kingers Posted June 5 Report Share Posted June 5 Giac Security Leadership Certification (Gslc) Published 5/2025 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 2.34 GB | Duration: 8h 58mCertification-Ready Training Aligned with SANS LDR512 for Aspiring Security Leaders What you'll learn Security Program Foundations Security Policy and Organizational Structure Network and Host Security Architecture Cloud Security and Identity Management Cryptography and Privacy Engineering Application Security and DevSecOps Securing AI and Emerging Technologies Security Program Management Vendor Management and Team Leadership Security Monitoring and SOC Operations Incident Response and Continuity Planning Requirements Basic Understanding of IT and Security Concepts Some Exposure to Security or IT Management Tasks Interest in Strategic Thinking and Leadership Optional: Familiarity with Common Frameworks Description This course is your all-in-one preparation for the GIAC Security Leadership Certification (GSLC)-one of the most respected credentials for cybersecurity managers, team leads, and aspiring CISOs. Aligned fully with the SANS LDR512 training curriculum, this course goes beyond theory to help you apply leadership, strategy, and technical understanding in real-world security environments.You'll explore essential topics including:Security governance, frameworks (NIST, ISO), and risk managementSecurity architecture across networks, endpoints, and cloud platformsCryptography, data protection, and privacy engineeringSecure application development and DevSecOps integrationSecurity operations, SIEM, SOC, and incident responseGenerative AI risks, Zero Trust, and emerging threatsVendor management, human risk, and organizational leadershipEach section is supported by clear lectures, real-world case studies, downloadable templates, quizzes, and guidance aligned with the GSLC exam format (115 questions, 3 hours, 70% passing score).Whether you're new to security leadership or preparing for GSLC certification, this course equips you with the clarity, confidence, and competence to lead security programs effectively and strategically.Prepare to pass. Train to lead. Start your GSLC journey today.This course is ideal for:Security managers, engineers, or IT professionals moving into leadership rolesCISOs, team leads, and architects needing to align with security frameworksProfessionals preparing for the GSLC certification examLeaders seeking a deeper understanding of policy, risk, and operational strategyAnyone wanting to build a business-aligned, threat-ready security programNo prior certification is required, but basic familiarity with IT or security concepts will help you get the most out of the experience. Overview Section 1: Introduction Lecture 1 About Course Lecture 2 Meet Course Designer and Training Architect Lecture 3 Why GIAC Certifications? Lecture 4 Do you need SANS or GIAC-affiliated training? Lecture 5 Pre-requisite for this course Section 2: Security Program Foundations Lecture 6 Role of a Modern Security Leader Lecture 7 Cybersecurity Frameworks: Control, Program, and Risk Models Lecture 8 The NIST Risk Management Framework Lecture 9 Understanding ISO Standards Lecture 10 Case Scenario: Choosing the Right Framework Lecture 11 Risk Fundamentals and Calibration for Managers Lecture 12 Case Scenario: One Risk, Many Perspectives Lecture 13 Practical Risk Assessment and Risk Management Techniques Lecture 14 Case Scenario: Too Many Risks, Too Little Time Section 3: Security Policy and Organizational Structure Lecture 15 Developing Effective and Actionable Security Policies Lecture 16 Common Security Policies in Organizations Lecture 17 Planning and Managing the Policy Lifecycle Lecture 18 Understanding Policy Documents in Cybersecurity Program Lecture 19 Structuring a Security Program: Governance and Reporting Lines Lecture 20 Understanding the Three Lines of Defense Lecture 21 Roles, Responsibilities, and Security Functions Lecture 22 Common Roles in the Enterprise Lecture 23 Case Scenarios Section 4: Network and Host Security Architecture Lecture 24 Security Architecture Principles, Models, Trends and Frameworks Lecture 25 Cyber Defense Matrix: Mapping Controls to Function Lecture 26 Case Scenario: Mid-Size Healthcare Provider (MedSecure Health) Lecture 27 Layered Network Security (Layer 1 to Application Layer) Lecture 28 Network Security: Layer 1 and 2: Overview and attacks Lecture 29 Network Security: Layer 3: VPNs and IPSec Lecture 30 Essentials of IPSec Lecture 31 Network Security: Layer 4: TCP and UDP Lecture 32 Understanding the TCP/IP Model: Layers, Functions, and Best Practices Lecture 33 Network Security: Application Layer: Proxies, NGFW, IDS/IPS, NSM Lecture 34 Host security: Malware and Attack Examples Lecture 35 Host Security Controls: EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing Section 5: Cloud Security and Identity Management Lecture 36 Cloud Security Fundamentals Lecture 37 Microsoft/AWS Security Reference Architecture Lecture 38 Cloud Security Attack Examples and Controls Lecture 39 Cloud Security Tools: CSPM, CWPP, CASB Lecture 40 Cloud Security Models: CSA, CAF, Well-Architected Framework Lecture 41 IAM Overview: Authentication Factors & Access Risks, IAM Security Capabilities Lecture 42 Zero Trust: Principles and Best Practices, ZTNA and Variable Trust Lecture 43 Additional Materials Section 6: Cryptography and Privacy Engineering Lecture 44 Introduction to Security Engineering Lecture 45 Cryptography Essentials: CIA, Non-repudiation, Hashing, Digital Signatures Lecture 46 Hashing: Tools and Practices for Students Lecture 47 Symmetric vs. Asymmetric Encryption and Key Exchange Lecture 48 Applied Encryption: TLS, PKI, Blockchain, Quantum Lecture 49 Privacy vs. Security: Concepts and Legal Foundations Lecture 50 Privacy Engineering and Compliance Controls Lecture 51 Wi-Fi Security Protocols, Policies, and Tools to Monitor and Defend Section 7: Application Security and DevSecOps Lecture 52 Secure Application Development: SDLC and Threats Lecture 53 Application Attacks: OWASP Top 10 Lecture 54 Application Security: Application Security Testing Tools Lecture 55 DevSecOps, Toolchains and CI/CD Pipeline Lecture 56 Infrastructure as Code (IaC) Lecture 57 Container Security Section 8: Securing AI and Emerging Technologies Lecture 58 Introduction to GenAI and Transformer Architectures Lecture 59 Security Risks in LLMs: OWASP Top 10 for LLMs, MITRE ATLAS, Key Threats Lecture 60 MITRE ATLAS Lecture 61 GenAI Risk Mitigations and NIST AI RMF Controls Lecture 62 NIST AI Risk Management Framework Lecture 63 Building Secure AI Policies Lecture 64 AI Security Tools and Mitigations Section 9: Security Program Management Lecture 65 Security Leadership in Action: Traits and Mindsets Lecture 66 Vulnerability Management Lifecycle and PIACT Process Lecture 67 Prioritizing Vulnerabilities with CVSS and Context Lecture 68 Finding, Fixing and Communicating Vulnerabilities Lecture 69 Security Awareness Program: Maturity Model Section 10: Vendor Management and Team Leadership Lecture 70 Human Risk Factors and Cultural Transformation Lecture 71 Security Negotiation Strategies for Influence Lecture 72 Vendor and Product Analysis Using AHP Lecture 73 Case Scenario: Selecting the Best EDR Solution using AHP Lecture 74 Project Management for Security Initiatives Lecture 75 Project Management Knowledge Areas (PMBOK Guide 6th Edition) Lecture 76 Leading High-Performance Security Teams Section 11: Security Monitoring and SOC Operations Lecture 77 Logging, Monitoring, and Visibility Fundamentals Lecture 78 SIEM Deployment and Optimization Best Practices Lecture 79 Security Operations Center Models and Functions Lecture 80 Tiered vs. Tierless SOC Structures Section 12: Incident Response and Continuity Planning Lecture 81 Incident Response Lifecycle Using PICERL Lecture 82 Business Continuity Planning (BCP) Fundamentals Lecture 83 General Notes on Using BCP Template Lecture 84 Disaster Recovery (DR) Strategies and Testing Lecture 85 How to Use Disaster Recovery Plan (DRP) Template Lecture 86 What is a Contingency Plan? Lecture 87 Physical Security Controls and Risk Examples Section 13: Additional Resources for Reading Lecture 88 Types of Controls in Cybersecurity Lecture 89 Access Controls: Your First Line of Defense in Cybersecurity Lecture 90 Understanding RAID: Redundant Array of Independent Disks Lecture 91 Common Techniques for Making Informed Project Decisions Lecture 92 What is Steganography and its usage? Lecture 93 Understanding the MITRE ATT&CK Framework: Phases, Tactics, and Techniques Section 14: Course Conclusion Lecture 94 Key Takeaway for You as a Security Leader Lecture 95 Continued learning resources Lecture 96 Certification Guidance and Format Lecture 97 Course Feedback and closing remarks Section 15: Practice Tests Security managers, engineers, or IT professionals moving into leadership roles,CISOs, team leads, and architects needing to align with security frameworks,Professionals preparing for the GSLC certification exam,Leaders seeking a deeper understanding of policy, risk, and operational strategy,Anyone wanting to build a business-aligned, threat-ready security programDDownloadhttps://ddownload.com/662bjctluxb1/yxusj.GIAC.Security.Leadership.Certification.GSLC.part1.rarhttps://ddownload.com/y2bvwxib2w71/yxusj.GIAC.Security.Leadership.Certification.GSLC.part2.rarhttps://ddownload.com/f6u9hk0s7f69/yxusj.GIAC.Security.Leadership.Certification.GSLC.part3.rarRapidGatorhttps://rapidgator.net/file/6a43dcebb22bed684d95bfc5c74ef0f4/yxusj.GIAC.Security.Leadership.Certification.GSLC.part1.rarhttps://rapidgator.net/file/2f2786edf5e0eda82ef1444229c90d8a/yxusj.GIAC.Security.Leadership.Certification.GSLC.part2.rarhttps://rapidgator.net/file/609e44cf31a604da3e642c4793445b4c/yxusj.GIAC.Security.Leadership.Certification.GSLC.part3.rarNitroFlarehttps://nitroflare.com/view/C178E7452065BA1/yxusj.GIAC.Security.Leadership.Certification.GSLC.part1.rarhttps://nitroflare.com/view/912EE87F07CCA81/yxusj.GIAC.Security.Leadership.Certification.GSLC.part2.rarhttps://nitroflare.com/view/8DEFDDE75372598/yxusj.GIAC.Security.Leadership.Certification.GSLC.part3.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now