Cyber Security for the Physical Security Professional

One-of-kind online course shows you how to use your existing physical security knowledge and experience to break through the physical/cyber barrier

Are You Ready to Prepare Yourself for the Security Career of Tomorrow?


The world of the security professional – whether cyber, physical, life safety, risk management, or other – grows more and more complex every day with the advent of new and advanced technologies and ever-increasing threats.

And while much of the cybersecurity world seems like a mystery shrouded in technological buzz words and an endless stream of amazing new devices, the reality is that you don’t have to be a technical genius to understand the fundamentals of cybersecurity or to make a difference in protecting your organization.

In fact, it’s easier than you think to cross the physical/cyber divide because your physical security career and knowledge provides the foundation on which to build your understanding of cybersecurity risks and how you can protect your people, information, and protect against those risks.

Cyber Security for the Physical Security Professional is the first course specifically designed to help physical security professionals learn the fundamentals of cybersecurity, so they can take the first steps towards crossing the physical/cyber divide and prepare themselves for an exciting and rewarding career as an in-demand cybersecurity professional.

Hacker 3

Colleagues, in the environment we are in today it is imperative that you have a working knowledge of the Cyber space. This program will give you the necessary tools to hold your own in a C suite discussion. Dave is a master at being able to explain in plain English what you need to know. This is an investment in your future.

Ray O'Hara

Vice President, AS Solutions

Course Overview

Cyber Security for the Physical Security Professional is a comprehensive, self-paced video course that consists of 15 modules and covers everything you need to know to take your first steps towards an exciting new career as an in-demand cybersecurity professional.

Business impacts of cybersecurity

Fundamental connections between physical and cybersecurity

Core components of Information Technology and how IT builds security

Buzzwords and terminology you need to know

Core cybersecurity risks you need to know

Linking physical and cyber together in an operational way

Understanding the "threat actors" (bad guys) from an intelligence perspective

How attacks happen and what you can do about it

The economics of different types of attacks and how they change business decision-making

The Internet of Things (IoT), digital business impacts and drivers of risk

Introduction to the dark web

Putting all of this to work in your organization

This kind of training is crucial for developing a more rounded and informed security professional equipped for the problems of today and tomorrow, not yesterday. This is simply the only program I am aware of that delivers what is needed, in a language everyone can understand.

John Petruzzi

Vice President, G4S

Who This is For

Cyber Security for the Physical Security Professional is ideal for physical security professionals - in contract or in-house roles - who want to unlock the secrets to the world of cybersecurity and take the first steps towards opening the door to new career potential and opportunities.

Security Officers

Security Supervisors

Security Managers

Security Directors

Life Safety Managers

Risk Managers

Security Consultants

Contract Security Managers

In-House Security Managers

And many more

This program is one of a kind, it gives the attendees a real foundational understanding of Cyber Security and leverages their existing security knowledge to accelerate the learning process.

Tim McCreight

Partner, Risk Rebels

Dave Tyson
Dave Tyson - MBA, CPP, CISSP

Your Instructor

Dave Tyson has spent 35 years in the security profession - the first 15 of which were spent working for a variety of contract security firms in a wide range of roles - from mall security to Vice President of Operations.

He has spent the last 20 years in the cybersecurity space, where he has distinguished himself as one of the leading voices and has held leadership positions with eBay, Nike, PG & E, and SC Johnson & Sons.

Dave is also a past President of the American Society of Industrial Security (ASIS).

Over 5.5 Hours of Content

Lifetime Access

Acceptable for CPE Credits

Anytime / Anywhere Access

Module-Based Learning

Private Facebook Group

Quiz-Based Progress

Plain English

Certificate for Passing

Course Modules

Cyber Security for the Physical Security Professional comprises 15 modules that, combined, total just over 5.5 hours. All but the first module have quizzes you're required to pass before proceeding to the subsequent lesson. Upon successful completion of the course, you will be issued a certificate of completion.


Module 1 introduces the program content and review the Instructor profile. This section presents the foundational structure of the course material and provides an overview of all the modules and learning objectives for each. The module provides an overview of the changing business world and its impact on security and what the implications are for the security practitioner.

  • Review Instructor profile
  • The foundational structure of the course material
  • Overview of all the modules and learning objectives
  • Overview of the changing business world and its impact on security


Module 2 introduces the participant to the basics of cyber security theory as a grounding to build the course material on. Initial discussions focus on common physical security topics and connects them through common language to related cybersecurity material to begin the journey of understanding cybersecurity in plain English. This Sets the stage for program learning by connecting common security concepts to cyber topics while enabling the participant to utilize their existing security knowledge in the construct of Cyber examples.

  • Introduce you to the basics of cybersecurity theory
  • Introduce common physical security topics and link them to cybersecurity
  • Set the stage for your program learning by connecting common security concepts to cyber topics


Module 3 will expand the participant’s cybersecurity knowledge in understanding how the protection of cyber systems and data is created by understanding and combining the component parts of the cybersecurity defensive makeup of people, process & technology. The module also sets the stage for participant program learning by creating a basic framework level set on technical terminology and creates user confidence in understanding the techno-speak for future modules. This technical grounding, in the context of physical security concepts, allows the participant to tackle the core components of a cybersecurity problem and the technical language, within what they now understand.

  • Expand your cybersecurity knowledge in understanding how protection of cyber systems can be designed
  • Set the stage for your program learning by creating a basic framework to apply technical terminology of future modules to
  • Technical grounding in the context of physical security concepts

Module 4 – Terminology Building Blocks

Module 4 starts by expanding the basic cybersecurity terms, buzzwords and concepts as a launching point for now learning more advanced terminology commonly used in most IT departments today. Pulling these together allows the participant to begin to look at cybersecurity as an entire system and explore it in more depth.

  • Basic terms
  • Buzzwords
  • More advanced terminology
  • Pulling them together

Module 5 – Security Architecture

Module 5 begins the journey in cybersecurity architecture fundamentals and introduces the participant to a simple way to relate traditional physical security architecture concepts to cybersecurity defenses. By aligning these more structural physical and cyber concepts, we can now see what core defenses need to be in place to protect our organizations today and where some of the risks may exist when these structural components are missing. The participant can now begin to see risk as a driver of cyber tool selection and program development.

  • Security architecture concepts
  • Aligning physical and cyber concepts
  • Risk as a driver of cyber tool selection

Module 6 – The Weakest Link

In module 6 the participant is introduced to cybersecurity management models and very similar in theory to physical security concepts. Traditional concepts such as trust and user authentication are explored to develop a more advanced view of the management of cyber risk. A deeper dive into network technology is presented to understand and link the trust concept to network and networking structure and technology.

  • Cybersecurity management models
  • Mutual trust
  • Network technology

Module 7 – The Advanced Bits

In module 7 we explore cybersecurity management and the decision-making model for managing, mitigating and accepting risk. We begin to explore attack terminology and attacker tools & techniques to understand the adversary and how they typically exploit a weakness in an organization's cyber defenses.

  • Cybersecurity management
  • Attack terminology
  • Cyberattack tools & techniques

Module 8 – Malware

One of the greatest threats organizations face today is from malware (viruses), this module will provide a basic easy to understand grounding on malware including definitions and how it's used by hackers and criminals. It explores the methods by which organizations get malware and what some of the defenses available are for organizations to protect themselves from malware. Finally, this module looks at the business implications of not dealing with malware effectively and what can happen, for consideration when contemplating how much risk is appropriate in your security plan.

  • Definition
  • Uses
  • How you get it
  • Defenses
  • Implications

Module 9 – Who & How

Module 9 explores in detail cyber adversaries, or simply put the category of bad guys who attack organizations and how they are different from each other. Participants will understand the threat sources and attack methods utilized by these attacker groups. Further, participants will learn about targeted attacks and why these present an additional level of risk for organizations.

  • Cyber adversaries
  • Threat sources
  • Attack methods
  • Targeted attacks

Module 10 – The Economics of Attacks

Module 10 extended the targeted attack concept to include the financial drivers and implications to demonstrated why cybercrime and hacking are so popular and successful. The concept of the Security Risk Curve is introduced to provide a mechanism to manage and mitigate risk given the changing world of threats and limited financial resources available.

  • Financial implications of a targeted attack
  • Security risk curve
  • Hackers and the risk curve

Module 11 – The Digital World

Module 11 tackles new technologies rapidly being introduced into most business environments today and identifies how these technologies create new and unknown cyber risks for organizations. Further, it discusses how to consider these risks’ impact on the existing technology landscape and the implications of these new risks. Technologies include:

  • Internet of Things
  • Augmented, Immersive and Virtual Reality
  • Machine content creation
  • 3D & 4D Printing
  • Virtual currency and Blockchain technologies
  • Drones

Module 12 – The Dark Web

Module 12 introduces the murky world of the dark web. The dark web is a section of the internet that most users are unable to reach because access requires more specialized tools and knowledge. The module explores how hackers utilize this safer space to conduct criminal operations and visit Darkweb markets to buy and sell their tools and stolen goods. The module will explore anonymizing technologies used in this environment that present threat Implications for businesses from these risks.

  • Darkweb introduction
  • Darkweb markets
  • Anonymizing technologies
  • Threat implications

Module 13 – Web 2.0 & 3.0

This module provides background on the Internet itself and how it has begun to evolve through different generations of technology often referred to as Web 1.0, 2.0, 3.0. The internet has been a tremendous benefit for the Business Side of Cyber Crime, and this module explores some of the reasons for this expansion and how this knowledge can be applied to protect your organization. Finally, the pace of change in the internet and online business world is a rapidly changing environment and this module looks at the changing risk landscape and how you can understand these risks in the context of what is important to your organization.

  • Web 1.0, 2.0, 3.0
  • The business side of cybercrime
  • The changing risk landscape

Module 14 – Information Security

This module looks at typical Information security (InfoSec) teams and functions and explores the different roles traditionally contained within InfoSec functions. Teams and model types are explored to increase the participants' understanding of how these functions work and how to engage with them effectively. Further, we explore the infoSec lifecycle to understand more about how the process of cybersecurity works and how and when to engage and connect like-minded conversation and security efforts.

  • Information security function
  • Teams and models
  • InfoSec lifecycle

Module 15 – What can you do back at your organization?

Module 15 closes the training program with the “What can you do” section on actions you can take right away in your organization with what you have learned. We present best practices, tips and tricks and resources for continual learning. Finally, checklists for resources are provided for easy use.

  • What can you do
  • Best practices
  • Tips and tricks
  • Resources for continual learning
  • Checklists
Copyright © 2021 Global Security Management Solutions. All Rights Reserved.
Scroll to Top