GIAC Security Leadership Certificate (GSLC) Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Delivery Options Instructor-Led Onsite, Online, and Classroom Live


This advanced-level GIAC Security Leadership Certificate (GSLC) validates the certification holder’s understanding of information security management, technical controls, and governance with a specific focus on detecting, responding, and protecting against information security issues. GSLC verifies expertise in data, network, application, host, and user controls, as well as security life cycle management topics.

This GIAC Security Leadership Certificate (GSLC) Training is intended for information security managers, information security professionals with leadership or managerial responsibilities, and information technology management.

  • 1 proctored exam
  • 115 questions
  • A time limit of 3 hours
  • Minimum Passing Score of 65%

*You will be required to renew your GSLC certification every four years through Continuing Professional Experience (CPE) credits.


NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account.

You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam GIAC exams are delivered online through a standard web browser.

  • 5 days of the best hands-on GIAC Security Leadership Certificate (GSLC) Training in the industry
  • GSLC Courseware and Study Guide
  • GSLC Sample Exam Questions
  • 100% Satisfaction Guarantee



Upon completion, the GIAC Security Leadership Certificate (GSLC) Training candidate will be able:

GSLC covers a wide range of management-related objectives sprinkled with practical information security knowledge and skills. These objectives include:

  • Cryptographic applications
  • Cryptography concepts for managers
  • Incident response and business continuity
  • Managing a security operations center
  • Managing application security
  • Managing negotiations and vendors
  • Managing projects
  • Managing security architecture
  • Managing security awareness
  • Managing security policy
  • Managing system security
  • Managing the program structure
  • Network monitoring for managers
  • Network security and privacy
  • Networking concepts for managers
  • Risk management and security frameworks
  • Vulnerability management
  • We can adapt this GIAC Security Leadership Certificate (GSLC) Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this GIAC Security Leadership Certificate (GSLC) Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the GIAC Security Leadership Certificate (GSLC) Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the GIAC Security Leadership Certificate (GSLC) Training course in a manner understandable to lay audiences.

The target audience for this GIAC Security Leadership Certificate (GSLC) Training course:

  • Information security managers
  • Security professionals with leadership responsibilities
  • IT and other managers

The knowledge and skills that a learner must have before attending this GIAC Security Leadership Certificate (GSLC) Training are:

  • There are no specific prerequisites, such as years of professional experience, required to earn the GSLC certification. GIAC does recommend, however, that certification candidates take an affiliate training course.



  • Understand the misconceptions and risks of 802.11 wireless networks and how to secure them.

Access Control and Password Management

  • Build knowledge of the fundamental theory of access control and the role of passwords in controlling access to systems.

Building a Security Awareness Program

  • Gain an understanding of the critical elements of creating and managing a Security Awareness Program.

Business Situational Awareness

  • Familiarise yourself with the concept of situational awareness and the fundamental sources of information that lead to business situational awareness.

Change Management and Security

  • Develop the skills to identify the signs of poor change management, understand the risks to the organization, and develop a program to improve operations.

Computer and Network Addressing

  • Get an understanding of how computers have a variety of names and addresses on a network and this must be managed.

Cryptography Algorithms and Concepts

  • Learn and understand several crypto algorithms and the concepts behind secure ciphers.

Cryptography Applications, VPNs, and IPSec

  • Learn how cryptography can be used to secure a network and how Pretty Good Privacy (PGP) works, and be introduced to VPNs, IPSec, and Public Key Infrastructure (PKI).

Cryptography Fundamentals

  • Build a basic understanding of the fundamental terminology and concepts of cryptography.


  • Understand the terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.

Defensive OPSEC

  • Learn what OPSEC is and the techniques used in defensive Operational Security.

Disaster Recovery / Contingency Planning

  • Develop the skills to lead the BCP/DRP team and realistically plan for Business Continuity and Disaster Recovery.

GIAC Security Leadership Certificate (GSLC) Training – DNS

  • Learn how the Domain Name System (DNS) works, common attacks against DNS, and what can be done to defend against those attacks.

Endpoint Security

  • Understand the issues related to defending Windows desktops and laptops.

Facilities and Physical Security

  • Develop the ability to articulate the needs of the information technology and security program to the parts of the organization responsible for facilities and physical security.

General Types of Cryptosystems

  • Get an understanding of the three general types of cryptosystems.

Honeypots, Honeynets, Honeytokens, Tarpits

  • Build knowledge of basic honeypot techniques and common tools used to set up honeypots.

Incident Handling and the Legal System

  • Learn basic legal issues in the incident and evidence handling.

Incident Handling Foundations

  • Understand the concepts of incident handling and the six-step incident handling process.

Information Warfare

  • Develop familiarity with the theory and techniques of information warfare.

IP Terminology and Concepts

  • Understand the terminology and concepts of IP protocols and how they support the Internet.


  • Gain an understanding of how logging works, options for collection and processing, and the uses for correlation technology.

Malicious Software

  • Learn to articulate what malicious code is, the common types of malicious code, how it propagates, and why it is such an expensive problem.

Manager’s Guide to Assessing Network Engineer

  • Assess the ability of a network engineer to understand network traffic.

Managerial Wisdom

  • Build a working knowledge of the most effective business techniques from the most acclaimed books.

Managing Ethics

  • Develop a familiarity with ethical issues and guidelines pertaining to IT security.

Managing Intellectual Property

  • Learn to identify and protect intellectual property and intangible assets.

Managing IT Business and Program Growth in a Globalised Marketplace

  • Develop knowledge of the key factors affecting globalization and the fundamental principles of managing an IT business and achieving sustainable growth

Managing Legal Liability

  • Learn how to use due diligence to manage an organization’s legal liability with an emphasis on fraud and IT issues.

Managing Negotiations

  • Gain familiarity with guidelines for sound negotiation practices.

Managing PDA Infrastructure

  • Understand the critical issues related to data stored on Personal Digital Assistant devices.

GIAC Security Leadership Certificate (GSLC) Training – Managing Privacy

  • Gain an understanding of the privacy concerns that customers typically have and solutions that can be used to maintain the privacy of data.

Managing Security Policy

  • Develop the skills to assess current policy, identify the overall security posture of an organization, ensure that existing policy is applicable to the organization’s needs and modify the policy as required.

Managing Software Security

  • Learn to build security into the software development process.

Managing Technical People

  • Practice techniques that can be used to communicate with and manage technical staff.

Managing the Mission

  • Understand how mission statements and policies keep organizations on track and how security relates to the mission.

Managing the Procurement Process

  • Gain knowledge of the management responsibility for vendor selection through the primary phases of the procurement process and learn how to provide oversight into requirements analysis, the price paid, and analysis of ROI.

Managing the Total Cost of Ownership

  • Understand how to apply TCO to analyze proposed solutions over their entire life cycle as well as be able to identify the main areas of cost for a given project.

Methods of Attack

  • Get an introductory understanding of the most common attack methods and the basic strategies used to mitigate those threats.

Offensive OPSEC

  • Gain an understanding of OPSEC principles and offensive OPSEC techniques.

Project Management For Security Leaders

  • Familiarise yourself with the terminology, concepts, and five phases of project management and the role of a Project Management Office in IT/IT Security.


  • Learn the basics of continuous product improvement and Deming’s 14 points.

Risk Management and Auditing

  • Learn the skills to evaluate and manage risk.


  • Develop the ability to articulate the needs of the information technology and security program to the parts of the organization responsible for safety.

Security and Organisational Structure

  • Gain an understanding of how security integrates into organizational structure and be familiar with guidelines for recruiting and hiring IT staff.

Security Frameworks

  • Get to grips with the basic structure and approach to implementation of COBIT and ISO 27002 as well as practical tools to help implement the standards.

Selling Security

  • Learn how to promote security improvements to other managers within their organization.

GIAC Security Leadership Certificate (GSLC) Training – Steganography

  • Understand the concepts and techniques behind steganography, steganographic tools, and defensive techniques.

The Intelligent Network

  • Develop an understanding of the differences between a typical traditional network design and the new components that are part of an intelligent network.

The Network Infrastructure

  • You will develop the ability to communicate the fundamental technologies and concepts that describe LAN and WAN network infrastructure.

Vulnerability Management – Inside View

  • Learn common approaches used to gather network intelligence from organizations using commonly available tools and methods directly from the system.

Vulnerability Management – Outside View

  • Understand the common approaches used to gather network intelligence from organizations using commonly available tools and methods across a network.

Vulnerability Management – User View

  • Learn to factor in the impact the user can have on an organization’s risk posture.

Web Communications and Security

  • An introduction to web application communications, security issues, and defenses.

Wireless Advantages and Bluetooth

  • Understand the advantages that make wireless technology ubiquitous and be introduced to Bluetooth wireless technology.
GIAC Security Leadership Certificate (GSLC) TrainingGIAC Security Leadership Certificate (GSLC) Training Course Recap, Q/A, and Evaluations