Chapter 1: MSP business and compliance landscape
Week 1
Industry trends and evolving compliance requirements shape MSP services, posing unique regulatory challenges. Understanding key data protection laws is crucial, as non-compliance leads to penalties but also compliance offers a competitive edge. Successfully integrating compliance into MSP offerings fosters growth and trust. A case study, extra resources, and a quiz will reinforce these insights.
Chapter 2: Foundations of cybersecurity compliance and detection
Week 1
Cybersecurity compliance is essential, and MSPs play a key role in protecting businesses. Understanding key cybersecurity and compliance frameworks, directives, and laws, along with EDR, XDR, and MDR, strengthens security strategies. A case study on the Ascension ransomware attack provides real-world insights. Additional resources and a quiz will reinforce these concepts.
Webinar 1: Navigating the compliance and security framework landscape
Chapter 3: Endpoint detection and response (EDR) and extended detection and response (XDR)
Week 2
EDR architecture, key features, and leading products are essential for understanding modern security solutions. Hands-on labs and case studies will demonstrate EDR implementation, while XDR’s integration, analytics, and platforms will be explored. A practical threat-hunting exercise and a decision-making framework for MSPs will aid in choosing the right solution. Additional resources and a quiz will reinforce these concepts.
Chapter 4 : Vulnerability management
Week 2
Vulnerability management involves identifying, assessing, and mitigating security risks through a structured lifecycle. Key aspects include vulnerability assessment, patch management, reporting, and SLA management. Risk-based prioritization and automation enhance efficiency, while best practices lead to effective implementation. Integrating vulnerability management into compliance strengthens cybersecurity posture. Additional resources and a quiz will reinforce these concepts.
Chapter 5: Advanced threat detection techniques and SIEM
Week 3
Behavioral analysis, anomaly detection, and threat intelligence play a key role in modern cybersecurity, supported by frameworks like MITRE ATT&CK. Cloud workload protection, container security, SIEM, and advanced threat-hunting techniques help strengthen defenses. Topics like phishing, Zero Trust Architecture, and the 14 TTPs of attacks provide deeper insights. The chapter offers hands-on experience in detecting and mitigating attacks. A case study on the 23andMe data breach will illustrate real-world threats. Additional resources and a quiz will reinforce these concepts.
Webinar 2: Advanced detection and response techniques and technologies
Chapter 6: Managed detection and response (MDR) and SOC best practices
Week 3
MDR services rely on key components and delivery models to provide 24/7 monitoring and incident response. Effective SOC operations and performance metrics help MSPs measure security effectiveness. Evaluating MDR providers and their technologies ensures the right fit for an organization. A case study on Schneider Electric’s 2024 cybersecurity incidents, which occurred after hours, will highlight the critical importance of 24/7 monitoring. Additional resources and a quiz will reinforce these concepts.
Chapter 7: Compliance, maturity models, and comprehensive cybersecurity strategy
Week 4
The cybersecurity maturity model certification (CMMC) sets standards for cybersecurity, with compliance assessment and technology maturity at its core. Selecting and tailoring security controls, along with incident response planning, are critical for a strong defense. Understanding security reports like SOC 2, measuring effectiveness, and building a comprehensive strategy are key to improving cybersecurity posture. A case study will illustrate real-world application, followed by additional resources and a quiz to reinforce the concepts.
Webinar 3: Building a resilient cybersecurity strategy
Chapter 8: Final exam/certification
Week 4
Final summative assessment quiz, performance-based task, and course survey.