GIAC Security Leadership Certification (GSLC)
Course: No Specific training is required for any GIAC certification. If candidates need help in mastering the objectives for this certification, there are many sources of information available. Practical experience is one option; there are also numerous books on the market covering Computer Information Security. Another option is SANS training, or any relevant courses from other training providers
Target: Security Professionals with managerial or supervisory responsibility for information security staff.
Requirements: 1 proctored exam – 150 questions – 4-hour time limit – 70% (105 of 150 questions) minimum passing score
Renewal: Every 4 years
Delivery: Exams are delivered online through a standard web browser. For exams purchased with SANS training, access to the exam will be available 7-10 days following the end of the conference. Standalone challenge exams are issued within 24 hours upon receipt of payment. You will receive an email from GIAC when your exam has been issued to your portal account. You have 120 days to complete the exam from the time we send notice that it is available. The exams are proctored and should be scheduled using our.
SANS Security Leadership Essentials For Managers with Knowledge Compression, management 512
This completely updated course is designed to empower advancing managers who want to get up to speed quickly on information security issues and terminology. You don’t just learn about security, you learn how to manage security. Lecture sections are intense; the most common student comment is that it’s like drinking from a fire hose. The diligent manager will learn vital, up-to-date knowledge and skills required to supervise the security component of any information technology project. Additionally, the course has been engineered to incorporate the NIST Special Papers 800 guidance so that it can be particularly useful to US Government managers and supporting contractors.
Essential security topics covered in this management track include: Network Fundamentals and Applications, Power, Cooling and Safety, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Contingency and Continuity Planning, Awareness Management, Risk Management Analysis, Incident Handling, Web Application Security, Offensive and Defensive Information Warfare, culminating with our Management Practicum. The material uses Knowledge Compression™, special charts, and other proprietary SANS techniques to help convey the key points of critical slides and keep the information flow rate at a pace senior executives demand every teaching hour of the course. The course has been evaluated and approved by CompTIA’s CAQC program for Security + 2008 to ensure that managers and their direct reports have a common baseline for security terminology and concepts. You will be able to put what you learn into practice, the day you get back into the office.
Who should attend?
- All newly appointed information security officers
- Technically skilled administrators that have recently been given leadership responsibilities
- Seasoned managers that want to understand what your technical people are telling you
There are three goals for this track and certification.
- Establish a minimum standard for IT Security knowledge, skills and abilities. In a nutshell this course covers all of the non-operating system topics that are in SANS Security Essentials, though not to the same level of depth. The goal is to enable managers and auditors to speak the same language as System, Security, and Network administrators.
- Establish a minimum standard for IT Management knowledge, skills and abilities. I keep running into managers that don’t know TCP/IP and that is OK, but then they don’t know how to calculate Total Cost of Ownership (TCO) leaving me quietly wondering what do they know.
- Save the up and coming generation of senior and rapidly advancing managers a world of pain by sharing the things we wish someone had shared with us. As the saying goes, it is OK to make mistakes, just make new ones.
Preparation for this course.
This course is taught MBA style and students are expected to be ready to work on the in-class exercises by preparing prior to the first day of instruction. When you enroll in MGT512, we suggest you review the following items before the course begins: Review the following items before the course begins:
- PAAG Template
- BITS Kalculator
- 7799 Checklist
- SANS Security Policy Project
- Security Incident Handling Forms
Managing the Plant, Network, and Information Architecture, Management 512 -Day 1
The course starts with a whirlwind tour of the information an effective IT security manager must know to function in today’s environment. We will cover safety, physical security, and how networks and the related protocols, like TCP/IP, work and equip you to review network designs for performance, security, vulnerability scanning, and return on investment. Learn more about secure IT operations in a single day than you ever thought possible.
Defense In Depth, Management 512- Day 2
Learn information assurance foundations, which are presented in the context of both current and historical computer security threats, and how they have impacted confidentiality, integrity, and availability. You will learn the methods of attack and the importance of managing attack surface.
Secure Communications, Management 512-Day 3
Examine various cryptographic tools and technologies and how they can be used to secure a company’s assets. A related area called steganography, or information hiding, is also covered. Learn how malware and viruses often employ cryptographic techniques in an attempt to evade detection. We will learn about managing privacy issues in communications, and investigate Web application security.
The Value of Information, Management 512- Day 4
On this day, we consider the most valuable resource an organization has – its information. You will learn about intellectual property, incident handling, and to identify and better protect the information that is the real value of your organization. We will then formally consider how to apply everything we have learned as well as practice briefing management on our risk architecture.
Management Practicum, Management 512- Day 5
In the fifth and final day, we pull it all together and apply the technical knowledge to the art of management. The management practicum covers a number of specific applications and topics concerning information security. We’ll explore proven techniques for successful and effective management, empowering managers to immediately apply what you’ve been taught your first day back at the office.