Security management encompasses a number of verticals, dealing with the day to day, developing programs, maintaining compliance and managing risk. This course covers what's important when starting up a cyber-security initiative.
Implementing a security program can be a daunting task. There are a lot of pieces to the puzzle that must be addressed ranging from knowing what assets and data you want to protect, assessing vulnerabilities, threats and risk, to developing budgets and maintaining compliance. In this course, Security Management: A Case Study, you'll learn about defining goals, regulatory and compliance objectives, and determining risk. First, you'll review the key elements to developing a business case needed for funding a security program. Next, you'll look at defining metrics and showing ROI. Finally, you'll put the information learned throughout the Security Management Path into context When you’re finished with this course, you will have the proper context for the many skills and topics covered throughout the security management path.
Chris is a lifelong learner and professional information technologist, trainer and IT Manager. Married with 3 children, Chris is interested in martial arts, working out, spending time with family and friends and being creative whenever possible.
Course Overview Hey everyone. My name is Christopher Rees, and welcome to my course, Security Management: A Case Study. In addition to being a Pluralsight author, I'm also a senior enterprise ITOps leader with over 20 years of IT experience. Over the past 20 years, I've trained over 250,000 students around the world, as well as managed teams, both locally and remote, that have served millions of customers around the country. Starting a cybersecurity initiative can be challenging. From getting the initial buy‑in, establishing the use case, securing funding, and also managing compliance are just some of the challenges that you'll face. In this course, we're going to highlight some of the more important skills that you've learned from the security management path and put them into context. Some of the major topics that we cover will include understanding goals, assessing objectives, resources, and compliance requirements. We'll talk about several frameworks that you should be consulting with when developing a program. Also, understanding compliance requirements at a local, national, and global level, along with the importance of classifying data, data custodians, data retention, and destruction. Then we'll talk about risk assessments, the important components needed to develop a business case, and also metrics and executive management reporting to show both value and ROI. By the end of this course, you have a good understanding of how to put the information learned throughout the Security Management path into proper context and apply it to building or augmenting your cybersecurity program. Before beginning this course, you should be familiar with the information in the Security Management path, along with some security fundamentals such as Security+. From here, you should feel comfortable constructing a go‑forward plan and presenting to your executive leadership. So I hope you'll join me on this journey as we wrap up the Security Management path with my Security Management: A Case Study course, here at Pluralsight.