GIAC Security Leadership (GSLC)
- Offered byGIAC
GIAC Security Leadership (GSLC) at GIAC Overview
Duration | 3 hours |
Mode of learning | Online |
Credential | Certificate |
GIAC Security Leadership (GSLC) at GIAC Highlights
- Practitioner Certification
GIAC Security Leadership (GSLC) at GIAC Course details
- Information security managers
- Security professionals with leadership responsibilities
- IT and other managers
- Building a security program that meets business needs
- Managing security operations and teams
- Managing security projects and the lifecycle of the program
- The GIAC Security Leadership (GSLC) certification validates a practitioner's understanding of governance and technical controls focused on protecting, detecting, and responding to security issues
- GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle
GIAC Security Leadership (GSLC) at GIAC Curriculum
Cryptography Concepts for Managers
The candidate will demonstrate knowledge of common cryptographic terminology, and an understanding of how symmetric, asymmetric, and hashing encryption works
Incident Response and Business Continuity
The candidate will demonstrate an understanding of the phases of incident response, and managing business continuity and disaster recovery programs
Managing a Security Operations Center
The candidate will demonstrate an understanding of the components, structure, and management of a Security Operations Center (SOC)
Managing Application Security
The candidate will demonstrate an understanding of security issues affecting software, including infrastructure as code, as well as integrating security into the software development
lifecycle (SDLC) and DevOps processes
Managing Cloud Security
The candidate will demonstrate an understanding of cloud-based services and platforms, and managing the security and risks of cloud-based infrastructure
Managing Encryption and Privacy
The candidate will demonstrate an understanding of using encryption to secure data in transit or at rest, and how to identify and address privacy and compliance requirements
Managing Negotiations and Vendors
The candidate will demonstrate an understanding of effective negotiation and vendor management techniques
Managing Projects
The candidate will demonstrate familiarity with project management methodology, terminology, and how to gain support from the business
Managing Security Awareness
The candidate will demonstrate an understanding of how to assess an organization's human risks and build a security awareness program that can mature with the organization's security program
Managing Security Policy
The candidate will demonstrate an understanding of the role of security policies, standards, guidelines, processes, and baselines in meeting an organization's security needs and risk appetite
Managing System Security
The candidate will demonstrate an understanding of common types of client-side attacks and malicious code, and the strategies used to monitor and protect endpoints
Managing the Program Structure
The candidate will be able to design a security program with an understanding of organizational culture and reporting structures, program governance, and managing personnel
Network Monitoring for Managers
The candidate will demonstrate an understanding of centralized logging and monitoring strategies and tools, including SIEM, SOAR, and machine learning technologies
Network Security Architecture
The candidate will demonstrate an understanding of security architecture, trust models, and security controls for addressing common network threats and vulnerabilities
Networking Concepts for Managers
The candidate will demonstrate an understanding of network protocols, technologies, and common network threats
Risk Management and Security Frameworks
The candidate will demonstrate the ability to evaluate and manage risk in alignment with business objectives and adopting security frameworks and risk management techniques to
help mature the security program
Vulnerability Management
The candidate will demonstrate an understanding of how to build a vulnerability management program for identifying, prioritizing, and remediating both technical and physical system vulnerabilities