Security Analyst Program

For most modern business enterprises, the collection, processing, and storage of data is the driving force behind every transaction, decision, and strategy. In a business era where everyone and everything is networked and connected, data is the most valuable commodity. Therefore, it is extremely vital that every business take necessary precautions to protect their data from unauthorized access, particularly if such access is made by individuals with malicious intent.

Malicious criminals continue to plague the business world with constant, and all too often successful, attacks on IT infrastructure. So, in a regulatory and compliance environment where failing to protect sensitive or private data can result in costly fines and penalties, it is time for businesses to take a much more proactive approach to their data security protocols, policies, and procedures.

Advancing your career as a Security Analyst to take control of your enterprise’s IT security strategy, implementation, and testing is a good place to start. In general, Security Analysts are tasked with identifying weaknesses in current security systems and developing solutions to close security vulnerabilities. To perform this task well, ideal candidates will have highly advanced technical skills, a proven ability to communicate with all levels of an organization, and experience applying both skillsets to solve real problems.

The Security Analyst Program including Individual Performance Coaching is offered as a 5 days training program and is designed and certified by LEADing Practice and the Global University Alliance.

Security Analyst Disciplines

Developed by LEADing Practice in partnership with the Global University Alliance and industrial leaders in the market, the Security Analyst certification program covers technology analysis, systems and business analysis. It covers an analytical and modelling framework for integrating IT, technology platforms and infrastructure with strategy, innovation, value, requirements and complexity management.

The Security Analyst certification is awarded by an in-depth education programme combined with a personal project that becomes the foundation upon which to apply standards and receive individual performance coaching.

Individual Performance Coaching

It is only through coaching and building on the participant’s existing knowledge that capabilities are gained and applied.

Individual Performance Coaching is an integrated element of the Security Analyst education and training program to ensure that the frameworks, methods, approaches, and modelling principles are customized, adopted and applied in a real-world project setting with a personalized action plan.

The participant will discover how to drive forth fundamental changes within their organization and to achieve the objectives set in both innovation and transformation projects.

Upon successful completion of this program, you will become a certified Security Analyst.

The individual registration fee of €9,800 Euro (excl. VAT) covers tuition, handouts, case materials and conference facilities. Travel and accommodations is not included.

Important to note is that the Security Analyst Program requires input from interested parties as the program is tailored to each individual, team or organization and is customized with planned dates and location.

The program includes:

  • 5 days of classroom training
  • Individual Performance Coaching
  • 1 Security Analyst Certificate

To request a customized or closed program, or if you have questions about registration or multi-attendee discounts, please contact us.


Who Should Attend

The program is designed for professionals with 3+ years of business and/or IT experience:

  • Analysts: Strategy Analyst, Business Analyst, Financial Analyst, Process Analyst, System Analyst and Technology Analyst.
  • Managers: Business Manager, Project Manager, Product Manager, Process Manager, Service Manager, IT Manager and Technology Manager.
  • Specialists: Business Specialist, Value eXpert, Process Specialist, Method Specialist (TOGAF, Zachman, MoFA practitioner), Quality/Production/Manufacturing Specialist, System Specialist, Technology Specialist, and Enterprise Engineer.
  • Consultants: Business Consultant, Process Consultant, System Consultant, Transformation Consultant, Information Consultant and Technology Consultant.
  • Architects: Process Architect, Value Architect, Service Architect, Business Architect, Information Architect and Technology Architect.

Learning Model

Way of Thinking

  • Capture security forces and disruptive trends

  • Identify security gaps and pain points

  • Understand security strategies

  • Identify security requirements

  • Security performance management

  • Build security services that create value

  • Security innovation and transformation management

  • Complexity management around security

  • Decision making around security

Way of Working

  • Work with stakeholders, business and security owners

  • Benchmark security maturity levels

  • Security Business Model design

  • Security Model development

  • Develop security guidelines

  • Security Model definitions

  • Security Model analysis

  • Define security standardization and integration potential

  • Setup security measurements and monitoring

  • Apply continuous security improvement

Way of Modelling

  • Develop Security Stakeholder Map

  • Develop Security Requirement Map

  • Develop Security Strategy Maps

  • Define Security Capability Maps

  • Define the Security Landscape Canvas

  • Create Security Models

  • Optimize Security Models

  • Develop Security Service Models

  • Construct Security Operating Models