
Course Overview
This non-technical seminar affords students with a solid foundation for navigating the complex, ever-changing IT security industry.
If you're new to the IT security industry, or you'd like to expand your security industry base knowledge, this is a unique opportunity for you to gain two years' worth of security industry experience in less than eight hours! This non-technical course is custom-designed for sales, marketing, and other customer-facing personnel employed by IT security vendors and service providers.
In this live seminar, students will:
- Learn 50+ new vocabulary terms
- Understand how cyberthreats work
- Identify five types of cyberthreat actors
- Explore 30+ common security defenses
- Learn about PCI, HIPAA, GDPR, and more
- Gain tips for targeting security buyers
- Compete for prizes in Security Industry Trivia game
- Receive a glossary of security terms

This course is presented by Steve Piper, CEO of CyberEdge Group -- an award-winning marketing firm that services approximately one in every six security vendors. Steve is a CISSP (we'll cover that in the course) and has authored more than a dozen books on IT security topics. Steve is a highly rated and entertaining instructor. He has an uncanny ability to simplify complex topics through real-world metaphors and humor.
The following is the agenda for our 3-day virtual online seminars:
| Day One | |
|---|---|
| TIME: | DESCRIPTION | 
| 1:00pm - 1:15pm | Welcome and Course Overview | 
| 1:15pm - 2:30pm | Learning a New Vocabulary | 
| 2:30pm - 2:45pm | *** BREAK *** | 
| 2:45pm - 3:00pm | Classifying Our Cyber Adversaries | 
| 3:00pm - 3:30pm | Surveying the Cyberthreat Landscape | 
| Day Two | |
|---|---|
| TIME: | DESCRIPTION | 
| 1:00pm - 2:30pm | Exploring Security Technologies | 
| 2:30pm - 2:45pm | *** BREAK *** | 
| 2:45pm - 3:30pm | Exploring Security Technologies | 
| 1:30pm - 2:15pm | Tips for Targeting Security Buyers | 
| Day Three | |
|---|---|
| TIME: | DESCRIPTION | 
| 1:00pm - 1:30pm | Complying with Frameworks and Regulations | 
| 1:30pm - 2:15pm | Tips for Targeting Security Buyers | 
| 2:15pm - 2:30pm | *** BREAK *** | 
| 2:30pm - 3:15pm | Security Industry Trivia Game | 
| 3:15pm - 3:30pm | Wrap-Up, Open Q&A, and Evaluation Form | 
The following is the agenda for our public in-person classes:
| TIME | DESCRIPTION | 
|---|---|
| 8:00am – 8:30am | Registration & Continental Breakfast | 
| 8:30am – 8:45am | Welcome and Course Overview | 
| 8:45am – 10:00am | Learning a New Vocabulary | 
| 10:00am – 10:15am | Classifying Our Cyber Adversaries | 
| 10:15am – 10:30am | *** BREAK *** | 
| 10:30am – 11:00pm | Surveying the Cyberthreat Landscape | 
| 11:00am – 12:00pm | Exploring Security Technologies: Network Security | 
| 12:00pm – 12:45pm | *** LUNCH *** | 
| 12:45pm – 2:00pm | Exploring Security Technologies: Endpoint Security, Mobile Security, Datacenter Security, Virtualization and Cloud Security, Security Management and Operations | 
| 2:00pm – 2:30pm | Complying with Frameworks and Regulations | 
| 2:30pm – 2:45pm | *** BREAK *** | 
| 2:45pm – 3:30pm | Tips for Targeting Security Buyers | 
| 3:30pm – 4:15pm | Security Industry Trivia Game | 
| 4:15pm – 4:30pm | Wrap-Up, Open Q&A, and Evaluation Form | 


“I don’t often rave about training seminars, but this one was AMAZING! I learned lots of useful stuff. Keep up the great work, Steve!”
~ Mihaela G.