Systems Security Certified Practitioner (SSCP)

Systems Security Certified Practitioner (SSCP)

$0.00

Introduction As new cyberthreats make more headlines every day, there’s never been a greater level of demand for cybersecurity professional, globally. Recent global workforce estimates indicate that there is a shortfall of over 3 million certified cybersecurity professionals across the globe. This course, certified by ISC2 the world’s leading cybersecurity professional association, provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
  • Globally recognized advanced security administration and operations certification enables professionals to grow their careers and better secure critical assets
  • Benefits both individuals and the organizations that employ them, commanding respect, instant credibility and confidence
  • Creates a strong foundation for a career in cybersecurity while bolstering an organization’s overall security posture

After completing this course, the student will be able to:

 

    • Describe security and the alignment of asset management to risk management.
    • Appraise risk management options and the use of access controls to protect assets.
    • Examine the field of cryptography to secure information and communication.
    • Build a security posture by securing software, data, and endpoints.
    • Apply network and communications security to establish a secure networked environment.
    • Evaluate cloud and wireless security.
    • Prepare for incident detection and response.
    • Implement appropriate measures that contribute to the maturation of risk management

The SSCP is designed for cybersecurity and IT/ICT professionals who have hands-on responsibility for designing,

implementing and maintaining cyber, information, software and infrastructure security, whether in a cyber-

dedicated role or as part of their day-to-day IT/ICT position. Roles include:

    • Network Security Engineer
    • IT/Systems/Network Administrator
    • Security Analyst
    • Security Analyst
    • Systems Engineer
    • Security Consultant/Specialist

    • Security Administrator
    • Systems/Network Analyst
    • Database Administrator
    • Individuals operating in a security operations centre (SOC) environment performing the role of incident handler, SIEM analyst, forensics specialist, threat intel researcher, etc

Internationally Recognised Certificate in Cybersecurity from ISC2

Chapter 1: Introducing Security and Aligning Asset Management to Risk Management

  • Classify information security and security concepts.
  • Summarize components of the asset management lifecycle .
  • Identify common risks and vulnerabilities.
  • Provide examples of appropriate risk treatment.

Chapter 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets

  • Provide examples of functional security controls and policies for identified scenarios.
  • Classify various access control models.
  • Identify components of the identity management lifecycle.
  • Recognize access control and authentication methods.

Chapter 3: Cryptography

  • Identify the fundamental concepts of cryptography driving requirements and benefits.
  • Recognize symmetric encryption methods.
  • Use asymmetric encryption methods.
  • Examine Public-Key Infrastructure (PKI) systems and certificates.
  • Summarize fundamental key management terms and concepts.
  • Recognize how to implement secure protocols.
  • Review methods of cryptanalytic attack.

Chapter 4: Securing Software, Data, and Endpoints

  • Discuss software systems and application security.
  • Recognize data security concepts and skills.
  • Identify malicious code and countermeasures.

  • Evaluate Mobile Device Management (MDM) and security issues with mobile and autonomous endpoints.
  • Review attacks and countermeasures for virtual machines.

Chapter 5: Network and Communications Security

  • Recognize layers of the OSI Model, their functions, and attacks present at each layer.
  • Identify commonly used ports and protocols.
  • Select appropriate countermeasures for various network attacks.
  • Summarize best practices for establishing a secure networked environment.

Chapter 6: Cloud and Wireless Security

  • Recall cloud security concepts and configurations.
  • Recognize types of virtualization and cloud security considerations.

  • Summarize the types of telecommunications and network access controls

Chapter 7: Incident Detection and Response

  • Review the steps for monitoring, incident detection, and data loss prevention using all source intelligence.

  • Identify the elements of an incident response policy and members of the incident response team (IRT).

  • Classify the SSCP’s role in supporting forensic investigations.

Chapter 8: Maturing Risk Management

  • Identify operational aspects of change management.
  • Summarize physical security considerations.

  • Design a security education and awareness strategy.
  • Recognize common security assessment activities.
  • Classify the components of a business continuity plan and disaster recovery plan

Course Workbooks

Download Brochure