This course helps leaders understand how their decisions, behavior, and communication influence organizational security. It focuses on real-world threats such as targeted phishing, CEO fraud, shadow IT, and third-party risk, and how attackers exploit trust and governance gaps. By the end of the course, leaders will be prepared to model secure behavior, promote a security-first culture, recognize suspicious activity, and respond appropriately to security incidents.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
36m
Skills Learned
After completing this online training course, students will be able to:
Recognize and respond to targeted attacks, including phishing and whaling
Reinforce a security-first mindset through leadership behavior
Identify risks from shadow IT and third-party services
Apply least privilege and understanding access review responsibilities
Escalate security concerns and making informed decisions during incidents
- Team Leads
- Managers
- Human Resources (HR)
- Directors
- VPs
None
01. Security Leadership Essentials
- Modeling Security Behavior
- Encouraging a “security-first” Mindset
- CEO Fraud, Spear Phishing, and Whaling Attacks
- Real World Examples of Executive Targeted Breaches
- Understanding Shadow IT
- Third-party Tools and Services
- Reacting to Breaches and Suspicious Activity
- Escalation Paths and Communication Protocols
- Principle of Least Privilege
- Reviewing and Revoking Access
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Recognize and respond to targeted attacks, including phishing and whaling
Reinforce a security-first mindset through leadership behavior
Identify risks from shadow IT and third-party services
Apply least privilege and understanding access review responsibilities
Escalate security concerns and making informed decisions during incidents
WHO SHOULD ATTEND
- Team Leads
- Managers
- Human Resources (HR)
- Directors
- VPs
PREREQUISITES
None
COURSE OUTLINE
01. Security Leadership Essentials
- Modeling Security Behavior
- Encouraging a “security-first” Mindset
- CEO Fraud, Spear Phishing, and Whaling Attacks
- Real World Examples of Executive Targeted Breaches
- Understanding Shadow IT
- Third-party Tools and Services
- Reacting to Breaches and Suspicious Activity
- Escalation Paths and Communication Protocols
- Principle of Least Privilege
- Reviewing and Revoking Access

