GIAC Security Leadership (GSLC)
Security Professionals with managerial or supervisory responsibility for information security staff.
*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives' knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*
- 1 proctored exam
- 115 questions
- Time limit of 3 hours
- Minimum Passing Score of 68%
GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GSLC exam has been determined to be 68% for all candidates receiving access to their certification attempts on or after August 2nd, 2012. To verify the format of your current certification attempt, please read the Certification Information found in your portal account at https://exams.giac.org/pages/attempts.
Certifications must be renewed every 4 years. Click here for details.
NOTE: All GIAC exams are delivered through proctored test centers and must be scheduled in advance.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt. GIAC exams must be proctored through Pearson VUE. Please click the following link for instructions on How to Schedule Your GIAC Proctored Exam http://www.giac.org/information/schedule_proctored_exam.pdf. GIAC exams are delivered online through a standard web browser.
- Certified Professionals (GSLC)
- Exam Feedback Procedure
- Feedback Procedure
- Proctored exam procedure
- SANS Information Security Reading Room
Bulletin (Part 2 of Candidate Handbook)
Exam Certification Objectives & Outcome Statements
The topic areas for each exam part follow:
- Change Management and Incident Handling for Managers
- The candidate will understand the risks of incidents and unplanned changes, identify requirements for effective change management and incident response programs, and demonstrate understanding of the basic legal issues in incident and evidence handling
- Common Attacks and Malware
- The candidate will be able to identify common network attack methods, types of malicious code, and strategies used to mitigate those threats
- Managing Access Control
- The candidate will demonstrate an understanding of the fundamental theory of access control, secure authentication and authorization, and threats to account credentials and system access
- Managing Defense in Depth and Security Policy
- The candidate will demonstrate an understanding of the terminology and concepts of Defense-in-Depth, assessing security posture, and using security policy to meet the security needs of the organization
- Managing Disaster Recovery and Contingency Planning
- The candidate will demonstrate familiarity with the theory and techniques of cyber warfare. The candidate will be able to lead Business Continuity and Disaster Recovery teams, and understand the risk posed by natural disasters, large scale disruptions, and cyber warfare
- Managing Employees and Total Cost of Ownership
- The candidate will demonstrate an understanding of effective communication and negotiation tactics, managing employee priorities, use TCO analysis for proposed solutions and projects, and applying due diligence to reduce legal liability and the risk of fraud
- Managing Operational Security
- The candidate will demonstrate an understanding of operational security (OPSEC) principles, as well as offensive and defensive OPSEC techniques
- Managing Physical Security and Facility Safety
- The candidate will demonstrate the ability to advocate for and integrate security requirements into facility, safety and procurement processes, including physical access and dealing with vendors
- Managing Privacy and Web Security
- The candidate will demonstrate an understanding of the privacy concerns of individuals, strategies for maintaining data privacy on private and public networks, and understand the risks posed to data by steganography, web applications, and Internet communications
- Managing Risk and Ethics
- The candidate will demonstrate the ability to evaluate and manage risk and will be familiar with ethical issues pertaining to IT/Information Security
- Managing Security Awareness and Protecting Intellectual Property
- The candidate will be able to identify and protect intellectual property and intangible assets, including an understanding of secure software development processes, honeypots and honeytokens, and managing an organizational security awareness program
- Managing the Network Infrastructure
- The candidate will demonstrate an understanding of common LAN and WAN technologies, including network infrastructure, virtualization, MAC and IP addressing, VoIP, DNS, and common threats to network services
- Managing the Quality and Growth of the Security Organization
- The candidate will demonstrate an understanding of hiring and managing a global security team and achieving sustainable growth, including the principles of cultural awareness, quality, and continuous process improvement
- Managing the Use of Cryptography
- The candidate will demonstrate an understanding of symmetric, asymmetric and hashing algorithms, PKI and key management, and understand the common uses of cryptography in securing network data and communications
- Managing Vulnerabilities
- The candidate will demonstrate an understanding of common approaches, methods, and tools used to gather information externally and internally, and how to effectively prioritize and remediate vulnerable systems and devices
- Managing Wireless Security
- The candidate will demonstrate an understanding of wireless networking technologies and risks, including security considerations for 802.11 and Bluetooth devices
- Network and Endpoint Security Technologies
- The candidate will demonstrate an understanding of security technologies and devices used to prevent and detect network and endpoint threats, including filtering, IPS/IDS, virtualization, logging, and correlation
- Network Protocols for Managers
- The candidate will demonstrate understanding of the terminology and concepts of network protocols and how to assess competent network engineers
- Project Management and Business Situational Awareness
- The candidate will demonstrate familiarity with the terminology, concepts and phases of project management as well as identifying and modeling effective business situational awareness
- Selling and Managing the Mission
- The candidate will demonstrate an understanding of how to use mission statements and security frameworks to align security with the business, and how to effectively promote security within an organization
Where to Get Help
Training is available from a variety of resources including on line, course attendance at a live conference, and self study.
Practical experience is another way to ensure that you have mastered the skills necessary for certification. Many professionals have the experience to meet the certification objectives identified.
Finally, college level courses or study through another program may meet the needs for mastery.
The procedure to contest exam results can be found at http://www.giac.org/about/procedures/grievance.