Security Certification: GSLC

Security Certification:

GIAC Security Leadership (GSLC)

Target

Security Professionals with managerial or supervisory responsibility for information security staff.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Requirements

  • 1 proctored exam
  • 115 questions
  • Time limit of 3 hours
  • Minimum Passing Score of 68%

Note:

GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GSLC exam has been determined to be 68% for all candidates receiving access to their certification attempts on or after August 2nd, 2012. To verify the format of your current certification attempt, please read the Certification Information found in your portal account at https://exams.giac.org/pages/attempts.

Renew

Certifications must be renewed every 4 years. Click here for details.

Delivery

NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.

Links


Bulletin (Part 2 of Candidate Handbook)

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Click here to view a list of expanded topics for each objective.

Change Management and Incident Handling for Managers
The candidate will understand the risks of incidents and unplanned changes, identify requirements for effective change management and incident response programs, and demonstrate understanding of the basic legal issues in incident and evidence handling
Common Attacks and Malware
The candidate will be able to identify common network attack methods, types of malicious code, and strategies used to mitigate those threats
Managing Access Control
The candidate will demonstrate an understanding of the fundamental theory of access control, secure authentication and authorization, and threats to account credentials and system access
Managing Defense in Depth and Security Policy
The candidate will demonstrate an understanding of the terminology and concepts of Defense-in-Depth, assessing security posture, and using security policy to meet the security needs of the organization
Managing Disaster Recovery and Contingency Planning
The candidate will demonstrate familiarity with the theory and techniques of cyber warfare. The candidate will be able to lead Business Continuity and Disaster Recovery teams, and understand the risk posed by natural disasters, large scale disruptions, and cyber warfare
Managing Employees and Total Cost of Ownership
The candidate will demonstrate an understanding of effective communication and negotiation tactics, managing employee priorities, use TCO analysis for proposed solutions and projects, and applying due diligence to reduce legal liability and the risk of fraud
Managing Operational Security
The candidate will demonstrate an understanding of operational security (OPSEC) principles, as well as offensive and defensive OPSEC techniques
Managing Physical Security and Facility Safety
The candidate will demonstrate the ability to advocate for and integrate security requirements into facility, safety and procurement processes, including physical access and dealing with vendors
Managing Privacy and Web Security
The candidate will demonstrate an understanding of the privacy concerns of individuals, strategies for maintaining data privacy on private and public networks, and understand the risks posed to data by steganography, web applications, and Internet communications
Managing Risk and Ethics
The candidate will demonstrate the ability to evaluate and manage risk and will be familiar with ethical issues pertaining to IT/Information Security
Managing Security Awareness and Protecting Intellectual Property
The candidate will be able to identify and protect intellectual property and intangible assets, including an understanding of secure software development processes, honeypots and honeytokens, and managing an organizational security awareness program
Managing the Network Infrastructure
The candidate will demonstrate an understanding of common LAN and WAN technologies, including network infrastructure, virtualization, MAC and IP addressing, VoIP, DNS, and common threats to network services
Managing the Quality and Growth of the Security Organization
The candidate will demonstrate an understanding of hiring and managing a global security team and achieving sustainable growth, including the principles of cultural awareness, quality, and continuous process improvement
Managing the Use of Cryptography
The candidate will demonstrate an understanding of symmetric, asymmetric and hashing algorithms, PKI and key management, and understand the common uses of cryptography in securing network data and communications
Managing Vulnerabilities
The candidate will demonstrate an understanding of common approaches, methods, and tools used to gather information externally and internally, and how to effectively prioritize and remediate vulnerable systems and devices
Managing Wireless Security
The candidate will demonstrate an understanding of wireless networking technologies and risks, including security considerations for 802.11 and Bluetooth devices
Network and Endpoint Security Technologies
The candidate will demonstrate an understanding of security technologies and devices used to prevent and detect network and endpoint threats, including filtering, IPS/IDS, virtualization, logging, and correlation
Network Protocols for Managers
The candidate will demonstrate understanding of the terminology and concepts of network protocols and how to assess competent network engineers
Project Management and Business Situational Awareness
The candidate will demonstrate familiarity with the terminology, concepts and phases of project management as well as identifying and modeling effective business situational awareness
Selling and Managing the Mission
The candidate will demonstrate an understanding of how to use mission statements and security frameworks to align security with the business, and how to effectively promote security within an organization

Where to Get Help

Training is available from a variety of resources including on line, course attendance at a live conference, and self study.

Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.

Finally, college level courses or study through another program may meet the needs for mastery.

The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.