I always admire and like the GSLC title, Security Leadership looks appealing to me to learn more about management. Therefore, after researching and researching about how counter hack reloaded complimenting the course here (
http://www.techexams.net/forums/sans-institute-giac-certifications/92985-my-gslc-track.html). Given the overlapping materials with counterhack reloaded and GCIH, I went on to prepared using GCIH course book materials that I had received on March during my certification renewal and Eric Conrad Study guide for CISSP materials.The SANS folks describe the course as "drinking from the firehose", this definitely shows some difficulty to this exam, talking about challenging an exam which so much topics coverage as you can see here (
GIAC | Cyber Security Leadership | GSLC Certification), this exam would be is definitely difficult to challenge!
I was very skeptical on the materials I had, so I did a practice try out for 139 USD. I was disappointed on the coverage with GCIH books. I ended referring more from the CISSP study guides. My first try ended with a 70% score on just passed, with many questions topics ranges from the management, marketing and negotiation that pull down my score.I kept an extra window to google up everything single topics that I have never came across during the exam, that is really A LOT of things to cover. At times, I am really thinking I should just give up on this one, since the topic that says counter hack reloaded compliments the course really got me, as there seems there isn't really reference require from that book.So I went on to printed out more notes regarding those areas I never heard of to study.
After some considerations, I went on to buy the full challenge exams (that comes with 2 practices test). First time, got 85%, google up more topics. Second tries, got 92%, and google up even more topics.I end up having about 300+ pages of printed notes for the exam.
The day of the actual exam came, it wasn't smooth. The exam center I had booked is having latency issue, and I have to wait about 1-2 minutes between due to the network issue before I can proceed to the next question. This happens for about 20 of the questions. The clock continues to ticks while waiting, I ended losing about 20-30 minutes of the exam time due to this. This is definitely frustrating.Luckily, I managed to keep on track and finish the exam with a score of 80% with reference to only CISSP Study Guides and Printed Notes.
I am still slightly disappointed with the exam, it seems that this course definitely gear for managers that is new to cyber security especially if that manager have to due with products and vendors. Too many of the questions seems to high level, and I do wish that this has more coverage towards incident response, given that counter hack reloaded was highlighted that to compliment the course, but there isn't seems to have a requirement to use it.
I think GSLC is somewhat like GSEC, GSEC is CISSP except that software development and hardware architecture is replace by Linux and Windows Introduction. GSLC coveres some portion of software development and hardware architecture, and extends beyond marketing, negotiations, management, ethical, security awareness, packet analysis and several other similar concepts.
Overall, I think GSLC is easier than GSEC, to justify a difficulty, it should be slightly easier than CISSP, I would say to rank GSLC in this order among all certs I had
GCIH, GPEN, GSLC, CISSP, GISP, GSEC, GWAPT, GCIA
http://en.wikipedia.org/wiki/Modular_programminghttp://www.washingtonpost.com/news/local/wp/2015/02/09/ceo-ryan-carson-works-a-four-
day-work-week-heres-how/
http://www.inc.com/encyclopedia/licensing-agreements.htmlhttp://inventors.about.com/od/definations/g/Assignment.htmhttp://en.wikipedia.org/wiki/Value-added_tax#Imports_and_exportshttp://linux.die.net/man/3/gethostbyaddrhttp://missouribusiness.net/article/reducing-employee-turnover/http://en.wikipedia.org/wiki/EDGARhttp://en.wikipedia.org/wiki/U.S._Securities_and_Exchange_Commissionhttp://blog.transparentchoice.com/analytic-hierarchy-process/3-steps-to-reduce-the-number-of-comparisons-in-ahp
http://en.wikipedia.org/wiki/Marketing_mixhttp://tentiltwo.com/running-your-business-blog/1099-vs-employee-you-need-to-know-the-difference/
http://www.businessballs.com/meetings.htmhttp://www.brighthubpm.com/project-planning/65918-avoid-project-management-failures/https://www.deming.org/theman/theories/fourteenpointshttp://www.valuadder.com/glossary/business-valuation-approaches.htmlhttp://en.wikipedia.org/wiki/SMART_criteriahttp://en.wikipedia.org/wiki/Poster_childhttp://en.wikipedia.org/wiki/Zero-sum_gamehttp://en.wikipedia.org/wiki/PDCAhttp://en.wikipedia.org/wiki/ISO/IEC_27000-serieshttp://en.wikipedia.org/wiki/ISO/IEC_27002http://en.wikipedia.org/wiki/Whitelisthttp://www.sans.edu/research/security-laboratory/article/sys-interruptshttp://www.sans.edu/research/security-laboratory/article/log-bmb-trp-doorhttps://www.truste.com/about-truste/http://www.sans.edu/research/security-laboratory/article/367http://www.sans.edu/research/security-laboratory/article/321http://www.sans.edu/research/security-laboratory/article/threat-vector-didhttp://www.sans.edu/research/security-laboratory/article/convergence-didwww.sans.edu/student-files/projects/200608_001.ppthttp://searchsecurity.techtarget.com/magazineContent/Tying-log-management-and-identity-management-shortens-incident-response
http://citadel-information.com/wp-content/uploads/2012/08/nist-sp800-50-building-information-security-awareness-program-2003.pdf
https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcTDsnr3aprCOU6G_Ll8JFiv8iAJTmmGE2hwuvdmE7-146FC5u5egj1Z3I4
http://nmap.org/book/images/hdr/MJB-IP-Header-800x576.pnghttp://www.sans.org/security-resources/tcpip.pdfhttp://www.wikihow.com/Convert-Hexadecimal-to-Binary-or-Decimalhttp://en.wikipedia.org/wiki/List_of_HTTP_header_fieldshttp://www.investopedia.com/walkthrough/corporate-finance/2/depreciation/types-depreciation.aspx
http://accounting-simplified.com/financial/fixed-assets/depreciation-methods/types.htmlhttp://www.investopedia.com/terms/s/sum-of-the-years-digits.asphttp://www.aef.com/industry/careers/memos/8022http://en.wikipedia.org/wiki/Sender_Policy_Frameworkhttp://www.cnet.com/news/uh-oh-this-computer-virus-can-spread-via-wi-fi/http://www.school-for-champions.com/character/trustworthy.htm#.VS-4sEqgh9Qhttp://www.proprofs.com/mwiki/index.php/WAN_Technologieshttp://www.aef.com/industry/careers/memos/8022http://www.diycommitteeguide.org/article/vision-mission-and-valueshttp://www.peachpit.com/blogs/blog.aspx?uk=Handling-JSON-Data-Securely1http://www.negotiations.com/articles/negotiation-types/http://negotiatewithchad.blogspot.sg/2011/09/how-does-your-reservation-value-relate.html
http://www.negotiations.com/definition/reservation-price/http://web.mit.edu/negotiation/www/NBterms.htmlhttp://www.managerwise.com/article.phtml?id=655http://www.shmula.com/capacity-analysis-cost-production-analysis/9547/http://www.networkcomputing.com/how-to-speak-data-center-kwh-to-btus/a/d-id/1233953?
http://www.steadysales.com/the-7-steps-of-the-sales-process/http://www.sans.org/reading-room/whitepapers/warfare/future-information-warfare-819http://smallbusiness.chron.com/different-types-pricing-strategy-4688.htmlhttp://searchcompliance.techtarget.com/definition/risk-maphttp://www.sans.edu/research/security-laboratory/article/372http://www.sans.edu/research/security-laboratory/article/311http://en.wikipedia.org/wiki/Privately_held_companyhttp://en.wikipedia.org/wiki/Bluesnarfinghttp://en.wikipedia.org/wiki/Type_of_servicehttp://www.giac.org/paper/gsec/3495/elements-security-policy-considerations-small-businesses/102691
https://www.ucisa.ac.uk/~/media/Files/members/activities/ITIL/servicetransition/chanage_management/ITIL_a%20guide%20to%20change%20management%20pdf.ashx
http://www.computerworld.com/article/2563263/it-management/unplanned-work-is-silently-killing-it-departments.html
http://www.product-lifecycle-management.info/what-is-plm/operational-benefits.htmlhttp://www.hyperink.com/Lsquogood-To-Great-Summary-Chapter-7-Technology-Accelerators-b1253a29
http://en.wikipedia.org/wiki/Sysloghttp://hrmars.com/hrmars_papers/Article_09_Assessing_the_Relationship_between_Budget.pdf
http://www.projectsmart.co.uk/project-management-methodology-explained.phphttp://openmobilealliance.org/about-oma/http://www.opsecprofessionals.org/process.htmlhttp://www.negotiations.com/articles/zopa/http://www.businessinsider.com/these-economies-will-dominate-the-world-in-2050-2012-1?IR=T&op=1
http://en.wikipedia.org/wiki/Zubulake_Ihttp://en.wikipedia.org/wiki/Zubulake_v._UBS_Warburghttp://www.belarc.com/https://books.google.com.sg/books?id=oufJQ8Uo_pkC&pg=PA22&lpg=PA22&dq=Qualification,+Presentation,+Proposal,+Negotiation,+Close,+Delivery,+and+Evaluation&source=bl&ots=a3NJg9hjeQ&sig=ss0EYtBU-ZMkBkoDldSAniz4BKE&hl=en&sa=X&ei=28Y5Vf3YMcym8AWpmoGICw&ved=0CCIQ6AEwAQ#v=onepage&q=Qualification%2C%20Presentation%2C%20Proposal%2C%20Negotiation%2C%20Close%2C%20Delivery%2C%20and%20Evaluation&f=false
https://www.legalzoom.com/articles/know-your-rights-can-you-be-searched-without-a-warrant
http://en.wikipedia.org/wiki/Analytic_hierarchy_processhttp://www.industryweek.com/lean-six-sigma/ten-pitfalls-avoid-process-improvement-initiatives?page=1
http://www.negotiations.com/articles/authority-limits/http://en.wikipedia.org/wiki/Big_O_notationhttp://riskwise.ca/Bonus/are-you-ready-to-confront-the-brutal-facts-of-reality.html