GIAC - Firebrand's training for GIAC's Security Leadership | GSLC

Kesto

Kesto:

Vain 5 päivän

Menetelmä

Menetelmä:

luokkahuone / Online / Hybridi

Seuraava päivä

Seuraava päivä:

24/6/2024 (Maanantai)

Overview

On this accelerated 5 day GIAC Security Leadership Certification course, you’ll prove you have the ability and knowledge to provide a managerial level of information security for your organisation.

Whilst working to achieve your GSLC certification, you’ll learn how to safeguard your organisation’s information systems. You’ll also develop skills in business situational awareness and risk management. This will help to protect your organisation on a wider scale from a variety of cyber-attacks.

You’ll cover a range of topics including:

  • Access control and password management
  • Endpoint security
  • Disaster recovery / contingency planning
  • Web communications and security

This GSLC certification course is suitable for security professionals with managerial or supervisory responsibilities.

Firebrand's course will prepare you for the GIAC Security Leadership (GSLC) exam certification and provides knowledge equivalent to the SANS MGT512: SANS Security Leadership Essentials

8 syytä, miksi kannattaa hankkia GSLC Firebrand Trainingiltä:

  1. Koulutuksen ja todistuksen saaminen kestää vain 5 päivän. Meidän kanssamme saat GSLC -koulutuksen ja -todistuksen ennätysajassa. Todistuksen ansaitset koulutuskeskuksessamme osana intensiivistä ja nopeutettua koulutusta.
  2. Hintaan sisältyy kaikki.Kertamaksu kattaa kaikki kurssimateriaalit, kokeet, kuljetuksen, majoituksen ja ateriat ja tarjoaa kustannustehokkaimman tavan hankkia GSLC koulutus ja todistus. Ilman mitään lisäkustannuksia.
  3. Suorita tutkinto ensimmäisellä kerralla tai kertaa koulutus ilmaiseksi. Tämä on takuumme. Olemme varmoja, että läpäiset GSLC -kurssin ensimmäisellä kerralla. Mutta jos näin ei käy, voit tulla takaisin vuoden kuluttua ja maksaa vain majoituksesta ja kokeista. Kaikki muu on ilmaista.
  4. Opit enemmän.Päivä perinteisen koulutuksen tarjoajan kanssa on yleensä klo 9–17, mihin sisältyy pitkä lounastauko. Firebrand Trainingiltä saat vähintään 12 tuntia päivässä keskittynyttä ja häiriötöntä laatukoulutusaikaa opettajasi kanssa.
  5. Opit GSLC nopeammin. Yhdistämme 3 eri oppimistyyliä (visuaalisen|kuuloon perustuvan|kosketukseen perustuvan) tarjotaksemme materiaalin tavalla joka varmistaa, että opit nopeammin ja helpommin.
  6. Opiskelet huippujen kanssa.Olemme kouluttaneet ja sertifioineet 134.561 ammattilaista ja olemme kumppaneita kaikkien alan suurien nimien kanssa ja olemme saaneet lukuisia palkintoja, mm. Microsoftin Danmarki Vuoden koulutuspartneri 2010, 2011, 2012 ja 2013, Institue of IT Trainingin ”Training Company of the Year 2006, 2007, 2008” Englannissa, ISC(2):n ”Highest Performing Affiliate of the Year 2009 & 2010 – EMEA” sekä EC-Councilin ”Accredited Training Centre of the Year 2010 og 2011”, ”Newcomer of the Year 2011” ja ”Instructors Circle of Excellence”.
  7. Opit enemmän kuin pelkän teorian. Olemme kehittäneet GSLC kurssia edelleen käyttämällä laboratorioita, esimerkkitapauksia ja harjoittelukokeita varmistaaksemme, että osaat soveltaa uutta tietoa työympäristöön.
  8. Opit parhailta. Ohjaajamme GSLC kurssilla ovat alan parhaita. He tarjoavat ainutlaatuisen yhdistelmän asiantuntemusta, kokemusta ja intohimoa opetukseen.

Benefits

Please Note

  • Examination vouchers not included for GIAC, CREST and CISSP CBK Review
  • On site testing not included for GIAC, CREST or ITIL Managers and Revision Certification Courses

Curriculum

802.11

Understand the misconceptions and risks of 802.11 wireless networks and how to secure them.

Access Control and Password Management

Build knowledge of the fundamental theory of access control and the role of passwords in controlling access to systems.

Building a Security Awareness Program

Gain an understanding of the critical elements of creating and managing a Security Awareness Program.

Business Situational Awareness

Familiarise yourself with the concept of situational awareness and the fundamental sources of information that lead to business situational awareness.

Change Management and Security

Develop the skills to identify the signs of poor change management, understand the risks to the organisation, and develop a program to improve operations.

Computer and Network Addressing

Get an understanding of how computers have a variety of names and addresses on a network and this must be managed.

Cryptography Algorithms and Concepts

Learn and understand several crypto algorithms and the concepts behind secure ciphers.

Cryptography Applications, VPNs and IPSec

Learn how cryptography can be used to secure a network and how Pretty Good Privacy (PGP) works, and be introduced to VPNs, IPSec and Public Key Infrastructure (PKI).

Cryptography Fundamentals

Build a basic understanding of the fundamental terminology and concepts of cryptography.

Defense-in-Depth

Understand the terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.

Defensive OPSEC

Learn what OPSEC is and the techniques used in defensive Operational Security.

Disaster Recovery / Contingency Planning

Develop the skills to lead the BCP/DRP team and realistically plan for Business Continuity and Disaster Recovery.

DNS

Learn how the Domain Name System (DNS) works, common attacks against DNS, and what can be done to defend against those attacks.

Endpoint Security

Understand the issues related to defending Windows desktops and laptops.

Facilities and Physical Security

Develop the ability to articulate the needs of the information technology and security program to the parts of the organisation responsible for facilities and physical security.

General Types of Cryptosystems

Get an understanding of the three general types of cryptosystems.

Honeypots, Honeynets, Honeytokens, Tarpits

Build knowledge of basic honeypot techniques and common tools used to set up honeypots.

Incident Handling and the Legal System

Learn basic legal issues in incident and evidence handling.

Incident Handling Foundations

Understand the concepts of incident handling and the six-step incident handling process.

Information Warfare

Develop familiarity with the theory and techniques of information warfare.

IP Terminology and Concepts

Understand the terminology and concepts of IP protocols and how they support the Internet.

Logging

Gain an understanding of how logging works, options for collection and processing and the uses for correlation technology.

Malicious Software

Learn to articulate what malicious code is, the common types of malicious code, how it propagates, and why it is such an expensive problem.

Manager's Guide to Assessing Network Engineer

Assess the ability of a network engineer to understand network traffic.

Managerial Wisdom

Build a working knowledge of the most effective business techniques from the most acclaimed books.

Managing Ethics

Develop a familiarity with ethical issues and guidelines pertaining to IT security.

Managing Intellectual Property

Learn to identify and protect intellectual property and intangible assets.

Managing IT Business and Program Growth in a Globalised Marketplace

Develop knowledge of the key factors affecting globalisation and the fundamental principles to managing an IT business and achieving sustainable growth

Managing Legal Liability

Learn how to use due diligence to manage an organisation's legal liability with emphasis on fraud and IT issues.

Managing Negotiations

Gain familiarity with guidelines for sound negotiation practices.

Managing PDA Infrastructure

Understand the critical issues related to data stored on Personal Digital Assistant devices.

Managing Privacy

Gain an understanding of the privacy concerns that customers typically have and solutions that can be used to maintain privacy of data.

Managing Security Policy

Develop the skills to assess current policy, identify overall security posture of organisation, ensure that existing policy is applicable to organisation's needs and modify policy as required.

Managing Software Security

Learn to build security into the software development process.

Managing Technical People

Practice techniques that can be used to communicate with and manage technical staff.

Managing the Mission

Understand how mission statements and policy keep organisations on track and how security relates to the mission.

Managing the Procurement Process

Gain knowledge of the management responsibility for vendor selection through the primary phrases of the procurement process and learn how to provide oversight into requirements analysis, price paid, and analysis of ROI.

Managing the Total Cost of Ownership

Understand how to apply TCO to analyse proposed solutions over their entire life cycle as well as be able to identify main areas of cost for a given project.

Methods of Attack

Get an introductory understanding of the most common attack methods and the basic strategies used to mitigate those threats.

Offensive OPSEC

Gain an understanding of OPSEC principles and offensive OPSEC techniques.

Project Management For Security Leaders

Familiarise yourself with the terminology, concepts and five phases of project management and the role of a Project Management Office in IT/IT Security.

Quality

Learn the basics of continuous product improvement and Deming's 14 points.

Risk Management and Auditing

Learn the skills to evaluate and manage risk.

Safety

Develop the ability to articulate the needs of the information technology and security program to the parts of the organisation responsible for safety.

Security and Organisational Structure

Gain an understanding of how security integrates into organisational structure and be familiar with guidelines for recruiting and hiring IT staff.

Security Frameworks

Get to grips with the basic structure and approach to implementation of COBIT and ISO 27002 as well as practical tools to help implement the standards.

Selling Security

Learn how to promote security improvements to other managers within their organisation.

Steganography

Understand the concepts and techniques behind steganography, steganographic tools and defensive techniques.

The Intelligent Network

Develop an understanding of the differences between a typical traditional network design and the new components that are part of an intelligent network.

The Network Infrastructure

You will develop the ability to communicate the fundamental technologies and concepts that describe LAN and WAN network infrastructure.

Vulnerability Management - Inside View

Learn common approaches used to gather network intelligence from organisations using commonly available tools and methods directly from the system.

Vulnerability Management - Outside View

Understand the common approaches used to gather network intelligence from organisations using commonly available tools and methods across a network.

Vulnerability Management - User View

Learn to factor in the impact the user can have on an organisation's risk posture.

Web Communications and Security

An introduction to web application communications, security issues, and defenses.

Wireless Advantages and Bluetooth

Understand the advantages that make wireless technology ubiquitous and be introduced to Bluetooth wireless technology.

Exam Track

This course will prepare you for the following exam. The exam fee is not included in the course price. If you wish to take the exam, we’ll provide instructions on how to register with GIAC.

GIAC Security Leadership (GSLC) exam

  • 1 proctored exam
  • 150 questions
  • Time limit of 4 hours
  • Minimum Passing Score of 68%

You will be required to renew your GSLC certification every four years through Continuing Professional Experience (CPE) credits.

What's Included

Prerequisites

There are no prerequisites for this course.

Arvioinnit

Olemme kouluttaneet kymmenen vuoden aikana yli 134.561 opiskelijaa. Heitä kaikkia on pyydetty arvioimaan pikakurssimme. Tällä hetkellä 96,41% on sitä mieltä, että Firebrand on ylittänyt heidän odotuksensa:

"Best way to fully focus for complex certifications while benefiting from the real-life experience of the instructor"
Anonymous. (4/9/2023 (Maanantai) - 8/9/2023 (Perjantai))

"The instructor has a wealth of knowledge in OT, controls and automation. This especially true within the Oil and Gas industry. The training was significantly enhanced through this real-world experience and his ability interact with the class to cover off syllabus topics."
Anonymous. (28/11/2022 (Maanantai) - 2/12/2022 (Perjantai))

"Ive used Firebrand several times now over multiple job roles. I found this course GICSP was the most interesting course so far. This was hugely down to the instructor's interaction with the team and his shared real life scenarios. He is very knowledgeable indeed and presents the course in such a manner he made the subject feel much easier than it was. Its obvious that he is both passionate and dedicated in what he does. I look forward to attending onsite next year with him as the tutor"
Dave white, Essar Oil. (28/11/2022 (Maanantai) - 2/12/2022 (Perjantai))

"The GICSP training was excellent!"
AS. (28/11/2022 (Maanantai) - 2/12/2022 (Perjantai))

"Firebrand are well organised and their facilities, accommodation and training rooms are more than fit for purpose. The all-inclusive course represents good value and I would not hesitate to recommend to a friend or colleague, and have already done so!"
P.J., EDF Energy. (26/4/2021 (Maanantai) - 30/4/2021 (Perjantai))

Kurssipäivämäärät

Alkaa

Loppuu

Saatavuus

Sijainti

Rekisteröidy

19/2/2024 (Maanantai)

23/2/2024 (Perjantai)

Päättynyt - Jätä palautetta

-

 

24/6/2024 (Maanantai)

28/6/2024 (Perjantai)

Odotuslista

Maanlaajuinen

 

5/8/2024 (Maanantai)

9/8/2024 (Perjantai)

Rajoitettu määrä paikkoja

Maanlaajuinen

 

16/9/2024 (Maanantai)

20/9/2024 (Perjantai)

Paikkoja saatavilla

Maanlaajuinen

 

28/10/2024 (Maanantai)

1/11/2024 (Perjantai)

Paikkoja saatavilla

Maanlaajuinen

 

9/12/2024 (Maanantai)

13/12/2024 (Perjantai)

Paikkoja saatavilla

Maanlaajuinen

 

Uusimmat arvostelut opiskelijoiltamme