Course Overview

When hiring for jobs in cybersecurity and other technical fields, managers and company leaders deliberately look for the specific technical skills a given job requires such as programming or data analysis. This makes sense; they want to hire someone who has the skills needed to complete the tasks within the scope of the role. Furthermore, most managers aim to hire someone with previous experience in a given role because it helps them feel confident that the candidate is competent in the role in question. Unfortunately, these conventional hiring practices create a series of critical oversight based on one underlying misunderstanding. The truth is, experience, degree, or even certification does not equal skill. Real skill means not just being able to do one define action, it means understanding how those actions and day-to-day processes impact a business and being able to solve problems creatively and swiftly. Just because I’ve been doing something for 15 years doesn’t mean I’m skilled at it. It just means I’m good at repetition. And hiring based on experience often means bringing in people’s both good and bad habits that was embedded over time in the field. 

So, if technical skills alone aren’t enough then what should these companies and hiring managers be looking for, on top of the required technical skills? Simply put, the answer is soft skills. In cybersecurity, the number one most valuable trait is having the ability to communicate in a precise verbal way to all the relevant people. Unfortunately, schools and training programs focus on technical skills and ignore communication. This poses a real problem, since we already established that communication skills are paramount in this industry. In cybersecurity, business and technology teams converge to work together on achieving the same end goal, which is to help the company become more profitable while maintaining security. If the IT guy can’t speak to the business person, who already doesn’t understand the technology, then there’s going to be a disconnect. Hiring managers are starting to understand they should focus their efforts on bringing in folks who can explain a complex topic in such a way someone can easily understand, and from that explanation, can also understand their action items. A good IT person can only make good recommendations when they understand the company's objectives and avoid working in a silo. Understanding the big picture leads to innovation and system and process improvements. And on a personal level, if you want to take your career to the next level, you’ve got to understand the big picture. 

This course will show you how to stop being the typical IT guy and become a business technology professional. In addition to that, will deliver expert advice on leadership skills and understanding the importance of sales skills, which will enable you to shine and stand out compared to the other candidates that is interviewing for the role. Are you thinking about that dream job you desire? However, you’re struggling in the interview, and it feels like an interrogation. You will also learn how to take control of the interview and convey to them that you are the person for the job. Don’t be just another IT guy, be a business IT professional.

What You Will Learn

  • Understand the concept of authority consciousness and its relevance in leadership.
  • Gain insights into the responsibilities and expectations of a cybersecurity leader.
  • Identify and develop key leadership skills required in the cybersecurity field.
  • Learn how these skills contribute to effective leadership in security roles.
  • Explore major cybersecurity frameworks
  • including PCI DSS
  • NIST CSF
  • ISO 27001
  • CCPA
  • HIPAA
  • and GDPR.
  • Discover fundamental principles of management and negotiation skills.
  • Understand the importance of continuous learning in the ever-changing field of cybersecurity.
  • Identify common pitfalls and mistakes that cybersecurity leaders should avoid.
  • Gain insights into critical leadership missteps and their consequences.
  • Understand how KPIs contribute to performance measurement and goal attainment.
  • Develop skills in risk assessment and management within the cybersecurity context.
  • Explore methods for evaluating and prioritizing cybersecurity risks effectively.

Program Curriculum

  • Course welcome and what things will cover
  • Key Aspects of a Cybersecurity Leader
  • $7 Million Cybersecurity Scholarship by EC-Council

  • The Authority Consciousness
  • Team Building and Self-awareness
  • Decision Maker and Problem-Solving
  • Integrity and Ethics
  • Relationship, Likability, and Passion
  • The Typical IT Guy

  • NIST Series
  • NIST CSF Glossary
  • Insight to NIST CSF 2.0
  • HIPPA
  • CCPA

  • What is PCI DSS?
  • What is the PCI SSC?
  • PCI DSS Glossary
  • Report on Compliance (ROC)
  • Attestation of Compliance (AOC)
  • Self-Assessment Questionnaire (SAQ)
  • Understanding the PCI DSS Template
  • Insight to PCI DSS v4.0
  • The Crosswalk Tool

  • Culture Management
  • Stakeholder Management, and Negotiation Skills
  • Change Management
  • Budget Management
  • Personnel and Project Management
  • Key Performance Indicators (KPIs)
  • Information Security Policies

  • The Vulnerability Management Lifecyle
  • Crisis Management
  • Evaluating Risk

  • Overview of Key Takeaways from Course
  • Errors to Avoid as a Cybersecurity Leader
  • Thank You and Contact Information
Load more modules

Instructor

Joshua McDonald

Joshua McDonald is the former Information Security Manager for one of the largest tech giants in the world Google, along with being the former Vulnerability Management Analyst at Amazon. Furthermore, he is currently a PCI DSS and a Vulnerability Management Consultant. His expertise has helped fortune 500 companies such as the banking institution and the airline industry on how to not only achieve or maintain compliance against the industry regulations but also help offset the risk of losing millions of dollars and building systematic processes that turns compliance to business as usual. In addition to that, he has helped other cybersecurity professionals fine tune their knowledge, leadership traits, and provide guidance on how to break into the cybersecurity domain. He has a Computer Science background before transition into the cybersecurity domain and has certifications in Cybersecurity Asset Management (CSAM), Patch Management (PM), Vulnerability Management Detection and Response (VMDR), Vulnerability Management (VM), Policy Compliance (PC), and Web Application Scanning (WAS). What’s even more impressive is he accomplished those milestones during that time, with no college degree, no prior certifications. In addition to that, he wasn’t even qualified in the slightest for the position that he had received from Google, nor did he submit a single job application for the role, and stated he didn’t even want the role initially. However, the hiring manager made it extremely clear that she made the decision to extend the offer letter over all the other qualified candidates who had considerable qualifications over him due to his leadership traits, invaluable expertise in PCI DSS and Vulnerability Management. He has been where you are at, so we asked him to step in and deliver this leadership course, so you can understand why it is essential to adopt these traits and take your career to the next level. He has an uplifting personality, is extremely excited to teach this course and can’t wait to hear from you guys.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $69.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 699.00
Billed annually or $79.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8