knocks

Things You Need To Know

Relevant Job Roles

Privacy Compliance Manager (DCWF 732)

DoD 8140: Cyber Enablers

Leads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Information Systems Security Developer (DCWF 631)

DoD 8140: Cybersecurity

Designs and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.

Explore learning path

Information Systems Security Manager (DCWF 722)

DoD 8140: Cybersecurity

Oversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
  • Location & instructor

    Virtual (OnDemand)

    Instructed by
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Registration Options
  • Location & instructor

    Sydney, NSW, AU & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    A$12,560 AUD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Rome, IT

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Denver, CO, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    £6,715 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Registration Options
  • Location & instructor

    Doha, QA

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,375 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Orlando, FL, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    ¥1,256,250 JPY*Prices exclude applicable local taxes
    Registration Options
Showing 10 of 31

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources