Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Giac Security Leadership Certification (Gslc)

    Posted By: ELK1nG
    Giac Security Leadership Certification (Gslc)

    Giac Security Leadership Certification (Gslc)
    Published 5/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.34 GB | Duration: 8h 58m

    Certification-Ready Training Aligned with SANS LDR512 for Aspiring Security Leaders

    What you'll learn

    Security Program Foundations

    Security Policy and Organizational Structure

    Network and Host Security Architecture

    Cloud Security and Identity Management

    Cryptography and Privacy Engineering

    Application Security and DevSecOps

    Securing AI and Emerging Technologies

    Security Program Management

    Vendor Management and Team Leadership

    Security Monitoring and SOC Operations

    Incident Response and Continuity Planning

    Requirements

    Basic Understanding of IT and Security Concepts

    Some Exposure to Security or IT Management Tasks

    Interest in Strategic Thinking and Leadership

    Optional: Familiarity with Common Frameworks

    Description

    This course is your all-in-one preparation for the GIAC Security Leadership Certification (GSLC)—one of the most respected credentials for cybersecurity managers, team leads, and aspiring CISOs. Aligned fully with the SANS LDR512 training curriculum, this course goes beyond theory to help you apply leadership, strategy, and technical understanding in real-world security environments.You’ll explore essential topics including:Security governance, frameworks (NIST, ISO), and risk managementSecurity architecture across networks, endpoints, and cloud platformsCryptography, data protection, and privacy engineeringSecure application development and DevSecOps integrationSecurity operations, SIEM, SOC, and incident responseGenerative AI risks, Zero Trust, and emerging threatsVendor management, human risk, and organizational leadershipEach section is supported by clear lectures, real-world case studies, downloadable templates, quizzes, and guidance aligned with the GSLC exam format (115 questions, 3 hours, 70% passing score).Whether you're new to security leadership or preparing for GSLC certification, this course equips you with the clarity, confidence, and competence to lead security programs effectively and strategically.Prepare to pass. Train to lead. Start your GSLC journey today.This course is ideal for:Security managers, engineers, or IT professionals moving into leadership rolesCISOs, team leads, and architects needing to align with security frameworksProfessionals preparing for the GSLC certification examLeaders seeking a deeper understanding of policy, risk, and operational strategyAnyone wanting to build a business-aligned, threat-ready security programNo prior certification is required, but basic familiarity with IT or security concepts will help you get the most out of the experience.

    Overview

    Section 1: Introduction

    Lecture 1 About Course

    Lecture 2 Meet Course Designer and Training Architect

    Lecture 3 Why GIAC Certifications?

    Lecture 4 Do you need SANS or GIAC-affiliated training?

    Lecture 5 Pre-requisite for this course

    Section 2: Security Program Foundations

    Lecture 6 Role of a Modern Security Leader

    Lecture 7 Cybersecurity Frameworks: Control, Program, and Risk Models

    Lecture 8 The NIST Risk Management Framework

    Lecture 9 Understanding ISO Standards

    Lecture 10 Case Scenario: Choosing the Right Framework

    Lecture 11 Risk Fundamentals and Calibration for Managers

    Lecture 12 Case Scenario: One Risk, Many Perspectives

    Lecture 13 Practical Risk Assessment and Risk Management Techniques

    Lecture 14 Case Scenario: Too Many Risks, Too Little Time

    Section 3: Security Policy and Organizational Structure

    Lecture 15 Developing Effective and Actionable Security Policies

    Lecture 16 Common Security Policies in Organizations

    Lecture 17 Planning and Managing the Policy Lifecycle

    Lecture 18 Understanding Policy Documents in Cybersecurity Program

    Lecture 19 Structuring a Security Program: Governance and Reporting Lines

    Lecture 20 Understanding the Three Lines of Defense

    Lecture 21 Roles, Responsibilities, and Security Functions

    Lecture 22 Common Roles in the Enterprise

    Lecture 23 Case Scenarios

    Section 4: Network and Host Security Architecture

    Lecture 24 Security Architecture Principles, Models, Trends and Frameworks

    Lecture 25 Cyber Defense Matrix: Mapping Controls to Function

    Lecture 26 Case Scenario: Mid-Size Healthcare Provider (MedSecure Health)

    Lecture 27 Layered Network Security (Layer 1 to Application Layer)

    Lecture 28 Network Security: Layer 1 and 2: Overview and attacks

    Lecture 29 Network Security: Layer 3: VPNs and IPSec

    Lecture 30 Essentials of IPSec

    Lecture 31 Network Security: Layer 4: TCP and UDP

    Lecture 32 Understanding the TCP/IP Model: Layers, Functions, and Best Practices

    Lecture 33 Network Security: Application Layer: Proxies, NGFW, IDS/IPS, NSM

    Lecture 34 Host security: Malware and Attack Examples

    Lecture 35 Host Security Controls: EPP, EDR, HIDS/HIPS, FIM, Allowlisting, Sandboxing

    Section 5: Cloud Security and Identity Management

    Lecture 36 Cloud Security Fundamentals

    Lecture 37 Microsoft/AWS Security Reference Architecture

    Lecture 38 Cloud Security Attack Examples and Controls

    Lecture 39 Cloud Security Tools: CSPM, CWPP, CASB

    Lecture 40 Cloud Security Models: CSA, CAF, Well-Architected Framework

    Lecture 41 IAM Overview: Authentication Factors & Access Risks, IAM Security Capabilities

    Lecture 42 Zero Trust: Principles and Best Practices, ZTNA and Variable Trust

    Lecture 43 Additional Materials

    Section 6: Cryptography and Privacy Engineering

    Lecture 44 Introduction to Security Engineering

    Lecture 45 Cryptography Essentials: CIA, Non-repudiation, Hashing, Digital Signatures

    Lecture 46 Hashing: Tools and Practices for Students

    Lecture 47 Symmetric vs. Asymmetric Encryption and Key Exchange

    Lecture 48 Applied Encryption: TLS, PKI, Blockchain, Quantum

    Lecture 49 Privacy vs. Security: Concepts and Legal Foundations

    Lecture 50 Privacy Engineering and Compliance Controls

    Lecture 51 Wi-Fi Security Protocols, Policies, and Tools to Monitor and Defend

    Section 7: Application Security and DevSecOps

    Lecture 52 Secure Application Development: SDLC and Threats

    Lecture 53 Application Attacks: OWASP Top 10

    Lecture 54 Application Security: Application Security Testing Tools

    Lecture 55 DevSecOps, Toolchains and CI/CD Pipeline

    Lecture 56 Infrastructure as Code (IaC)

    Lecture 57 Container Security

    Section 8: Securing AI and Emerging Technologies

    Lecture 58 Introduction to GenAI and Transformer Architectures

    Lecture 59 Security Risks in LLMs: OWASP Top 10 for LLMs, MITRE ATLAS, Key Threats

    Lecture 60 MITRE ATLAS

    Lecture 61 GenAI Risk Mitigations and NIST AI RMF Controls

    Lecture 62 NIST AI Risk Management Framework

    Lecture 63 Building Secure AI Policies

    Lecture 64 AI Security Tools and Mitigations

    Section 9: Security Program Management

    Lecture 65 Security Leadership in Action: Traits and Mindsets

    Lecture 66 Vulnerability Management Lifecycle and PIACT Process

    Lecture 67 Prioritizing Vulnerabilities with CVSS and Context

    Lecture 68 Finding, Fixing and Communicating Vulnerabilities

    Lecture 69 Security Awareness Program: Maturity Model

    Section 10: Vendor Management and Team Leadership

    Lecture 70 Human Risk Factors and Cultural Transformation

    Lecture 71 Security Negotiation Strategies for Influence

    Lecture 72 Vendor and Product Analysis Using AHP

    Lecture 73 Case Scenario: Selecting the Best EDR Solution using AHP

    Lecture 74 Project Management for Security Initiatives

    Lecture 75 Project Management Knowledge Areas (PMBOK Guide 6th Edition)

    Lecture 76 Leading High-Performance Security Teams

    Section 11: Security Monitoring and SOC Operations

    Lecture 77 Logging, Monitoring, and Visibility Fundamentals

    Lecture 78 SIEM Deployment and Optimization Best Practices

    Lecture 79 Security Operations Center Models and Functions

    Lecture 80 Tiered vs. Tierless SOC Structures

    Section 12: Incident Response and Continuity Planning

    Lecture 81 Incident Response Lifecycle Using PICERL

    Lecture 82 Business Continuity Planning (BCP) Fundamentals

    Lecture 83 General Notes on Using BCP Template

    Lecture 84 Disaster Recovery (DR) Strategies and Testing

    Lecture 85 How to Use Disaster Recovery Plan (DRP) Template

    Lecture 86 What is a Contingency Plan?

    Lecture 87 Physical Security Controls and Risk Examples

    Section 13: Additional Resources for Reading

    Lecture 88 Types of Controls in Cybersecurity

    Lecture 89 Access Controls: Your First Line of Defense in Cybersecurity

    Lecture 90 Understanding RAID: Redundant Array of Independent Disks

    Lecture 91 Common Techniques for Making Informed Project Decisions

    Lecture 92 What is Steganography and its usage?

    Lecture 93 Understanding the MITRE ATT&CK Framework: Phases, Tactics, and Techniques

    Section 14: Course Conclusion

    Lecture 94 Key Takeaway for You as a Security Leader

    Lecture 95 Continued learning resources

    Lecture 96 Certification Guidance and Format

    Lecture 97 Course Feedback and closing remarks

    Section 15: Practice Tests

    Security managers, engineers, or IT professionals moving into leadership roles,CISOs, team leads, and architects needing to align with security frameworks,Professionals preparing for the GSLC certification exam,Leaders seeking a deeper understanding of policy, risk, and operational strategy,Anyone wanting to build a business-aligned, threat-ready security program