Talk With an Expert

LDR512: Security Leadership Essentials for Managers

LDR512Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Frank Kim
Frank Kim
LDR512: Security Leadership Essentials for Managers
Course created by:
Frank Kim
Frank Kim
  • GIAC Security Leadership (GSLC)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • 22 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Gain essential technical and leadership skills to effectively manage security programs, covering key topics like security architecture, vulnerability management, cloud security, and GenAI security.

Course Overview

LDR512 is security manager training that equips security leaders with the technical and leadership skills needed to manage security programs, covering essential topics like frameworks, vulnerability management, and cloud security. As a foundational cyber security management course, it also prepares professionals for the GSLC certification (GIAC Security Leadership Certification). Through hands-on Cyber42 simulations, participants build real-world skills for developing effective security teams and managing information risk.

What You’ll Learn

  • Apply cybersecurity frameworks and assess risks
  • Lead technical teams and manage security projects
  • Develop vulnerability management and SOC programs
  • Integrate security in DevOps and automate with IaC
  • Foster a security-aware culture and shared knowledge
  • Secure modern architectures, including cloud and GenAI
  • Communicate effectively with technical teams

Business Takeaways

  • Develop leaders that know how to build a modern security program
  • Anticipate what security capabilities need to be built to enable the business and mitigate threats
  • Create higher performing security teams

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR512: Security Leadership Essentials for Managers.

Section 1Building Your Security Program

This section introduces essential knowledge for security leaders, covering cybersecurity frameworks, risk management, policy development, and team structure to support effective security program management.

Topics covered

  • Security Frameworks
  • Understanding Risk
  • Security Policy
  • Program Structure

Labs

  • Calibration Lab
  • Cyber42 Round 1 Initiative Selection
  • Whither Watt's Warehouse
  • Institutionalizing Security
  • Board Briefing

Section 2Technical Security Architecture

This section covers traditional and modern security architectures, focusing on network security, endpoint controls, cloud security with AWS, IAM risks, and the Zero Trust Model to address evolving security challenges.

Topics covered

  • Security Architecture Overview
  • Network Security
  • Host Security
  • Cloud Security
  • Identity and Access Management (IAM)

Labs

  • Network Security Implementation
  • End User Security
  • To Serve and Protect

Section 3Security Engineering

Section three covers security engineering best practices, including cryptography, privacy concepts, application security with DevSecOps, Infrastructure as Code (IaC), and securing generative AI (GenAI) and Large Language Models (LLMs).

Topics covered

  • Security Engineering
  • Data Protection
  • Privacy Primer
  • Application Security
  • DevSecOps

Labs

  • Cyber42 Round 2 Initiative Selection
  • Industry Breach
  • Shadow IT
  • Security Misconfiguration
  • Miracle on DevOps Way

Section 4Security Management & Leadership

This section equips managers to lead security initiatives, covering vulnerability management, security awareness, vendor negotiation, and effective project execution to foster a security-aware culture and drive project success.

Topics covered

  • Vulnerability Management
  • Security Awareness
  • Negotiations Primer
  • Vendor Analysis
  • Managing and Leading Teams

Labs

  • Cyber42 Round 3 Initiative Selection 
  • Patching Problems
  • Let It Be Known!
  • Tough Negotiations
  • Managing Resistance

Section 5Detecting and Responding to Attacks

Section five focuses on detection and response, covering SIEM and SOC functions, incident response, business continuity, disaster recovery, and physical security controls for comprehensive security operations management.

Topics covered

  • Logging and Monitoring
  • Security Operations Center (SOC)
  • Incident Handling
  • Contingency Planning
  • Physical Security

Labs

  • Cyber42 Round 4 Initiative Selection
  • New Guy in Town
  • Cost Cutting
  • Ransomware Response
  • Opportunity Knocks

Things You Need To Know

Relevant Job Roles

Privacy Compliance Manager (DCWF 732)

DoD 8140: Cyber Enablers

Leads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Information Systems Security Developer (DCWF 631)

DoD 8140: Cybersecurity

Designs and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.

Explore learning path

Senior Security Leader

Cybersecurity Leadership

Daily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.

Explore learning path

Information Systems Security Manager (DCWF 722)

DoD 8140: Cybersecurity

Oversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.

Explore learning path

COMSEC Manager (DCWF 723)

DoD 8140: Cybersecurity

Manages organization’s COMSEC resources to ensure secure handling of communications materials as required by national and agency policies.

Explore learning path

Product Support Manager (DCWF 803)

DoD 8140: Cyber Enablers

Manages support resources and readiness for system components, ensuring operational capability through lifecycle logistics and maintenance.

Explore learning path

Security Architect (DCWF 652)

DoD 8140: Cybersecurity

Designs secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.

Explore learning path

Cybersecurity Instruction (OPM 712)

NICE: Oversight and Governance

Responsible for developing and conducting cybersecurity awareness, training, or education.

Explore learning path

Security Control Assessor (DCWF 612)

DoD 8140: Cybersecurity

Conducts independent assessments of IT system security controls to evaluate their overall effectiveness in protecting mission-critical systems.

Explore learning path

Authorizing Official/Designated Representative (DCWF 611)

DoD 8140: Cybersecurity

Responsible for accepting system risk on behalf of the organization, ensuring acceptable security levels for mission, reputation, and operations.

Explore learning path

Transformational Leader

Cybersecurity Leadership

Align technology, business strategy, and people.

Explore learning path

IT Project Manager (DCWF 802)

DoD 8140: Cyber Enablers

Leads IT project management to deliver services or products, ensuring milestones, budgets, and mission alignment are successfully achieved.

Explore learning path

Systems Requirements Planner (DCWF 641)

DoD 8140: Cyber IT

Translates functional needs into technical solutions by consulting with customers and developing system architectures and requirements.

Explore learning path

IT Program Auditor (DCWF 805)

DoD 8140: Cyber Enablers

Evaluates IT programs for compliance, identifying gaps and ensuring conformance with published tech and security standards and policies.

Explore learning path

Program Management (OPM 801)

NICE: Oversight and Governance

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational  priorities.

Explore learning path

Chief Information Security Officer (CISO)

European Cybersecurity Skills Framework

Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Frank Kim
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Kevin Garvey
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Anaheim, CA, US & Virtual (live)

    Instructed by My-Ngoc Nguyen
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Huntsville, AL, US & Virtual (live)

    Instructed by Kenton Smith
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    San Antonio, TX, US & Virtual (live)

    Instructed by Kevin Garvey
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Chicago, IL, US & Virtual (live)

    Instructed by Frank Kim
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Riyadh, SA & Virtual (live)

    Instructed by Jan D'Herdt
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,375 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Copenhagen, DK

    Instructed by Charles Goldner
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Registration Options
Showing 8 of 32

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources