Level: Foundation

Systems Security Certified Practitioner (SSCP)

5 Day | Instructor Led

If you are currently working in the information security field or IT with some responsibilities or even interest in security, then you should be seriously considering the Systems Security Certified Practitioner (SSCP) credential from (ISC)2. With as little as one year's work experience you can become certified and be on your way down a meaningful career path.

The SSCP certification is the ideal credential for those who are the hands-on practical technicians; the enforcers who everyone goes to for answers.You would implement the plans and policies designed, planned and managed by the CISO or CSO who would typically hold the more advanced Certified Information Systems Security Professional (CISSP) Gold Standard certification from (ISC)2 and operate in a managerial capacity as opposed to hands-on like you.

The SSCP is ideal for those working towards positions such as Network Security Engineers, Security Systems Analysts or Security Administrators. This is also the perfect course for personnel in many other non-security disciplines that require an understanding of security but do not have information security as a primary part of their job description. This large and growing group includes information systems auditors; application programmers; system, network and database administrators; business unit representatives and systems analysts.

Inquire About:
Systems Security Certified Practitioner (SSCP)

Ideal Candidates for Systems Security Certified Practitioner (SSCP) Class

Network security engineer
Security administrator
Security analyst
Systems engineer
Network administrator
Systems administrator
Security specialist
Systems/network analyst
Security consultant
Database administrator

Systems Security Certified Practitioner (SSCP) Prerequisites

Students should meet the necessities outlined in the SSCP certification application requirements. This means that candidates should subscribe to the ISC2 Code of Ethics and have at least one year of cumulative work experience in one or more of the seven domains in information security. Valid experience includes information systems security -related work performed as a practitioner or that which requires information security knowledge and involves direct application of that knowledge.

What You'll Get in Systems Security Certified Practitioner (SSCP)

Expert Level Instruction

Ultimate Knowledge Institute Award Winning SSCP Student Workbook

Daily Homework Questions (Over 600 Questions)

Daily Quiz Questions (Over 600 Questions)

Handy Reference Charts and Tables

Flash Cards

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Systems Security Certified Practitioner (SSCP)

Upon completion of the Systems Security Certified Practitioner SSCP training course, the student will be able to:

Explain best practices for access control in modern Information Technology environments

Describe security administration principles

Implement key audit and monitoring principles in the network environment

Describe the various methods and uses of cryptography

Explain the fundamentals of data communications including type of networks and network topologies

Understand the various types of malicious code and Malware found in networks today

Explain risk management techniques

Implement safeguards and countermeasures

Systems Security Certified Practitioner (SSCP) Certification

ISC2 SSCP Certification

Systems Security Certified Practitioner (SSCP) Outline

1. Access Controls

  • Apply Logical Access Control in Terms of Subjects
  • Apply Logical Access Controls in Terms of Objects of Object Groups
  • Implement Authentication Mechanisms
  • Operate Internetwork Trust Architectures
  • Administer Identify Management Life Cycle
  • Implement Access Controls

2. Security Operations and Administration

  • Understand and Comply with Code of Ethics
  • Understand Security Concepts
  • Document and Operate Security Controls
  • Participate in Asset Management
  • Implement and Assess Compliance with Controls
  • Participate in Change Management Duties
  • Participate in Security Awareness Training
  • Participate in Physical Security Operations

3. Risk Identification, Monitoring, and Analysis

  • Understand the Risk Management Process
  • Perform Security Assessment Activities
  • Operate and Maintain Monitoring Systems
  • Analyze and Report Monitoring Results

4. Incident Response and Recovery

  • Participate in Incident Handling
  • Understand and Support Forensics Investigations
  • Understand and Support Business Continuity (BCP) and Disaster Recovery Plan (DRP)

5. Cryptography

  • Understand and Apply Fundamental Concepts of Cryptography
  • Understand Requirements for Cryptography
  • Operate and Implement Cryptographic Systems

6. Networks and Communications Security

  • Understand Security Issues Related to Networks
  • Protect Telecommunications Technologies
  • Control Network Access
  • Manage LAN-Based Security
  • Operate and Configure Network-Based Security Devices
  • Implement and Operate Wireless Technologies

7. Systems and Application Security

  • Identify and Analyze Malicious Code and Activity
  • Implement and Operate Endpoint Device Security
  • Operate and Configure Cloud Security
  • Secure Big Data Systems
  • Operate and Secure Virtual Environments


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

The BEC XXE exercise is a customized, six-hour, Cyber Range exercise hosted on ManTech’s Advanced Cyber Range Environment (ACRE). Lead by expert cyber security engineers, the exercise can be executed in a classroom and remotely. In this exercise, BEC-based attacks are simulated. Participants will be introduced to variations of the BEC attack (both external and internal) and will capture, preserve and recover network and host-based artifacts from the attacks. They will also determine the origin of the attacks, the extent of the compromise, and any on-going activity related to it. Discussion focuses on blue team threat hunter tasks. This exercise uses a hands-on keyboard approach to create realistic technical training and management interaction opportunities where participants respond to and report events as identified. Participants are engaged via an Incident Response "Observe/Engage" Model and are encouraged to view the attack as if it were happening to their institutions in real time. Participants are asked to share what they have done or would do based on the facts provided.

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W