Facebook

GIAC Security Leadership (GSLC)

* Looking for a flexible schedule (after hours or weekends)? Please call 858-208-4141 or email us:  sales@ccslearningacademy.com.

Student financing options are available.

Transitioning military and Veterans, please contact us to sign up for a free consultation on training and hiring options.

Looking for group training? Contact Us

psinghal
Last Update April 15, 2024
0 already enrolled

About This Course

Course Description

The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle.
Areas Covered
  • Cryptography concepts & applications for managers, networking concepts & monitoring for managers
  • Managing a security operations center, application security, negotiations and vendors, and program structure
  • Managing security architecture, security awareness, security policy, and system security
  • Risk management and security frameworks, vulnerability management, incident response and business continuity

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Cryptographic Applications
The candidate will demonstrate an understanding of using symmetric, asymmetric, and hashing algorithms to secure data in transit or at rest, as well as the importance of PKI and key management
Cryptography Concepts for Managers
The candidate will demonstrate knowledge of common cryptographic terminology, and an understanding of how symmetric, asymmetric, and hashing encryption works
Incident Response and Business Continuity
The candidate will demonstrate an understanding of the phases of incident response and the business continuity process
Managing a Security Operations Center
The candidate will demonstrate an understanding of the components, structure, and management of a Security Operations Center (SOC)
Managing Application Security
The candidate will demonstrate an understanding of the top threats to application code and software-based infrastructure, as well as integrating security into the software development lifecycle and DevOps processes
Managing Negotiations and Vendors
The candidate will demonstrate an understanding of effective negotiation and vendor management techniques
Managing Projects
The candidate will demonstrate an understanding of the terminology, concepts, and phases of project management
Managing Security Architecture
The candidate will demonstrate an understanding of security architecture concepts, including cloud-based architecture, and how to apply trust models
Managing Security Awareness
The candidate will demonstrate an understanding of how to assess an organization’s human risks and build a security awareness program that can mature with the organization’s security program
Managing Security Policy
The candidate will demonstrate an understanding of the role played by security policies, standards, guidelines, processes, and baselines in meeting an organization’s security needs and risk appetite
Managing System Security
The candidate will demonstrate an understanding of the phases of a system attack, common types of attacks and malicious code, and the strategies used to mitigate those attacks
Managing the Program Structure
The candidate will be able to design a security program with an understanding of organizational culture and reporting structures, program governance, and hiring and retaining a security team
Network Monitoring for Managers
The candidate will demonstrate an understanding of centralized logging and monitoring strategies and tools
Network Security and Privacy
The candidate will demonstrate an understanding of network layer protocols and their relationship to network security and privacy concerns, as well as the ability to identity PII and security controls for protecting network data
Networking Concepts for Managers
The candidate will demonstrate an understanding of protocols, vulnerabilities, attacks, and security controls at each layer of the OSI model
Risk Management and Security Frameworks
The candidate will demonstrate the ability to evaluate and manage risk in alignment with business objectives and adopting security frameworks and risk management techniques to help mature the security program
Vulnerability Management
The candidate will demonstrate an understanding of how to build a vulnerability management program for identifying, prioritizing, and remediating both technical and physical system vulnerabilities

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives’ knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 115 questions
  • Time limit of 3 hours
  • Minimum Passing Score of 65%

Inclusions

  • With CCS Learning Academy, you’ll receive:
  • Exam scheduling support*
  • Enjoy job placement assistance for the first 12 months after course completion.
  • This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
  • Government and Private pricing available.*
  • *For more details call: 858-208-4141 or email: training@ccslearningacademy.com; sales@ccslearningacademy.com

Target Audience

  • Information security managers
  • Security professionals with leadership responsibilities
  • IT and other managers

Your Instructors

psinghal

0/5
471 Courses
0 Reviews
0 Students
See more

Write a review

IMG1696503357.png

$2,499.00

Level
Intermediate
Print Friendly, PDF & Email

Inclusions

  • With CCS Learning Academy, you’ll receive:
  • Exam scheduling support*
  • Enjoy job placement assistance for the first 12 months after course completion.
  • This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
  • Government and Private pricing available.*
  • *For more details call: 858-208-4141 or email: training@ccslearningacademy.com; sales@ccslearningacademy.com
#edumall-wp-widget-courses-1 { display: none; } #single-course-ratings { display: none; } .tutor-single-course-lead-meta { display: none; } .lead-meta-item meta-course-total-enrolled { display: none; }