The Certified Pro Hub/Security-Leadership

  • €199

Security-Leadership

  • Course
  • 25 Lessons
  • 90-day access

This course provides a high-level, strategic exploration of modern cybersecurity management. It moves beyond technical implementation to focus on Governance, Risk, and Compliance (GRC), Strategic Leadership, and Business Continuity.

Contents

Governance, Risk, and Compliance

Today, information security has transitioned from merely a technical support role to a fundamental element of organisational strategy, managing enterprise risk and ensuring operational resilience. As organisations face a more unpredictable threat environment, strict regulatory demands, and intricate digital ecosystems, the importance and responsibilities of security leadership have expanded.

Governance, Risk, and Compliance (GRC) is the strategic framework that aligns technical security efforts with business objectives, ensuring that every firewall rule and access policy serves a larger purpose. Governance establishes the internal "laws" and accountability structures of the organisation; Risk Management identifies and prioritises threats to ensure resources are spent on what matters most; and Compliance ensures the organisation meets mandatory legal and industry standards, such as GDPR or SOC 2. Ultimately, GRC is vital because it transforms security from a reactive "whack-a-mole" technical task into a proactive, defensible business function that secures executive buy-in and protects the company from both hackers and heavy legal fines.

An Analysis of Governance, Risk, and Compliance
Preview
Activity - Governance and Security Leadership
NIST Cybersecurity History with Dr. Ron Ross (10 Min)
Preview
The Strategic Imperative - Systems Lifecycle Management
Activity - Systems Lifecycle Management (Part1)
Preview
Contracts - Security point of view
Preview
Activity - SDLC - Part 02
Preview

Risk Management

The Strategic Evolution of Cybersecurity Risk Management:
IBM: Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes (20 min)
Preview
Activity- Risk Management
IBM (9 min) - Cybersecurity Framework
Preview

Laws and regulations

101 - Due Care vs. Due Diligence
Trans-Border Data Flows and Digital Sovereignty
Activity - Laws and regualtions
Optional: USA versu EU model
Legal Jurisdictions and the Global Regulatory Environment
Activity - Digital Forensics
Records Management and Employee Monitoring
Activity - Legal terminology
Preview

Security Operations and BCM

Security Operations is the shift from being a "firefighter" to becoming a "risk architect." While traditional IT focuses on keeping the lights on, SecOps is the discipline of ensuring the organisation survives the inevitable breach. In a landscape where preventative controls are bypassed in seconds, mastering SecOps allows you to move beyond simple system maintenance into high-stakes detection engineering and active threat hunting.

YT: How is Software built? (8min)
Preview
Contingency Management
Activity - SecOps - The Sociotechnical Evolution of Cyber Defence
The Architectural and Sociological Foundations of Modern Contingency Management
Activity - BCM from ISO point of view
(optional) Microsoft: Understanding Chaos Engineering (20 min)
Preview