Systems Security Certified Practitioner (SSCP) Online Course
description
Systems Security Certified Practitioner (SSCP) Online Course
About the Course
The Systems Security Certified Practitioner (SSCP) certification is designed for IT professionals with hands-on experience and a solid foundation in operational security. It validates your ability to implement, manage, and monitor IT infrastructure in alignment with information security policies that protect data confidentiality, integrity, and availability.
This course begins with an overview of the SSCP certification exam, followed by in-depth coverage of the seven core domains included in the exam curriculum:
- Access Controls
- Security Operations and Administration
- Risk Identification, Monitoring, and Analysis
- Incident Response and Recovery
- Cryptography
- Network and Communications Security
- Systems and Application Security
By the end of this course, you’ll be equipped with the knowledge and skills to secure systems, networks, and applications, and effectively apply IT security policies in real-world environments.
Who should take this Course?
The Systems Security Certified Practitioner (SSCP) Online Course is ideal for IT administrators, network security professionals, systems engineers, and cybersecurity practitioners who are responsible for implementing and maintaining secure IT infrastructures. It’s also suitable for individuals preparing for the SSCP certification exam. A minimum of one year of work experience in one or more of the SSCP domains is recommended, along with a foundational understanding of networking, access controls, and security best practices.
Course Curriculum
Preparing for (ISC) ² Certification Course
- The Course Overview
- Course Introduction
- (ISC)² Exam Overview
- Virtual Machine
- Lab Setup
Access Controls: Part 1
- Section Objectives
- AAA and Authentication Factors
- Trust Relations and Architecture
- Subject-Based versus Object-Based
- MAC versus DAC
- Role–Based and Attribute–Based
- Management Lifecycle
Access Controls: Part 2
- Section Objectives
- IEEE 802.1X and Mac Security
- RADIUS and TACACS+
- NAC and RAT
- IPSec and SSL/TLS VPN
Security Operations and Administration
- Section Objective
- Asset Management and Change Management
- Configuration Management and Impact Management
- Security Training and Physical Security Operations
- AUP Policy Enforcement
Security Policy and Terminologies
- Section Objectives
- Threat, Risk, and Vulnerability
- Compromise Indicators
- Security Triad
- Written Security Policy
- Countermeasure and Mitigation
Risk Identification, Monitoring, and Analysis: Part 1
- Section Objectives
- Risk Management and Assessment
- Qualitative Risk Management
- Quantitative Risk Management
- Risk Visibility
- Reporting
- Auditing
Risk Identification, Monitoring, and Analysis: Part 2
- Section Objectives
- Regular Monitoring Importance
- Syslog
- SNMP and NetFlow
- Security Analytics, Metrices, and Trends
- Visualization
- Data Analysis
- Communicating Findings
Incident Response and Recovery
- Section Objectives
- Incident Handling Lifecycle
- Forensics Investigations
- BCP and DRP
- Emergency Response
- Restoration
- Testing and Drills
Overview of Cryptography
- Section Objectives
- Cryptography Basics
- Cipher and Types
- Identify Algorithm
- Encryption and Types
- Hashing
Beyond the Basics of Cryptography
- Section Objectives
- Key Management
- Digital Signatures
- PKI and Components
- Expiration and Suspension
- Cryptography Attacks
- Mitigation
Networks and Communications Security: Protocols and Services
- Section Objectives
- OSI and TCP/IP Model
- Physical and Logical Topologies
- Layer 2-4
- Layer 5-7
Networks and Communications Security: Security Devices
- Section Objectives
- Routers
- Switches
- Firewall
- Proxies
- IDS and IPS
- VPNs
Networks and Communications Security: Device Protection
- Section Objectives
- Device Hardening
- Security Controls and Types
- Segmentation and Zoning
- Device Protection Best Practices
System and Application Security: Identify Malware Threats
- Section Objectives
- Virus, Worm, and Trojan
- Ransomwares and Crypters
- Spyware, Backdoor, and Logic Bombs
- Identify Malicious Systems
- Attack Tools and Kits
- Malware Attack Countermeasure
System and Application Security: Secure Practices
- Section Objectives
- Application Security Basics
- Data Storage Security
- Third Party Outsourcing
- Virtualization Security
- Cloud Computing Security
- Big Data Security
- Legal Concerns