Certified: The GIAC GSLC Audio Course
Durata totale:
12 h 10 min
Episode 1 — Decode the GSLC Exam Structure, Question Style, Scoring, and Timing Strategy
Certified: The GIAC GSLC Audio Course
15:22
Episode 2 — Build a Spoken Study Plan: Indexing, Pacing, and Retake-Ready Habits
Certified: The GIAC GSLC Audio Course
16:03
Episode 3 — Command Core Cryptography Vocabulary Leaders Must Use With Precision
Certified: The GIAC GSLC Audio Course
17:27
Episode 4 — Select Symmetric Encryption Algorithms Based on Speed, Use Case, and Risk
Certified: The GIAC GSLC Audio Course
18:24
Episode 5 — Manage Keys Safely: Generation, Storage, Rotation, and Access Controls
Certified: The GIAC GSLC Audio Course
18:37
Episode 6 — Apply Public Key Cryptography for Identity, Exchange, and Secure Workflows
Certified: The GIAC GSLC Audio Course
17:18
Episode 7 — Explain Digital Signatures for Integrity, Nonrepudiation, and Trust Decisions
Certified: The GIAC GSLC Audio Course
16:42
Episode 8 — Use Hashing Correctly for Integrity Checks and Tamper Detection
Certified: The GIAC GSLC Audio Course
15:02
Episode 9 — Design Password Storage That Survives Breaches Using Modern Hash Strategies
Certified: The GIAC GSLC Audio Course
17:59
Episode 10 — Reinforce Crypto Decisions With Practical Threat Models and Failure Modes
Certified: The GIAC GSLC Audio Course
16:49
Episode 11 — Lead Incident Response as a Lifecycle With Clear Roles and Authority
Certified: The GIAC GSLC Audio Course
16:50
Episode 12 — Build Triage Discipline: Severity, Scope, Impact, and Containment Priorities
Certified: The GIAC GSLC Audio Course
15:49
Episode 13 — Preserve Evidence Correctly: Chain of Custody, Logging, and Forensics Readiness
Certified: The GIAC GSLC Audio Course
16:47
Episode 14 — Coordinate Communications: Legal, PR, Executives, and Affected Stakeholders
Certified: The GIAC GSLC Audio Course
16:38
Episode 15 — Run Containment Choices Without Breaking Business Operations or Safety
Certified: The GIAC GSLC Audio Course
17:34
Episode 16 — Drive Eradication and Recovery With Verification, Monitoring, and Closure Criteria
Certified: The GIAC GSLC Audio Course
17:54
Episode 17 — Operationalize Lessons Learned Into Program Improvements and Reduced Recurrence
Certified: The GIAC GSLC Audio Course
16:55
Episode 18 — Build Business Continuity Planning That Reflects Real Business Dependencies
Certified: The GIAC GSLC Audio Course
17:25
Episode 19 — Design Disaster Recovery Targets: RTO, RPO, Testing, and Restoration Evidence
Certified: The GIAC GSLC Audio Course
18:15
Episode 20 — Define SOC Mission and Scope That Matches Business Risk and Maturity
Certified: The GIAC GSLC Audio Course
19:26
Episode 21 — Choose SOC Operating Models: In-House, Outsourced, Hybrid, and Follow-the-Sun
Certified: The GIAC GSLC Audio Course
20:39
Episode 22 — Staff a SOC With Clear Roles, Skills, and Escalation Paths
Certified: The GIAC GSLC Audio Course
21:31
Episode 23 — Set SOC Metrics That Drive Quality, Not Ticket Volume Theater
Certified: The GIAC GSLC Audio Course
19:05
Episode 24 — Build Use Cases That Improve Detection Fidelity and Analyst Confidence
Certified: The GIAC GSLC Audio Course
17:36
Episode 25 — Improve SOC Handoffs With Playbooks, Case Management, and Evidence Standards
Certified: The GIAC GSLC Audio Course
18:19
Episode 26 — Secure the SDLC by Embedding Security Requirements and Design Reviews
Certified: The GIAC GSLC Audio Course
18:45
Episode 27 — Prioritize Application Risks Using Threat Modeling and Abuse-Case Thinking
Certified: The GIAC GSLC Audio Course
19:08
Episode 28 — Operationalize Secure Coding Expectations Without Slowing Delivery Excessively
Certified: The GIAC GSLC Audio Course
19:08
Episode 29 — Manage Dependency and Component Risk Across Build Pipelines and Releases
Certified: The GIAC GSLC Audio Course
18:14
Episode 30 — Secure Infrastructure as Code With Reviews, Policy Gates, and Guardrails
Certified: The GIAC GSLC Audio Course
18:30
Episode 31 — Drive DevSecOps Adoption With Measurable Controls and Shared Ownership
Certified: The GIAC GSLC Audio Course
18:41
Episode 32 — Build Application Security Testing Strategy: SAST, DAST, SCA, and Triage
Certified: The GIAC GSLC Audio Course
18:48
Episode 33 — Explain AI Types and Capabilities Leaders Must Understand to Govern Risk
Certified: The GIAC GSLC Audio Course
20:07
Episode 34 — Evaluate AI Business Benefits Without Confusing Demos With Production Reality
Certified: The GIAC GSLC Audio Course
19:40
Episode 35 — Manage AI Security Risks: Data Leakage, Prompt Abuse, and Model Misuse
Certified: The GIAC GSLC Audio Course
20:19
Episode 36 — Set AI Governance: Acceptable Use, Access Controls, and Monitoring Expectations
Certified: The GIAC GSLC Audio Course
20:43
Episode 37 — Master Cloud Service Models and Shared Responsibility Without Blind Spots
Certified: The GIAC GSLC Audio Course
19:29
Episode 38 — Secure Cloud Identity: Roles, Federation, MFA, and Least Privilege Enforcement
Certified: The GIAC GSLC Audio Course
19:12
Episode 39 — Design Cloud Network Segmentation to Reduce Blast Radius and Lateral Movement
Certified: The GIAC GSLC Audio Course
19:43
Episode 40 — Operationalize Cloud Logging: Sources, Normalization, Retention, and Alert Quality
Certified: The GIAC GSLC Audio Course
19:32