Overview Next training

Duration 2 days
Time from 09h00 - 12h00 & 13h00 - 17h00
Next training date 6 february until 7 february 2025
Next training location Van der Valk Hotel Brussels Airport

Our teachers for the training: Security Leader: Security Operations

Name

Date

Location

Register

Module Security Operations - presentation video

Eric De Smedt of our teaching team for this module explains what Security Operations is all about. 

How do you combine your information security and IT operations practices to improve collaboration and reduce risks?

In this training, you will learn how to set up and improve your organization’s security operations practically in your role as CISO. You will learn how to identify and manage your most important assets (including data).

One of the key components of a modern security architecture is Identity and Access Management (IAM). Indeed, controlling users and their access to the right resources is a challenging activity. Learn all about modern cloud and non-cloud authentication techniques (including Oauth, OpenID,…), Identity Governance and Administration platforms, PKI, and privileged identity and access management. In this context, we will also explore the management of encryption and key management.

Besides users, physical assets must also be managed. How do you make sure only authorized hardware and applications are used? Laptops, tablets, and smartphones are owned and managed by your organization. And what about BYOD, BYOK, and CYOD?…? During this module, you will learn how a CISO can manage assets such as devices and applications. How do you ensure assets are secure and still supported by the vendor? Do you have a good idea of which cloud-based applications are used by the employees? We will teach you the related practical ins and outs.

A critical element of security operations is managing your company network, which is no longer the border of your infrastructure. Our trainers will teach you how to secure access to wired, wireless, and cloud networks. We will also cover physical security components, such as badge readers, camera systems, burglary alarms, etc.

Running secure operations can be expensive. Certain aspects of these types of operations may be a candidate for outsourcing to lower cost, avoid attracting a specialized workforce, or simplify the work. What are the most common security operations to outsource, and which aspects deserve your attention? What kind of KPIs and SLAs should be put in place?

If your task is running and improving organization security operations as a CISO, then this training is for you!

Why take this course?

  • Get control over your most important assets
  • Better manage your organization’s identities and access
  • Understand how to protect your organization’s devices
  • Apply best practices to physical security
  • Outsource your security operations without losing control

 

This course is also the fourth module in a unique program intended to lead to formal CISO certification. To check out the other modules, download this file: CISO BROCHURE DOWNLOAD

Target group

What is the Certified CISO program’s ‘Security Operations” module intended for? This module targets information and cybersecurity officers, managers, and other security professionals tasked with running and improving your security operations. Those working in risk management and/or conducting security-related audits could also benefit from this course.

Learning goals

You will learn about your role as a CISO in:

  • Creating and maintaining an asset inventory
  • Governing your assets with classification and ownership
  • Managing your organization’s identities and access
  • Managing your organization’s devices
  • Securing your networks (wired, wireless, and cloud)
  • Manage your organization’s application security
  • Understanding physical security and its components
  • Applying best practices to physical security
  • Outsourcing security operations without losing control

The educational approach of this course

When it comes to establishing and running proper Security Operations, there are a variety of approaches. A one-size-fits-all formula doesn’t apply.

And it’s for that reason that this course has a two-fold objective. It aims to introduce you to the current best practices available and to supply you with the practical skills required to apply them correctly within your organization.

To accomplish this, we’ve lined up highly skilled professionals who have been in the trenches for years. They share practical advice and workarounds and teach you the core of what you need to know. The course itself blends theoretical models, frameworks, and standards to give you an overview of what’s out there, combined with practical exercises for applying what you’ve learned in real-life situations.

 

Day 1

09h00 - 17h00

1| Asset / Data Management

  • What are assets?
  • Create and maintain an asset inventory
  • Asset classification
  • Asset and data owners

2| Identity & Access Management

  • What are identities?
  • Modern authentication and authorization
  • Setting up and maintaining IAM, CIAM, PAM
  • IAM platforms and governance
  • Encryption and Key management

3| Device Management

  • What are devices?
  • Device configuration, tuning, updates, and maintenance
  • Mobile device management
  • Devices on the edge, datacenter, and in the cloud

Day 2

09h00 - 17h00

1| Network Management

  • Wired, wireless, and cloud networking
  • Network security and segmentation
  • Network security operations

2| Application Management

  • Application life cycle management and governance
  • Application security

3| Physical Infrastructure Management

  • Do we still need physical security in our digital life?
  • Physical security components
  • Physical access control
  • Physical security best practices

4| Security Outsourcing

  • Aligning security operations costs with your organization strategy
  • Security operations outsourcing models
  • Security operations SLAs

Price

€1.395

VAT exclusive

Certificate

"CISO Certificate of Completion"

Lunch, coffee, refreshments and course material included.

SME portfolio Flanders - higher subsidy for theme CYBERSECURITY: 45% for small and 35% for medium-sized enterprises.

Register now

Book a Call

Planning 2025

Name

Date

Location

Language

Register

Security Leader: Security Operations

6 February until 7 February 2025

EN

Security Leader: Security Operations

4 September until 5 September 2025

EN

Security Leader: Security Operations

24 September until 25 September 2025

FR

We are recognized by:

  • Registration number KMO portefeuille: DV.O213013

    Our courses are accredited for the KMO-portefeuille. This means that, depending on whether you are a small or medium-sized enterprise, you can receive a 45% or 35% subsidy (for cybersecurity) from the Flemish Government on the cost of registration.

  • Acknowledgement by Chèque-Formation

    The training voucher allows you to benefit from financial aid to train your workers in one of the approved training centres. Worth 30 euros, it corresponds to 1 hour of training per worker.

Stay informed via our newsletter

Stay connected with our latest news, offers and available training.

Newsletter
x

Stay informed via our newsletter

Stay connected with our latest news, offers and available training.

Newsletter
x

Enroll