GIAC
GIAC Logo

GIAC Security Leadership (GSLC) 

  • Offered byGIAC

GIAC Security Leadership (GSLC)
 at 
GIAC 
Overview

Duration

3 hours

Mode of learning

Online

Credential

Certificate

GIAC Security Leadership (GSLC)
 at 
GIAC 
Highlights

  • Practitioner Certification
Details Icon

GIAC Security Leadership (GSLC)
 at 
GIAC 
Course details

Who should do this course?
  • Information security managers
  • Security professionals with leadership responsibilities
  • IT and other managers
What are the course deliverables?
  • Building a security program that meets business needs
  • Managing security operations and teams
  • Managing security projects and the lifecycle of the program
More about this course
  • The GIAC Security Leadership (GSLC) certification validates a practitioner's understanding of governance and technical controls focused on protecting, detecting, and responding to security issues
  • GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle

GIAC Security Leadership (GSLC)
 at 
GIAC 
Curriculum

Cryptography Concepts for Managers

The candidate will demonstrate knowledge of common cryptographic terminology, and an understanding of how symmetric, asymmetric, and hashing encryption works

Incident Response and Business Continuity

The candidate will demonstrate an understanding of the phases of incident response, and managing business continuity and disaster recovery programs

Managing a Security Operations Center

The candidate will demonstrate an understanding of the components, structure, and management of a Security Operations Center (SOC)

Managing Application Security

The candidate will demonstrate an understanding of security issues affecting software, including infrastructure as code, as well as integrating security into the software development

lifecycle (SDLC) and DevOps processes

Managing Cloud Security

The candidate will demonstrate an understanding of cloud-based services and platforms, and managing the security and risks of cloud-based infrastructure

Managing Encryption and Privacy

The candidate will demonstrate an understanding of using encryption to secure data in transit or at rest, and how to identify and address privacy and compliance requirements

Managing Negotiations and Vendors

The candidate will demonstrate an understanding of effective negotiation and vendor management techniques

Managing Projects

The candidate will demonstrate familiarity with project management methodology, terminology, and how to gain support from the business

Managing Security Awareness

The candidate will demonstrate an understanding of how to assess an organization's human risks and build a security awareness program that can mature with the organization's security program

Managing Security Policy

The candidate will demonstrate an understanding of the role of security policies, standards, guidelines, processes, and baselines in meeting an organization's security needs and risk appetite

Managing System Security

The candidate will demonstrate an understanding of common types of client-side attacks and malicious code, and the strategies used to monitor and protect endpoints

Managing the Program Structure

The candidate will be able to design a security program with an understanding of organizational culture and reporting structures, program governance, and managing personnel

Network Monitoring for Managers

The candidate will demonstrate an understanding of centralized logging and monitoring strategies and tools, including SIEM, SOAR, and machine learning technologies

Network Security Architecture

The candidate will demonstrate an understanding of security architecture, trust models, and security controls for addressing common network threats and vulnerabilities

Networking Concepts for Managers

The candidate will demonstrate an understanding of network protocols, technologies, and common network threats

Risk Management and Security Frameworks

The candidate will demonstrate the ability to evaluate and manage risk in alignment with business objectives and adopting security frameworks and risk management techniques to

help mature the security program

Vulnerability Management

The candidate will demonstrate an understanding of how to build a vulnerability management program for identifying, prioritizing, and remediating both technical and physical system vulnerabilities

Other courses offered by GIAC

– / –
4 months
– / –
– / –
4 months
– / –
View Other 1 CoursesRight Arrow Icon
qna

GIAC Security Leadership (GSLC)
 at 
GIAC 

Student Forum

chatAnything you would want to ask experts?
Write here...