Course Description:


In an era of escalating cyber threats, adequate security requires more than just firewalls; it demands robust governance and strategic leadership. This course explores the principles of Enterprise Information Security Management, focusing on how to govern, risk-manage, and operate a secure environment at scale.

We will dissect the critical intersection of people, processes, and technology, covering essential topics such as Identity and Access Management (IAM), security assessment strategies, and disaster recovery planning. Ideal for those moving into senior roles, this course establishes the foundational knowledge required to lead security initiatives and implement defence-in-depth architectures across complex enterprises.

This curriculum is structured to align with global industry bodies of knowledge for advanced security practitioners, including the following topics:

  • Security and Risk Management sets up the governance, compliance, and risk frameworks needed to align security efforts with business objectives. This baseline guarantees that each security measure has a clear strategic purpose, appropriate budget allocation, and legal backing.

  • Asset Security involves identifying, classifying, and managing data throughout its lifecycle to ensure protection controls are proportional to the asset's value. You cannot effectively secure or legally defend data without knowing its location, ownership, and value.

  • Security Architecture and Engineering explains how to incorporate security models and cryptography during system design to ensure systems are "secure by design." This approach helps prevent critical vulnerabilities that are costly or impossible to fix after deployment.

  • Communication and Network Security connects secure design principles with network architecture, ensuring the core pathways for data transfer are structurally sound. If the foundational blueprint is flawed, operational monitoring alone cannot keep the environment secure.

  • Identity and Access Management (IAM) describes how to verify identities and restrict access, serving as the primary safeguard against unauthorised entry. Strong IAM controls prevent attackers from impersonating legitimate users and moving through your systems unnoticed.

  • Security Assessment and Testing verifies the effectiveness of security controls through detailed audits and penetration testing. This "trust but verify" approach uncovers hidden vulnerabilities so they can be addressed before attackers exploit them.

  • Security Operations implements daily security measures, including incident response and disaster recovery, to maintain business continuity. This enables quick detection of threats and rapid recovery after disruptions.

  • Software Development Security applies best practices to the Software Development Lifecycle (SDLC) to prevent coding vulnerabilities from the start. Fixing flaws during development is safer and more cost-effective than patching live systems. Establishes the governance, compliance, and risk frameworks necessary to align security initiatives with business goals. This foundation ensures that every security measure has a strategic direction, budget justification, and legal enforceability.