- info@africariskmanagers.com
- +44(0) 203 733 2195
Systems Security Certified Practitioner (SSCP)
SKU
N/A
Category Cyber Security Risk Management
Systems Security Certified Practitioner (SSCP)
$0.00
Introduction As new cyberthreats make more headlines every day, there’s never been a greater level of demand for cybersecurity professional, globally. Recent global workforce estimates indicate that there is a shortfall of over 3 million certified cybersecurity professionals across the globe.
This course, certified by ISC2 the world’s leading cybersecurity professional association, provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
- Globally recognized advanced security administration and operations certification enables professionals to grow their careers and better secure critical assets
- Benefits both individuals and the organizations that employ them, commanding respect, instant credibility and confidence
- Creates a strong foundation for a career in cybersecurity while bolstering an organization’s overall security posture
After completing this course, the student will be able to:
- Describe security and the alignment of asset management to risk management.
- Appraise risk management options and the use of access controls to protect assets.
- Examine the field of cryptography to secure information and communication.
- Build a security posture by securing software, data, and endpoints.
- Apply network and communications security to establish a secure networked environment.
- Evaluate cloud and wireless security.
- Prepare for incident detection and response.
- Implement appropriate measures that contribute to the maturation of risk management
The SSCP is designed for cybersecurity and IT/ICT professionals who have hands-on responsibility for designing,
implementing and maintaining cyber, information, software and infrastructure security, whether in a cyber-
dedicated role or as part of their day-to-day IT/ICT position. Roles include:
- Network Security Engineer
- IT/Systems/Network Administrator
- Security Analyst
- Security Analyst
- Systems Engineer
Security Consultant/Specialist
- Security Administrator
- Systems/Network Analyst
- Database Administrator
Individuals operating in a security operations centre (SOC) environment performing the role of incident handler, SIEM analyst, forensics specialist, threat intel researcher, etc
Internationally Recognised Certificate in Cybersecurity from ISC2
Chapter 1: Introducing Security and Aligning Asset Management to Risk Management
- Classify information security and security concepts.
- Summarize components of the asset management lifecycle .
- Identify common risks and vulnerabilities.
- Provide examples of appropriate risk treatment.
Chapter 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets
- Provide examples of functional security controls and policies for identified scenarios.
- Classify various access control models.
- Identify components of the identity management lifecycle.
Recognize access control and authentication methods.
Chapter 3: Cryptography
- Identify the fundamental concepts of cryptography driving requirements and benefits.
- Recognize symmetric encryption methods.
- Use asymmetric encryption methods.
- Examine Public-Key Infrastructure (PKI) systems and certificates.
- Summarize fundamental key management terms and concepts.
- Recognize how to implement secure protocols.
- Review methods of cryptanalytic attack.
Chapter 4: Securing Software, Data, and Endpoints
- Discuss software systems and application security.
- Recognize data security concepts and skills.
Identify malicious code and countermeasures.
- Evaluate Mobile Device Management (MDM) and security issues with mobile and autonomous endpoints.
- Review attacks and countermeasures for virtual machines.
Chapter 5: Network and Communications Security
- Recognize layers of the OSI Model, their functions, and attacks present at each layer.
- Identify commonly used ports and protocols.
- Select appropriate countermeasures for various network attacks.
- Summarize best practices for establishing a secure networked environment.
Chapter 6: Cloud and Wireless Security
- Recall cloud security concepts and configurations.
Recognize types of virtualization and cloud security considerations.
- Summarize the types of telecommunications and network access controls
Chapter 7: Incident Detection and Response
Review the steps for monitoring, incident detection, and data loss prevention using all source intelligence.
Identify the elements of an incident response policy and members of the incident response team (IRT).
Classify the SSCP’s role in supporting forensic investigations.
Chapter 8: Maturing Risk Management
- Identify operational aspects of change management.
Summarize physical security considerations.
- Design a security education and awareness strategy.
- Recognize common security assessment activities.
- Classify the components of a business continuity plan and disaster recovery plan
Course Workbooks