top of page
SSCP | Systems Security Certified Practitioner

SSCP | Systems Security Certified Practitioner

 

Official ISC2® Training Seminar for the Systems Security Certified Practitioner (SSCP®) provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.

This training course will help students review and refresh their knowledge and identify areas they need to study for the SSCP exam. Content aligns with and comprehensively covers the seven domains of the ISC2 SSCP Common Body of Knowledge (CBK®). Official courseware is developed by ISC2 – creator of the SSCP CBK – to ensure your training is relevant and up to date. Our instructors are verified security experts who hold the SSCP and have completed intensive training to teach ISC2 content.

 

Course Objectives

After completing this course, the student will be able to:

  • Describe security and the alignment of asset management to risk management.
  • Appraise risk management options and the use of access controls to protect assets.
  • Examine the field of cryptography to secure information and communication.
  • Build a security posture by securing software, data, and endpoints.
  • Apply network and communications security to establish a secure networked environment.
  • Evaluate cloud and wireless security.
  • Prepare for incident detection and response.
  • Implement appropriate measures that contribute to the maturation of risk management.

 

Who Should Attend

This training course is intended for practitioners who have at least one year of cumulative, paid work experience in one or more of the seven domains of the ISC2 SSCP CBK and are pursuing SSCP training and certification to acquire the credibility and mobility to advance within their current information security careers.

The training seminar is ideal for those with technical skills and practical, hand-on security knowledge working in operational IT positions such as, but not limited to:

  • Network Security Engineer
  • Systems/Network Administrator
  • Security Analyst
  • Systems Engineer
  • Security Consultant/Specialist
  • Security Administrator
  • Systems/Network Analyst
  • Database Administrator

 

Course Domains

  • Domain 1: Security Operations and Administration
  • Domain 2: Access Controls
  • Domain 3: Risk Identification, Monitoring and Analysis
  • Domain 4: Incident Response and Recovery
  • Domain 5: Cryptography
  • Domain 6: Network and Communications Security
  • Domain 7: Systems and Application Security

 

Outline Course

Module 1: Introducing Security and Aligning Asset Management to Risk Management

  • Classify information security and security concepts.
  • Summarize components of the asset management lifecycle .
  • Identify common risks and vulnerabilities.
  • Provide examples of appropriate risk treatment.

Module 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets

  • Provide examples of functional security controls and policies for identified scenarios.
  • Classify various access control models.
  • Identify components of the identity management lifecycle.
  • Recognize access control and authentication methods.

Module 3: Cryptography

  • Identify the fundamental concepts of cryptography driving requirements and benefits.
  • Recognize symmetric encryption methods.
  • Use asymmetric encryption methods.
  • Examine Public-Key Infrastructure (PKI) systems and certificates.
  • Summarize fundamental key management terms and concepts.
  • Recognize how to implement secure protocols.
  • Review methods of cryptanalytic attack

Module 4: Securing Software, Data, and Endpoints

  • Discuss software systems and application security.
  • Recognize data security concepts and skills.
  • Identify malicious code and countermeasures.
  • Evaluate Mobile Device Management (MDM) and security issues with mobile and autonomous endpoints.
  • Review attacks and countermeasures for virtual machines.

Module 5: Network and Communications Security

  • Recognize layers of the OSI Model, their functions, and attacks present at each layer.
  • Identify commonly used ports and protocols.
  • Select appropriate countermeasures for various network attacks.
  • Summarize best practices for establishing a secure networked environment.

Module 6: Cloud and Wireless Security

  • Recall cloud security concepts and configurations.
  • Recognize types of virtualization and cloud security considerations.
  • Summarize the types of telecommunications and network access controls.

Module 7: Incident Detection and Response

  • Review the steps for monitoring, incident detection, and data loss prevention using all source intelligence.
  • Identify the elements of an incident response policy and members of the incident response team (IRT).
  • Classify the SSCP's role in supporting forensic investigations.

Module 8: Maturing Risk Management

  • Identify operational aspects of change management.
  • Summarize physical security considerations.
  • Design a security education and awareness strategy.
  • Recognize common security assessment activities.
  • Classify the components of a business continuity plan and disaster recovery plan

 

Descargue el temario para conocer el detalle completo de los contenidos.

 

Debido a las constantes actualizaciones de los contenidos de los cursos por parte del fabricante, el contenido de este temario puede variar con respecto al publicado en el sitio oficial, sin embargo, Netec siempre entregará la versión actualizada de éste.

SSCP | Systems Security Certified Practitioner

SKU: ISC2-SSCP
  • Duración

    Virtual en vivo: 5 días

    Digital: 6 meses de acceso

    Versión 8.24
    Temario Descarga aquí ⇩
    Métodos de entrega 👤       💻      @
    El curso digital incluye

    - Acceso de 180 días al contenido oficial del curso

    - Libro de texto digital

    - Comprobaciones de conocimientos al finalizar el curso

    - Conclusiones del curso

    - Contenido interactivo

    - Tarjetas didácticas interactivas del curso

    - Evaluación práctica al finalizar curso

    - Diploma de participación y badge al completar el curso
bottom of page