Training Programs Cybersecurity SSCP Systems Security Certified Practitioner
cart-icn

You already have a course in your cart

You can only add one course to your cart at a time! By adding this course, you will replace the existing course from your cart. How would you like to proceed?

SSCP Systems Security Certified Practitioner

This online Systems Security Certified Practitioner (SSCP) course is ideal for individuals interested in advancing their knowledge of information and systems security.

sscp-systems-security-certified-practitioner
$1,795.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. Security Operations and Administration
    1. What is ISC/SSCP
    2. Security Basics
    3. Segregation of duties
    4. Security controls
    5. Administrative controls
    6. Assessing compliance
    7. Types of security controls
    8. Asset management
    9. Change management lifecycle
  2. Access Controls
    1. Types of authentication
    2. Access Controls
    3. RBAC
    4. Rule Based Access Control
    5. MAC
    6. DAC
    7. Trust relationships
    8. Transitive
    9. Zero
    10. Identity management
    11. Authorization
  3. Risk Identification
    1. Definitions – risk, risk management, vulnerability
    2. Determining risk levels
    3. Key Risk Indicator
    4. Types of risk responses
    5. Acceptance
    6. Mitigation
    7. Identifying risks and vulnerabilities
    8. Creating baselines and anomalies
    9. Risk management frameworks (RMF) – enterprise level
    10. COBIT
    11. Vulnerability management planning
    12. Creating reports
    13. Remediation
    14. Continuous monitoring
    15. Slow performance of systems/crashing
    16. Network
    17. Metrics and data analysis
    18. Event triggers
    19. Legal restraints
  4. Incident Response
    1. Response plan
    2. Documenting a response plan
    3. First steps
    4. Recording any changes/moves made to secure data – chain of custody
    5. Contain damage (disconnect drives, etc)
    6. Next steps
    7. Plan on how to resolve issue
    8. Investigate source of incident – forensic investigation
    9. Begin recovery
    10. Document all actions
    11. After actions reporting
    12. Document future prevention plan
    13. Provide employee/personal training to avoid repeat scenario
    14. Backup planning
    15. Testing backups
    16. Emergency response plans
  5. Cryptography
    1. Laws and regulations
    2. ISO
    3. Data encryption
    4. Encryption during transit
    5. Encryption at rest
    6. Strength of encryptions
    7. What is Public Key Infrastructure (PKI)
    8. Certificate authority
    9. What uses PKI
    10. Key creation and destruction
    11. PGP
    12. GPG
    13. Blockchain
    14. Nonrepudiation
    15. Digital Signatures
    16. HMAC
    17. Security protocols
    18. SSL/TLS
    19. S/MIME
    20. DKIM
  6. Network and Communication Security
    1. Parts of a network
    2. Routers/switches
    3. Firewalls
    4. IDS/IPS
    5. TCP/IP model
    6. OSI Model
    7. Compare/contrast models side by side
    8. Important protocols in IP stack
    9. HTTP
    10. Email protocols
    11. Other common protocols – FTP, DNS
    12. Network topologies
    13. Bus
    14. Ring
    15. Hybrid
    16. Peer-to-peer
    17. Switches
    18. VLANs
    19. Switchport abilities
    20. Trunking
    21. Routers
    22. Routing protocols
    23. Load balancing
    24. RADIUS
    25. TACACS
    26. ACLs
    27. Remote access through VPN
    28. VPN
    29. Types
    30. Function
    31. VPN topology
    32. Firewalls
    33. Selecting an appropriate technology
    34. Best practices
    35. Firewall evasion
    36. Other devices
    37. Wireless topology
    38. Wireless Standards
    39. Encryption
    40. Authentication
    41. Threats
    42. Prevention
    43. Placement of APs/antennas
    44. Bluetooth
    45. NFC technology
  7. Systems and Applications Security
    1. Network attacks
    2. Ransomware
    3. Trojans
    4. Exploits
    5. Spyware/Adware
    6. Man in the Middle
    7. Rootkits
    8. Social Engineering attacks
    9. Whaling
    10. Password hacking
    11. System hardening
    12. Anti-Virus
    13. Host based IDS
    14. Host Based firewalls
    15. Utilities
    16. Common types
    17. Application whitelisting
    18. Mobile device management
    19. Encryption
    20. Mobile application management
    21. Restrictions
    22. DLP
    23. Disk encryption
    24. File level encryption
    25. Containerization
    26. Cloud security
    27. Data transmission
    28. Benefits/drawbacks of cloud
    29. Data ownership in cloud environments
    30. Virtualization

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
Kent State University - Tuscarawas
Business and Community Service
330 University Dr. NE
New Philiadelphia, OH 44663 US
MAIN CONTENT

Copyright © 1997 - 2024 All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Cengage Learning. Privacy Policy