Systems Security Certified Practitioner (SSCP) Online Course
Systems Security Certified Practitioner (SSCP) Online Course
Systems Security Certified Practitioner (SSCP) Online Course
About the Course
The Systems Security Certified Practitioner (SSCP) certification is designed for IT professionals with hands-on experience and a solid foundation in operational security. It validates your ability to implement, manage, and monitor IT infrastructure in alignment with information security policies that protect data confidentiality, integrity, and availability.
This course begins with an overview of the SSCP certification exam, followed by in-depth coverage of the seven core domains included in the exam curriculum:
Access Controls
Security Operations and Administration
Risk Identification, Monitoring, and Analysis
Incident Response and Recovery
Cryptography
Network and Communications Security
Systems and Application Security
By the end of this course, you’ll be equipped with the knowledge and skills to secure systems, networks, and applications, and effectively apply IT security policies in real-world environments.
Who should take this Course?
The Systems Security Certified Practitioner (SSCP) Online Course is ideal for IT administrators, network security professionals, systems engineers, and cybersecurity practitioners who are responsible for implementing and maintaining secure IT infrastructures. It’s also suitable for individuals preparing for the SSCP certification exam. A minimum of one year of work experience in one or more of the SSCP domains is recommended, along with a foundational understanding of networking, access controls, and security best practices.
Course Curriculum
Preparing for (ISC) ² Certification Course
The Course Overview
Course Introduction
(ISC)² Exam Overview
Virtual Machine
Lab Setup
Access Controls: Part 1
Section Objectives
AAA and Authentication Factors
Trust Relations and Architecture
Subject-Based versus Object-Based
MAC versus DAC
Role–Based and Attribute–Based
Management Lifecycle
Access Controls: Part 2
Section Objectives
IEEE 802.1X and Mac Security
RADIUS and TACACS+
NAC and RAT
IPSec and SSL/TLS VPN
Security Operations and Administration
Section Objective
Asset Management and Change Management
Configuration Management and Impact Management
Security Training and Physical Security Operations
AUP Policy Enforcement
Security Policy and Terminologies
Section Objectives
Threat, Risk, and Vulnerability
Compromise Indicators
Security Triad
Written Security Policy
Countermeasure and Mitigation
Risk Identification, Monitoring, and Analysis: Part 1
Section Objectives
Risk Management and Assessment
Qualitative Risk Management
Quantitative Risk Management
Risk Visibility
Reporting
Auditing
Risk Identification, Monitoring, and Analysis: Part 2
Section Objectives
Regular Monitoring Importance
Syslog
SNMP and NetFlow
Security Analytics, Metrices, and Trends
Visualization
Data Analysis
Communicating Findings
Incident Response and Recovery
Section Objectives
Incident Handling Lifecycle
Forensics Investigations
BCP and DRP
Emergency Response
Restoration
Testing and Drills
Overview of Cryptography
Section Objectives
Cryptography Basics
Cipher and Types
Identify Algorithm
Encryption and Types
Hashing
Beyond the Basics of Cryptography
Section Objectives
Key Management
Digital Signatures
PKI and Components
Expiration and Suspension
Cryptography Attacks
Mitigation
Networks and Communications Security: Protocols and Services
Section Objectives
OSI and TCP/IP Model
Physical and Logical Topologies
Layer 2-4
Layer 5-7
Networks and Communications Security: Security Devices
Section Objectives
Routers
Switches
Firewall
Proxies
IDS and IPS
VPNs
Networks and Communications Security: Device Protection
Section Objectives
Device Hardening
Security Controls and Types
Segmentation and Zoning
Device Protection Best Practices
System and Application Security: Identify Malware Threats