We may earn an affiliate commission when you visit our partners.
Pluralsight LIVE

Join this session to learn best practices from a top security leader who has the experience, influence and passion to ensure his organization is skilled up and prepared to tackle the security challenges of today and into the future.

Read more

Join this session to learn best practices from a top security leader who has the experience, influence and passion to ensure his organization is skilled up and prepared to tackle the security challenges of today and into the future.

Developing security skills at scale and speed is a challenge for most organizations. Diagnosing needs and prescribing effective solutions is only possible by embracing a flexible, dynamic approach to skills development, as well as leveraging strategic internal and external partnerships. Join this session to learn best practices from a top security leader who has the experience, influence and passion to ensure his organization is skilled up and prepared to tackle the security challenges of today and into the future. Hear how they have built strong cross-functional relationships and partnered with Pluralsight to deliver on the ever-changing dynamics in the security world.

Enroll now

What's inside

Syllabus

Personally Invested, Professionally Inspired: A Conversation with Darrell Stymiest, Liberty Mutual

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches best practices for security skills development at scale and speed
Led by a top security leader known for their experience and passion in the field
Relevant for security professionals at all levels, particularly those responsible for developing and implementing security skills training programs
Emphasizes the importance of cross-functional collaboration and external partnerships for effective security skills development
May require additional time and effort to apply the best practices to specific organizational contexts
Does not delve into technical security concepts or specific security technologies

Save this course

Save Personally Invested, Professionally Inspired: A Conversation with Darrell Stymiest, Liberty Mutual to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Personally Invested, Professionally Inspired: A Conversation with Darrell Stymiest, Liberty Mutual with these activities:
locate a security mentor
A mentor can provide you with guidance and support as you learn about and develop your security skills
Browse courses on Security Best Practices
Show steps
  • Identify the qualities you are looking for in a mentor.
  • Reach out to potential mentors and ask them if they are willing to mentor you.
research and compile a list of security resources
Compiling a list of resources will help you organize and easily access the information you need to succeed in this course.
Browse courses on Security Best Practices
Show steps
  • Identify the types of resources that you need.
  • Search for resources that meet your needs.
  • Organize the resources in a way that makes sense to you.
search and watch online videos on security topics
Guided tutorials can help you learn new concepts or reinforce your understanding of existing concepts.
Browse courses on Security Best Practices
Show steps
  • Identify a topic that you want to learn more about.
  • Search for online videos that cover the topic.
  • Watch the videos and take notes.
Five other activities
Expand to see all activities and additional details
Show all eight activities
complete practice problems on security topics
Practice problems will help you solidify your understanding of the security concepts covered in the course.
Browse courses on Security Best Practices
Show steps
  • Identify practice problems that cover the topics you are struggling with.
  • Set a timer and work through the problems.
  • Check your answers and identify areas where you need more practice.
host a study session
Hosting a study session can help you solidify your understanding of the material, identify areas where you need more practice, and learn from your peers
Browse courses on Security Best Practices
Show steps
  • Choose a topic that you are interested in reviewing or learning more about.
  • Invite your peers to join you for a study session.
  • Prepare materials that will help you lead the discussion.
  • Start the discussion and encourage your peers to participate.
  • Take breaks as needed and allow for open discussion
research a potential security breach
Conducting research on potential security breaches will provide you with hands-on experience in identifying and mitigating security risks
Browse courses on Security Best Practices
Show steps
  • Identifying the type of personal information that could be compromised in a data breach
  • The potential financial and reputational damage that could result from a data breach
  • The steps that can be taken to prevent a data breach
  • Steps that can be taken to mitigate the effects of a data breach
participate in an open-source security project
Participating in an open-source security project will give you hands-on experience in working on real-world security problems
Browse courses on Security Best Practices
Show steps
  • Identify an open-source security project that you are interested in.
  • Contribute to the project in a way that aligns with your skills and interests.
perform a security assessment for a local nonprofit
Performing a security assessment for a local nonprofit will give you hands-on experience in identifying and mitigating security risks
Browse courses on Security Best Practices
Show steps
  • Contact a local nonprofit and offer your services.
  • Schedule a time to meet with the nonprofit's staff to discuss their security needs.
  • Conduct a security assessment of the nonprofit's network, systems, and applications.
  • Create a report of your findings and recommendations.
  • Present your report to the nonprofit's staff.

Career center

Learners who complete Personally Invested, Professionally Inspired: A Conversation with Darrell Stymiest, Liberty Mutual will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's entire information security program. They develop and implement security policies and procedures, oversee the implementation of security systems and technologies, and manage the organization's security team. This course may be useful for CISOs as it provides insights into the latest security challenges and best practices for addressing them.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect an organization's information assets. They also oversee the implementation of security systems and technologies. This course may be useful for Information Security Managers as it provides insights into the latest security challenges and best practices for addressing them.
Security Architect
Security Architects design and implement security solutions that protect an organization's information assets. They also work with other IT professionals to develop and implement security policies and procedures. This course may be useful for Security Architects as it provides insights into the latest security challenges and best practices for addressing them.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They also help organizations to develop and implement security policies and procedures. This course may be useful for Security Consultants as it provides insights into the latest security challenges and best practices for addressing them.
Security Engineer
Security Engineers design, implement, and maintain security systems to protect organizations from security breaches. They also work with other IT professionals to develop and implement security policies and procedures. This course may be useful for Security Engineers as it provides insights into the latest security challenges and best practices for addressing them.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze security systems to detect and prevent cyberattacks. They also investigate cybersecurity incidents and develop and implement cybersecurity policies and procedures. This course may be useful for Cybersecurity Analysts as it provides insights into the latest security challenges and best practices for addressing them.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization's information assets. They also develop and implement risk management policies and procedures. This course may be useful for Risk Analysts as it provides insights into the latest security challenges and best practices for addressing them.
Security Auditor
Security Auditors assess the security of an organization's information systems. They also develop and implement security audit reports and recommendations. This course may be useful for Security Auditors as it provides insights into the latest security challenges and best practices for addressing them.
Security Awareness Trainer
Security Awareness Trainers develop and deliver security awareness training programs for employees. They also work with other IT professionals to develop and implement security policies and procedures. This course may be useful for Security Awareness Trainers as it provides insights into the latest security challenges and best practices for addressing them.
Security Analyst
Security Analysts monitor and analyze security systems to detect and prevent security breaches. They also investigate security incidents and develop and implement security policies and procedures. This course may be useful for Security Analysts as it provides insights into the latest security challenges and best practices for addressing them.
Compliance Officer
Compliance Officers ensure that an organization complies with all applicable laws and regulations. They also develop and implement compliance policies and procedures. This course may be useful for Compliance Officers as it provides insights into the latest security challenges and best practices for addressing them.
Incident Responder
Incident Responders are responsible for responding to and resolving security incidents. They also develop and implement incident response plans and procedures. This course may be useful for Incident Responders as it provides insights into the latest security challenges and best practices for addressing them.
Penetration Tester
Penetration Testers identify and exploit vulnerabilities in an organization's security systems. They also develop and implement penetration testing policies and procedures. This course may be useful for Penetration Testers as it provides insights into the latest security challenges and best practices for addressing them.
Malware Analyst
Malware Analysts analyze malware to identify its purpose and how it works. They also develop and implement malware detection and prevention strategies. This course may be useful for Malware Analysts as it provides insights into the latest security challenges and best practices for addressing them.
Security Researcher
Security Researchers identify and exploit vulnerabilities in software and hardware systems. They also develop and implement security research tools and techniques. This course may be useful for Security Researchers as it provides insights into the latest security challenges and best practices for addressing them.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Personally Invested, Professionally Inspired: A Conversation with Darrell Stymiest, Liberty Mutual.
Provides a comprehensive overview of cryptography and network security, covering topics such as cryptography algorithms, network security protocols, and network security threats. It valuable resource for security professionals looking to learn more about cryptography and network security.
Provides a comprehensive overview of cybersecurity, covering topics such as cybersecurity threats, cybersecurity technologies, and cybersecurity best practices. It valuable resource for anyone looking to learn more about cybersecurity.
Provides a comprehensive overview of security engineering, covering topics such as system design, threat modeling, and security analysis. It valuable resource for security professionals looking to design and build secure systems.
Provides a comprehensive overview of security analysis, covering topics such as security requirements, security vulnerabilities, and security testing. It valuable resource for security professionals looking to learn more about security analysis.
Provides a comprehensive overview of network security assessment, covering topics such as network scanning, vulnerability assessment, and penetration testing. It valuable resource for security professionals looking to improve their network security posture.
Provides a practical guide to network security, covering topics such as network scanning, intrusion detection, and forensics. It valuable resource for security professionals looking to improve their network security posture.
Provides a practical guide to penetration testing, covering topics such as penetration testing methodologies, tools, and reporting. It valuable resource for security professionals looking to learn more about penetration testing.
Provides a hands-on approach to learning information security, covering topics such as network security, cryptography, and malware analysis. It valuable resource for security professionals looking to improve their practical skills.
Provides a comprehensive overview of security risk management, covering topics such as risk assessment, risk mitigation, and risk reporting. It valuable resource for security professionals looking to improve their security risk management practices.
Provides a comprehensive toolkit for conducting information security risk assessments. It includes templates, checklists, and other resources to help security professionals identify, assess, and mitigate risks.
Provides a comprehensive catalog of security controls for computer networks and information systems. It valuable resource for security professionals looking to implement or improve their security controls.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser