Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

LDR512: Security Leadership Essentials for Managers

LDR512Cybersecurity Leadership
  • 5 Days (Instructor-Led)
  • 30 Hours (Self-Paced)
Course created by:
Frank Kim
Frank Kim
LDR512: Security Leadership Essentials for Managers
Course created by:
Frank Kim
Frank Kim
  • GIAC Security Leadership (GSLC)
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 22 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Gain essential technical and leadership skills to effectively manage security programs, covering key topics like security architecture, vulnerability management, cloud security, and GenAI security.

Course Overview

LDR512 is security manager training that equips security leaders with the technical and leadership skills needed to manage security programs, covering essential topics like frameworks, vulnerability management, and cloud security. As a foundational cyber security management course, it also prepares professionals for the GSLC certification (GIAC Security Leadership Certification). Through hands-on Cyber42 simulations, participants build real-world skills for developing effective security teams and managing information risk.

What You’ll Learn

  • Apply cybersecurity frameworks and assess risks
  • Lead technical teams and manage security projects
  • Develop vulnerability management and SOC programs
  • Integrate security in DevOps and automate with IaC
  • Foster a security-aware culture and shared knowledge
  • Secure modern architectures, including cloud and GenAI
  • Communicate effectively with technical teams

Business Takeaways

  • Develop leaders that know how to build a modern security program
  • Anticipate what security capabilities need to be built to enable the business and mitigate threats
  • Create higher performing security teams

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in LDR512: Security Leadership Essentials for Managers.

Section 1Building Your Security Program

This section introduces essential knowledge for security leaders, covering cybersecurity frameworks, risk management, policy development, and team structure to support effective security program management.

Topics covered

  • Security Frameworks
  • Understanding Risk
  • Security Policy
  • Program Structure

Labs

  • Calibration Lab
  • Cyber42 Round 1 Initiative Selection
  • Whither Watt's Warehouse
  • Institutionalizing Security
  • Board Briefing

Section 2Technical Security Architecture

This section covers traditional and modern security architectures, focusing on network security, endpoint controls, cloud security with AWS, IAM risks, and the Zero Trust Model to address evolving security challenges.

Topics covered

  • Security Architecture Overview
  • Network Security
  • Host Security
  • Cloud Security
  • Identity and Access Management (IAM)

Labs

  • Network Security Implementation
  • End User Security
  • To Serve and Protect

Section 3Security Engineering

Section three covers security engineering best practices, including cryptography, privacy concepts, application security with DevSecOps, Infrastructure as Code (IaC), and securing generative AI (GenAI) and Large Language Models (LLMs).

Topics covered

  • Security Engineering
  • Data Protection
  • Privacy Primer
  • Application Security
  • DevSecOps

Labs

  • Cyber42 Round 2 Initiative Selection
  • Industry Breach
  • Shadow IT
  • Security Misconfiguration
  • Miracle on DevOps Way

Section 4Security Management & Leadership

This section equips managers to lead security initiatives, covering vulnerability management, security awareness, vendor negotiation, and effective project execution to foster a security-aware culture and drive project success.

Topics covered

  • Vulnerability Management
  • Security Awareness
  • Negotiations Primer
  • Vendor Analysis
  • Managing and Leading Teams

Labs

  • Cyber42 Round 3 Initiative Selection 
  • Patching Problems
  • Let It Be Known!
  • Tough Negotiations
  • Managing Resistance

Section 5Detecting and Responding to Attacks

Section five focuses on detection and response, covering SIEM and SOC functions, incident response, business continuity, disaster recovery, and physical security controls for comprehensive security operations management.

Topics covered

  • Logging and Monitoring
  • Security Operations Center (SOC)
  • Incident Handling
  • Contingency Planning
  • Physical Security

Labs

  • Cyber42 Round 4 Initiative Selection
  • New Guy in Town
  • Cost Cutting
  • Ransomware Response
  • Opportunity Knocks

Things You Need To Know

Relevant Job Roles

Cybersecurity Auditor

European Cybersecurity Skills Framework

Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.

Explore learning path

Cybersecurity Architect

European Cybersecurity Skills Framework

Plans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.

Explore learning path

Cyber Risk Officer

Cybersecurity Leadership

Lead, govern, and manage this risk for your organization.

Explore learning path

Cyber Threat Intelligence Specialist

European Cybersecurity Skills Framework

Collect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.

Explore learning path

IT Investment/Portfolio Manager (DCWF 804)

DoD 8140: Cyber Enablers

Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.

Explore learning path

Secure Project Management (OPM 802)

NICE: Oversight and Governance

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Explore learning path

Systems Security Management (OPM 722)

NICE: Oversight and Governance

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Explore learning path

Communications Security (COMSEC) Management (OPM 723)

NICE: Oversight and Governance

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Explore learning path

Information Systems Security Developer (DCWF 631)

DoD 8140: Cybersecurity

Designs and evaluates information system security throughout the software lifecycle to ensure confidentiality, integrity, and availability.

Explore learning path

Information Systems Security Manager (DCWF 722)

DoD 8140: Cybersecurity

Oversees program, system, or enclave cybersecurity, ensuring protection from cyber threats and compliance with organizational standards.

Explore learning path

COMSEC Manager (DCWF 723)

DoD 8140: Cybersecurity

Manages organization’s COMSEC resources to ensure secure handling of communications materials as required by national and agency policies.

Explore learning path

Cybersecurity Risk Manager

European Cybersecurity Skills Framework

Manage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.

Explore learning path

Media Exploitation Analyst

Digital Forensics and Incident Response

This expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.

Explore learning path

Data Architect (DCWF 653)

DoD 8140: Data/AI

Designs system data models and flow architectures to meet mission or business data requirements using scalable and efficient solutions.

Explore learning path

Security Architect (DCWF 652)

DoD 8140: Cybersecurity

Designs secure enterprise systems considering environmental constraints and translates them into enforceable security processes and protocols.

Explore learning path

Cyber Policy and Strategy Planner (DCWF 752)

DoD 8140: Cyber Enablers

Creates cyberspace strategies and policies that align with mission objectives and support organizational readiness and future initiatives.

Explore learning path

Security Control Assessor (DCWF 612)

DoD 8140: Cybersecurity

Conducts independent assessments of IT system security controls to evaluate their overall effectiveness in protecting mission-critical systems.

Explore learning path

Cybersecurity Educator

European Cybersecurity Skills Framework

Improves cybersecurity knowledge, skills and competencies of humans.

Explore learning path

Authorizing Official/Designated Representative (DCWF 611)

DoD 8140: Cybersecurity

Responsible for accepting system risk on behalf of the organization, ensuring acceptable security levels for mission, reputation, and operations.

Explore learning path

Executive Cyber Leader (DCWF 901)

DoD 8140: Cyber Enablers

Sets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Frank Kim
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Kevin Garvey
    Date & Time
    Fetching schedule..View event details
    Course price
    €7,715 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Frank Kim
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Anaheim, CA, US & Virtual (live)

    Instructed by My-Ngoc Nguyen
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Huntsville, AL, US & Virtual (live)

    Instructed by Kenton Smith
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    San Antonio, TX, US & Virtual (live)

    Instructed by Kevin Garvey
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Chicago, IL, US & Virtual (live)

    Instructed by Frank Kim
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,260 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Riyadh, SA & Virtual (live)

    Instructed by Jan D'Herdt
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,375 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 34

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources