Two Days Left to Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off with Online Training!

Baltimore 2012

Baltimore, MD | Mon, Oct 15 - Sat, Oct 20, 2012
This event is over,
but there are more training opportunities.

MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ Sold Out

Mon, October 15 - Fri, October 19, 2012

It covers all areas of modern security, providing valuable knowledge to key aspects of the cyber security world @ work.

Reece Edney, CLS Services LTD

This course is 100% applicable to my work every day. Could not have designed a better course for someone in my situation; a new manager in cybersecurity risk.

Charlotte Ware, USPS

This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You won't just learn about security, you will learn how to manage security. Lecture sections are intense; the most common student comment is that it's like drinking from a fire hose. The diligent manager will learn vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Additionally, the course has been engineered to incorporate the NIST Special Publication 800 (series) guidance so that it can be particularly useful to US government managers and supporting contractors.

Essential security topics covered in this management track include: network fundamentals and applications, power, cooling and safety, architectural approaches to defense in depth, cyber attacks, vulnerability assessment and management, security policies, contingency and continuity planning, awareness management, risk management analysis, incident handling, Web application security, offensive and defensive information warfare, culminating with our management practicum. The material uses Knowledge Compression™, special charts, and other proprietary SANS techniques to help convey the key points of critical slides and keep the information flow rate at a pace senior executives demand every teaching hour of the course. The course has been evaluated and approved by CompTIA's CAQC program for Security + 2008 to ensure that managers and their direct reports have a common baseline for security terminology and concepts. You will be able to put what you learn into practice the day you get back into the office.


  1. Establish a minimum standard for IT security knowledge, skills, and abilities. In a nutshell, this course covers all of the non-operating system topics that are in SANS Security Essentials, though not to the same depth. The goal is to enable managers and auditors to speak the same language as system, security, and network administrators.
  2. Establish a minimum standard for IT management knowledge, skills, and abilities. I keep running into managers that don't know TCP/IP, and that is OK; but then they don't know how to calculate total cost of ownership (TCO), leaving me quietly wondering what they do know.
  3. Save the up-and-coming generation of senior and rapidly advancing managers a world of pain by sharing the things we wish someone had shared with us. As the saying goes, it is OK to make mistakes, just make new ones.



Please note that some course material for SEC 401 and MGT 512 may overlap. We recommend SEC 401 for those interested in a more technical course of study, and MGT 512 for those primarily interested in a leadership-oriented but less technical learning experience.

This course prepares you for the GSLC certification which meets the requirement of the DoD 8570 IAM Level 1, 2, 3.

This course features Knowledge Compression™

Course Syllabus

Stephen Northcutt
Mon Oct 15th, 2012
9:00 AM - 6:00 PM


The course starts with a whirlwind tour of the information an effective IT security manager must know to function in today's environment. We will cover safety, physical security, and how networks and the related protocols, like TCP/IP, work and equip you to review network designs for performance, security, vulnerability scanning, and return on investment. Learn more about secure IT operations in a single day than you ever thought possible.

CPE/CMU Credits: 7



  • Budget Awareness and Project Management
  • The Network Infrastructure; Computer and Network Addressing
  • IP Terminology and Concepts
  • Vulnerability Management
  • Managing Physical Safety, Security & the Procurement Process

Stephen Northcutt
Tue Oct 16th, 2012
9:00 AM - 6:00 PM


Learn information assurance foundations, which are presented in the context of both current and historical computer security threats, and how they have impacted confidentiality, integrity, and availability. You will learn the methods of attack and the importance of managing attack surface.

CPE/CMU Credits: 7



  • Attacks Against the Enterprise
  • Defense in Depth
  • Managing Security Policy
  • Access Control and Password Management

Stephen Northcutt
Wed Oct 17th, 2012
9:00 AM - 6:00 PM


Examine various cryptographic tools and technologies and how they can be used to secure a company's assets. A related area called steganography, or information hiding, is also covered. Learn how malware and viruses often employ cryptographic techniques in an attempt to evade detection. We will learn about managing privacy issues in communications, and investigate Web application security.

CPE/CMU Credits: 7



  • Cryptography
  • Wireless Network Security
  • Steganography
  • Managing Privacy
  • Web Communications and Security
  • Operations Security, Defensive and Offensive Methods

Stephen Northcutt
Thu Oct 18th, 2012
9:00 AM - 6:00 PM


On this day, we consider the most valuable resource an organization has - its information. You will learn about intellectual property, incident handling, and to identify and better protect the information that is the real value of your organization. We will then formally consider how to apply everything we have learned as well as practice briefing management on our risk architecture.

CPE/CMU Credits: 7



  • Managing Intellectual Property
  • Incident Handling Foundations
  • Information Warfare
  • Disaster Recovery/Contingency Planning
  • Managing Ethics
  • IT Risk Management

Stephen Northcutt
Fri Oct 19th, 2012
9:00 AM - 5:00 PM


In the fifth and final day, we pull it all together and apply the technical knowledge to the art of management. The management practicum covers a number of specific applications and topics concerning information security. We'll explore proven techniques for successful and effective management, empowering managers to immediately apply what you've been taught your first day back at the office.

CPE/CMU Credits: 5



  • The Mission
  • Globalization
  • IT Business and Program Growth
  • Security and Organizational Structure
  • The Total Cost of Ownership
  • Negotiations
  • Fraud
  • Legal Liability
  • Technical People

Additional Information

Thanks for a great class in Las Vegas! After taking your class I have been able to start the following projects:

-Two-Factor authorization for remote users.

-Web Filtering.

-Intrusion detection systems for our internet facing offices.

-Security awareness program.

Jerry Farnstrom

Information Security Manager

Long Term Care Group Inc.

  • All newly appointed information security officers
  • Technically skilled administrators that have recently been given leadership responsibilities
  • Seasoned managers that want to understand what your technical people are telling you

This course is taught MBA style and students are expected to be ready to work on the in-class exercises by preparing prior to the first day of instruction. When you enroll in MGT512, we suggest you review the following items before the course begins:

Author Statement

When SANS designed the Security Leadership for Managers course, we chose to emulate the format utilized by many executive MBA programs. While core source material is derived from our highly regarded SANS Security Essentials program, we decided to focus this program on the big picture of securing the enterprise: network fundamentals, security technologies, using cryptography, defense-in-depth, policy development, and management practicum. This course includes executive briefings designed to present a distilled summary of vitally important information security topics like operating system security and security threat forecasts. Ultimately, the goal of this program is to ensure that managers charged with the responsibility for information security can make informed choices and decisions that will improve their organization's security.

- Stephen Northcutt