D
Cyber
D
Version Prepared by
1 Abdulmohsen AlKherayef
Do
Position Nmae
CISO
Document Name
Cybersecurity Training Plan
Document History
Reviewed by
Document Approval
Nmae
ment Name
ity Training Plan
ent History
Date
ent Approval
Date
Comments
Signature
# Employee Name Role/Position Cours
1
2
3
4
5
6
7
8
9
10
Institute Training DateDuration (Hours)Comments/Notes
Job Title Experience Level
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Cybersecurity GRC 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Cybersecurity SOC 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Cybersecurity VAPT 2-5 years
2-5 years
2-5 years
5+ years
Cybersecurity VAPT
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Cybersecurity Architecture 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Cybersecurity Engineering 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
Course
Introduction to Cybersecurity Governance
Compliance Essentials for Cybersecurity
Risk Management Fundamentals
Foundations of Information Security Audits
Cybersecurity Policy Development
ISO 27001 Implementation
CISSP Certification Preparation
IT Risk Management and Compliance
Cybersecurity Controls Auditing
Governance and Compliance in Cloud Security
CISM (Certified Information Security Manager)
Advanced Risk and Compliance Strategies
Cybersecurity Governance for Senior Executives
Developing and Leading Security Programs
Cybersecurity Regulatory Strategy
Introduction to SOC Operations
Security Incident Detection and Response
Threat Intelligence Essentials
SIEM Basics: Security Information and Event Management
Endpoint Security for SOC Analysts
Advanced Threat Detection with SIEM Tools (SEC555)
Network Traffic Analysis for SOC Analysts
Cyber Threat Hunting
Incident Response Lifecycle Management
SOC Metrics and Reporting
SOC Management and Optimization (MGT551)
Advanced Threat Intelligence and Forensics
Threat Hunting with Machine Learning
SOC Automation and Orchestration
Cybersecurity Leadership in SOC Operations
Introduction to Vulnerability Assessment
Basic Penetration Testing (CEH)
Ethical Hacking Essentials
Web Application Security Testing
Network Vulnerability Scanning
Advanced Penetration Testing (SEC660)
Exploit Development and Analysis
Red Team vs. Blue Team Operations
Application Security: Hands-On Testing (OSWE)
Wireless Security Penetration Testing
Offensive Security Certified Professional (OSCP)
Exploit Development for Advanced Penetration Testers
Web Application Penetration Testing: Advanced
Cyber Range Simulation for VAPT
Red Team Operations for Senior Analysts
Introduction to Security Architecture
Designing Secure Network Architectures
Cloud Security Architecture Fundamentals
Identity and Access Management (IAM) for Architects
Zero Trust Architecture Basics
Security Architecture for Cloud Environments (SEC545)
Designing Secure Applications
Enterprise Security Architecture
Advanced Zero Trust Architectures
Identity Federation and Architecture
TOGAF Certified Architect for Security Professionals
Cloud Security Architecture: Expert Level (SEC545)
Advanced Security Architecture in Hybrid Environments
Leading Enterprise Security Architecture
Zero Trust Architecture for Global Enterprises
Foundations of Cybersecurity Engineering
Secure Software Development Life Cycle (SDLC)
Network Security Engineering Basics
Introduction to Cryptography
Endpoint Security Engineering
Advanced Cryptography for Engineers (SEC575)
Secure Coding Practices
Advanced Network Security Engineering
Engineering for Incident Response
Cloud Security Engineering
Certified Cloud Security Professional (CCSP)
Advanced Security Engineering for DevOps (SEC540)
Zero Trust Engineering
Security Engineering Leadership
Advanced Cryptographic Systems Design
Institute
Cybrary
Infosec Institute
EC-Council
SANS Institute
Coursera (University of London)
BSI
(ISC)²
ISACA
Pluralsight
Cloud Security Alliance (CSA)
ISACA
MIT Sloan (Executive Education)
Harvard University
SANS Institute
Coursera (University of London)
Cybrary
Infosec Institute
EC-Council
Offensive Security
Pluralsight
SANS Institute
Coursera (IBM)
CrowdStrike
EC-Council
Infosec Institute
SANS Institute
FireEye Mandiant
MITRE ATT&CK
Splunk
ISACA
Cybrary
EC-Council
Pluralsight
Offensive Security
Infosec Institute
SANS Institute
EC-Council
Infosec Institute
Offensive Security
Pluralsight
Offensive Security
SANS Institute
Offensive Security
EC-Council
MITRE ATT&CK
Cybrary
Infosec Institute
Cloud Security Alliance (CSA)
EC-Council
Pluralsight
SANS Institute
EC-Council
(ISC)²
Cloud Security Alliance (CSA)
Offensive Security
The Open Group
SANS Institute
ISACA
Harvard University
MIT Sloan School of Management
Cybrary
Infosec Institute
EC-Council
Pluralsight
Offensive Security
SANS Institute
(ISC)²
Cloud Security Alliance (CSA)
FireEye Mandiant
Google Cloud (Coursera)
(ISC)²
SANS Institute
Cloud Security Alliance (CSA)
MIT Sloan School of Management
Harvard University
Job Title Experience Level
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
Infrastructure 2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
IT Security 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
2-5 years
Developers 2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
5+ years
5+ years
0-2 years
0-2 years
0-2 years
0-2 years
0-2 years
2-5 years
IT Project Managers 2-5 years
2-5 years
2-5 years
2-5 years
5+ years
5+ years
5+ years
Course
Network Security Fundamentals
Introduction to Cloud Security
CompTIA Security+ Certification
IT Infrastructure Security
Network Security Essentials
Cloud Infrastructure Security
Certified Network Defender (CND)
Zero Trust Network Security
Certified Information Systems Security Professional (CISSP)
Cloud Security for Infrastructure Architects
Certified Cloud Security Professional (CCSP)
Securing Enterprise Networks
Infrastructure Security Automation
Introduction to Information Security
Cybersecurity Essentials
CompTIA Security+ Certification
IT Security Fundamentals
Ethical Hacking Basics
Certified Ethical Hacker (CEH)
Certified Information Security Manager (CISM)
Cyber Defense Analyst
Security Operations and Incident Response
Security Awareness and Compliance
Certified Information Systems Security Professional (CISSP)
GIAC Certified Incident Handler (GCIH)
Advanced Network Security
Offensive Security Certified Expert (OSCE)
Cybersecurity Risk Management
Secure Coding Fundamentals
OWASP Top 10 Vulnerabilities
Introduction to Secure Software Development
Secure Software Design
Web Application Security Basics
Certified Secure Software Lifecycle Professional (CSSLP)
Application Security Testing Fundamentals
Secure DevOps
Advanced Web Application Security Testing
Securing APIs
Advanced Software Exploit Development
Offensive Security Web Expert (OSWE)
Certified Secure Developer (CSD)
Advanced Secure Coding Practices
Penetration Testing for Developers
Cybersecurity for IT Project Managers
Foundations of IT Risk Management
Introduction to Cybersecurity for Business
Cybersecurity Project Management
Information Security Management
Certified Information Security Manager (CISM)
IT Project Risk and Compliance Management
Cybersecurity Project Management Fundamentals
Managing Cloud Security Projects
Cybersecurity Governance for Project Leaders
Cybersecurity Program Management
Strategic IT Security Planning and Management
Advanced Risk and Compliance for IT Projects
Institute
Cybrary
Pluralsight
Infosec Institute
Coursera
EC-Council
SANS Institute
EC-Council
Pluralsight
(ISC)²
SANS Institute
(ISC)²
Cisco
Ansible by Red Hat
SANS Institute
Cisco Networking Academy
Cybrary
Pluralsight
EC-Council
EC-Council
ISACA
SANS Institute
Infosec Institute
Coursera
(ISC)²
SANS Institute
EC-Council
Offensive Security
Harvard University
SANS Institute
Pluralsight
Cybrary
Infosec Institute
Coursera
(ISC)²
SANS Institute
Pluralsight
EC-Council
Offensive Security
SANS Institute
Offensive Security
EC-Council
Infosec Institute
Offensive Security
Pluralsight
Coursera
Coursera
Cybrary
Infosec Institute
ISACA
Pluralsight
SANS Institute
Cloud Security Alliance
Harvard University
SANS Institute
MIT Sloan
Harvard University
Executive
Course Name
Cybersecurity for Business Leaders
Cybersecurity Leadership for Non-Technical Executives
Cybersecurity Risk and Governance for Executives
Cybersecurity Essentials for Executives
Cybersecurity Risk Management for Leaders
Cybersecurity Leadership & Strategy
Advanced Cybersecurity Governance for Executives
Cybersecurity Risk and Strategy
Cybersecurity Executive Leadership
Cybersecurity Strategy for Executives
Global Executive Cybersecurity Program
Board-Level Cybersecurity Strategy
Institute
Harvard University
MIT Sloan School of Management
MIT Sloan School of Management
SANS Institute
INSEAD
Stanford University
Harvard Kennedy School
Oxford University (Saïd Business School)
MIT Sloan School of Management
Wharton School
Columbia Business School
London Business School