Level: Foundation

Systems Security Certified Practitioner (SSCP)

5 Day | Instructor Led

If you are currently working in the information security field or IT with some responsibilities or even interest in security, then you should be seriously considering the Systems Security Certified Practitioner (SSCP) credential from (ISC)2. With as little as one year's work experience you can become certified and be on your way down a meaningful career path.

The SSCP certification is the ideal credential for those who are the hands-on practical technicians; the enforcers who everyone goes to for answers.You would implement the plans and policies designed, planned and managed by the CISO or CSO who would typically hold the more advanced Certified Information Systems Security Professional (CISSP) Gold Standard certification from (ISC)2 and operate in a managerial capacity as opposed to hands-on like you.

The SSCP is ideal for those working towards positions such as Network Security Engineers, Security Systems Analysts or Security Administrators. This is also the perfect course for personnel in many other non-security disciplines that require an understanding of security but do not have information security as a primary part of their job description. This large and growing group includes information systems auditors; application programmers; system, network and database administrators; business unit representatives and systems analysts.

Inquire About
Systems Security Certified Practitioner (SSCP)

Ideal Candidates for Systems Security Certified Practitioner (SSCP) Class

Network security engineer
Security administrator
Security analyst
Systems engineer
Network administrator
Systems administrator
Security specialist
Systems/network analyst
Security consultant
Database administrator

Systems Security Certified Practitioner (SSCP) Prerequisites

Students should meet the necessities outlined in the SSCP certification application requirements. This means that candidates should subscribe to the ISC2 Code of Ethics and have at least one year of cumulative work experience in one or more of the seven domains in information security. Valid experience includes information systems security -related work performed as a practitioner or that which requires information security knowledge and involves direct application of that knowledge.

What You'll Get in Systems Security Certified Practitioner (SSCP)

Expert Level Instruction

Ultimate Knowledge Institute Award Winning SSCP Student Workbook

Daily Homework Questions (Over 600 Questions)

Daily Quiz Questions (Over 600 Questions)

Handy Reference Charts and Tables

Flash Cards

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Systems Security Certified Practitioner (SSCP)

Upon completion of the Systems Security Certified Practitioner SSCP training course, the student will be able to:


Explain best practices for access control in modern Information Technology environments

Describe security administration principles

Implement key audit and monitoring principles in the network environment

Describe the various methods and uses of cryptography

Explain the fundamentals of data communications including type of networks and network topologies

Understand the various types of malicious code and Malware found in networks today

Explain risk management techniques

Implement safeguards and countermeasures

Systems Security Certified Practitioner (SSCP) Certification

ISC2 SSCP Certification

Systems Security Certified Practitioner (SSCP) Outline

1. Access Controls

  • Apply Logical Access Control in Terms of Subjects
  • Apply Logical Access Controls in Terms of Objects of Object Groups
  • Implement Authentication Mechanisms
  • Operate Internetwork Trust Architectures
  • Administer Identify Management Life Cycle
  • Implement Access Controls

2. Security Operations and Administration

  • Understand and Comply with Code of Ethics
  • Understand Security Concepts
  • Document and Operate Security Controls
  • Participate in Asset Management
  • Implement and Assess Compliance with Controls
  • Participate in Change Management Duties
  • Participate in Security Awareness Training
  • Participate in Physical Security Operations

3. Risk Identification, Monitoring, and Analysis

  • Understand the Risk Management Process
  • Perform Security Assessment Activities
  • Operate and Maintain Monitoring Systems
  • Analyze and Report Monitoring Results

4. Incident Response and Recovery

  • Participate in Incident Handling
  • Understand and Support Forensics Investigations
  • Understand and Support Business Continuity (BCP) and Disaster Recovery Plan (DRP)

5. Cryptography

  • Understand and Apply Fundamental Concepts of Cryptography
  • Understand Requirements for Cryptography
  • Operate and Implement Cryptographic Systems

6. Networks and Communications Security

  • Understand Security Issues Related to Networks
  • Protect Telecommunications Technologies
  • Control Network Access
  • Manage LAN-Based Security
  • Operate and Configure Network-Based Security Devices
  • Implement and Operate Wireless Technologies

7. Systems and Application Security

  • Identify and Analyze Malicious Code and Activity
  • Implement and Operate Endpoint Device Security
  • Operate and Configure Cloud Security
  • Secure Big Data Systems
  • Operate and Secure Virtual Environments

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).



This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.



CISSP Information Systems Security Architecture Professional (ISSAP)



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W