NGSP — Next Generation Security Practitioner
40 lessons. 6 tiers. 12 live workshops. A complete methodology for security practitioners who are ready to move from technical specialist to strategic risk leader.
Tier 1
Mastering the art of identifying and communicating emerging risk before it becomes hindsight. Security teams often sense danger early but struggle to be heard.
What you will achieve in this tier
Learning Outcomes
The opening lesson. Sets the stakes. Explores the gap between what security teams know and what leadership hears — and why that gap exists.
0.5 CPE on completionLearning Outcomes
How businesses weigh up security risk — cost vs loss — and how real-world pressures distort rational risk acceptance. The thinking shift that changes everything.
0.5 CPE on completionLearning Outcomes
How changes in external forces, business focus and risk appetite create a cascade of new threats. The Altitudes model gives practitioners a structured way to see the full risk landscape.
0.5 CPE on completionLearning Outcomes
How to view risks through Technical, Human, Operational and Regulatory lenses simultaneously. THOR prevents the single-domain thinking that leaves organisations exposed.
0.5 CPE on completionLearning Outcomes
How to develop a powerful, fast way of assessing risk using TVI-Q — the three-question method that cuts through complexity and surfaces what actually matters.
0.5 CPE on completionLearning Outcomes
How to identify and quantify real business harm and build clear loss scenarios grounded in operational reality. The foundation of every credible risk conversation.
0.5 CPE on completionLearning Outcomes
Determining risk ratings and required mitigations to bring risk to a level the business is prepared to accept. How to close the profiling loop and move to action.
0.5 CPE on completionSignature Models Introduced in Tier 1
Three Altitudes of Risk
Risk Framework
THOR
Multi-Domain Analysis
TVI-Q
Risk Calculation
LOSS Map
Business Impact Translation
Tier 2
Calculating loss in real terms and getting the business to act. Decision-makers are shaped by bias, pressure and competing priorities — good escalations fall flat without the right structure.
What you will achieve in this tier
Learning Outcomes
How influencing decisions early strengthens security's position and accelerates action. Why the best risk analysis in the world fails without the right communication architecture.
0.5 CPE on completionLearning Outcomes
How to identify impact variables, assign unit costs and build clear, credible loss scenarios. The difference between a guess and a case.
0.5 CPE on completionLearning Outcomes
How to recognise the ten common biases that shape stakeholder reactions to risk — and how to navigate each one without confrontation.
0.5 CPE on completionLearning Outcomes
How to structure a persuasive risk escalation using FACTR — Facts, Analysis, Consequence, Treatment, Request — and present a clear loss-driven case.
0.5 CPE on completionLearning Outcomes
How to apply the five components of emotional intelligence to strengthen gravitas and influence when the stakes are highest.
0.5 CPE on completionLearning Outcomes
How to handle challenging stakeholder questions and maintain control of the discussion when the business pushes back on security recommendations.
0.5 CPE on completionSignature Models in Tier 2
LOSS Map
Business Impact Translation
Bias Models
Behavioural Intelligence
FACTR
Risk Communication
SCARF
Influence & Persuasion
Tier 3
Increasing security resilience through powerful business partnerships. Security often struggles not because of weak controls, but because the people who own the risk aren't engaged.
What you will achieve in this tier
Learning Outcomes
Why security depends on strong cross-business alliances and how shared ownership accelerates action. The case for building relationships before you need them.
0.5 CPE on completionLearning Outcomes
How to map security's actual relationship footprint and identify where trust and collaboration are weak. The Constellation model makes the invisible visible.
0.5 CPE on completionLearning Outcomes
How to identify supporters, adversaries, conspirators, disciples and fence-sitters — and how to move each one toward active security advocacy.
0.5 CPE on completionLearning Outcomes
How to read both public behaviour and private intent to understand what each stakeholder really wants — and use that understanding to build genuine alignment.
0.5 CPE on completionLearning Outcomes
How to reduce emotional threat, create psychological safety, and turn confrontations into collaboration — the social skills that separate great security leaders from average ones.
0.5 CPE on completionLearning Outcomes
How to strengthen security's reputation through consistent deposits of goodwill and shared wins — and how to use SCARF to de-escalate resistance before it becomes obstruction.
0.5 CPE on completionLearning Outcomes
How to achieve win-win outcomes and establish shared responsibility for risk across the business — without security carrying everything alone.
0.5 CPE on completionLearning Outcomes
Practical negotiation for securing buy-in and ongoing ownership from business partners who have their own priorities and pressures.
0.5 CPE on completionSignature Models in Tier 3
Security Constellation
Stakeholder Mapping
SCARF
Influence & Persuasion
Tier 4
Strengthening security posture through insight, problem-solving and collaboration. Security teams that enforce policy meet resistance. Those who diagnose and guide earn trust.
What you will achieve in this tier
Learning Outcomes
How moving from policy-enforcer to trusted consultant increases influence, trust and impact. The mindset shift that changes how the business sees security.
0.5 CPE on completionLearning Outcomes
How to shift from telling to challenging — and use pain vs gain conversations to reframe security problems as business opportunities.
0.5 CPE on completionLearning Outcomes
The flagship model of the Security Consulting tier. Position, Unpack, Lockdown, Solve, Execute — a complete consulting methodology built for security practitioners.
0.5 CPE on completionLearning Outcomes
How to frame security conversations, set purpose and create the conditions for a productive meeting — before someone else sets the agenda for you.
0.5 CPE on completionLearning Outcomes
The art of discovery. How to use the right questions at the right moment to expose the real security problem — not the one that was described.
0.5 CPE on completionLearning Outcomes
How to define the core issue, remove ambiguity and get commitment to what must be solved — before the conversation moves to solutions nobody will own.
0.5 CPE on completionLearning Outcomes
How to build SMART controls, apply the THOR lens and stress-test solutions with Force-Field Analysis — designing security that fits the business, not the textbook.
0.5 CPE on completionLearning Outcomes
How to assign responsibilities, secure 1st-line ownership and plan for successful delivery — so solutions don't die in the follow-up.
0.5 CPE on completionLearning Outcomes
Managing resistance after the solution has been agreed — the moment most practitioners lose ground. How to hold the line without burning the bridge.
0.5 CPE on completionLearning Outcomes
The PULSE capstone. A full consulting simulation — determining risk ratings and mitigations in practice, using everything from this tier in a live scenario.
0.5 CPE on completionSignature Model in Tier 4
PULSE
Security Consulting Methodology
Tier 5
Making risk mitigation a business enabler, not just a defensive tactic. Mitigation fails when leaders don't see the urgency or understand what the plan is trying to achieve.
What you will achieve in this tier
Learning Outcomes
Where risk mitigation fails and the consequences of getting it wrong. The case for treating mitigation as a business discipline, not a technical afterthought.
0.5 CPE on completionLearning Outcomes
The four treatment options and how to choose between them. When tolerance is a valid position and when it is simply avoidance with better branding.
0.5 CPE on completionLearning Outcomes
How to plan mitigation — not guess it. The architecture of a plan that survives first contact with the business.
0.5 CPE on completionLearning Outcomes
The one paragraph that has to land. How to structure a compelling risk narrative that drives decision, not debate.
0.5 CPE on completionLearning Outcomes
How to design stronger mitigations combining Technical, Human, Operational and Regulatory controls — building resilience across all four domains simultaneously.
0.5 CPE on completionLearning Outcomes
How to convert mitigation ideas into real controls using Prevent–Detect–Correct — the three-layer control architecture that closes gaps before they become incidents.
0.5 CPE on completionLearning Outcomes
How to assign only the 20% security should own and shift the remaining 80% to first-line teams — the ownership model that makes mitigation sustainable.
0.5 CPE on completionLearning Outcomes
The stress test every mitigation plan needs before it goes anywhere near a board. How to find the holes before the attacker does.
0.5 CPE on completionLearning Outcomes
How to secure real commitment to mitigation delivery — not just box-ticking agreement — and keep that commitment alive when the business gets busy.
0.5 CPE on completionLearning Outcomes
How to build the business case for security investment — in language that finance and leadership actually respond to.
0.5 CPE on completionSignature Models in Tier 5
THOR
Multi-Domain Analysis
PDC Controls
Controls Framework
FACTR
Risk Communication
Tier 6
Strengthening security posture through insight, problem-solving and collaboration. Security initiatives often fail in delivery, not design. This tier closes the gap.
What you will achieve in this tier
Learning Outcomes
The critical challenges practitioners face when trying to embed lasting security change — and why so many well-designed programmes never achieve their intended impact.
0.5 CPE on completionLearning Outcomes
How real-world pressures influence risk acceptance and the business case for designing security in from the start — before it becomes an expensive afterthought.
0.5 CPE on completionLearning Outcomes
How external forces and risk appetite create cascades of new threats — and how to identify and clear the blockages that stop security programmes from delivering.
0.5 CPE on completionLearning Outcomes
How to examine an existing security initiative through a diagnostic lens to identify what's working, what's broken, and what needs to change.
0.5 CPE on completionLearning Outcomes
How to challenge assumptions and restate the initiative's purpose with clarity — so the security programme addresses reality, not a problem that no longer exists.
0.5 CPE on completionLearning Outcomes
How to strengthen and streamline an initiative by removing friction and aligning to business needs — so security programmes get adopted instead of ignored.
0.5 CPE on completionLearning Outcomes
How to confidently identify and decommission low-value, legacy or duplicated activities — freeing resource for what actually makes the organisation more secure.
0.5 CPE on completionLearning Outcomes
The capstone of the programme. How to apply everything learned across all six tiers to design security that becomes part of the fabric of the organisation — not a layer bolted on top.
0.5 CPE on completionSignature Model in Tier 6
4R's of Resilience
Review · Reframe · Rework · Remove
Ready to begin?
Watch the opening lesson for free. Earn your first 0.5 CPE. Then decide if X-Core is the programme for you.