YoVDO

(ISC)² Systems Security Certified Practitioner (SSCP)

Offered By: (ISC)² via Coursera

Tags

SSCP Certification Courses Cybersecurity Courses Cryptography Courses Network Security Courses Access Control Courses Application Security Courses Asset Management Courses Security Operations Courses

Course Description

Overview

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete seven courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Security Concepts and Practices Course 2 - Access Control Course 3 - Risk Identification, Monitoring, and Analysis Course 4 - Incident Response and Recovery Course 5 - Cryptography Course 6 - Network and Communications Security Course 7 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.

Syllabus

Course 1: Introducing Security: Aligning Asset and Risk Management
- Offered by ISC2. Course 1 - Introducing Security and Aligning Asset Management to Risk Management In this course, we're going to start by ... Enroll for free.

Course 2: Risk Management: Use of Access Controls to Protect Assets
- Offered by ISC2. Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In this course, we will ... Enroll for free.

Course 3: Cryptography
- Offered by ISC2. Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence ... Enroll for free.

Course 4: Securing Software, Data and End Points
- Offered by ISC2. Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve ... Enroll for free.

Course 5: Networks and Communications Security
- Offered by ISC2. Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn ... Enroll for free.

Course 6: Cloud and Wireless Security
- Offered by ISC2. Course 6: Cloud and Wireless Security Welcome to course six. This course applies to security concepts, ideas, and ... Enroll for free.

Course 7: Incident Detection and Response
- Offered by ISC2. Course 7: Incident Detection and Response Welcome to course seven, Incident Detection and Response. Having an intruder ... Enroll for free.

Course 8: Maturing Risk Management
- Offered by ISC2. Course 8: Maturing Risk Management In management science terms, maturing a process or practice means taking positive steps ... Enroll for free.


Courses

  • 7 reviews

    17 hours 54 minutes

    View details
    This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.
  • 1 review

    16 hours 3 minutes

    View details
    Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operations
  • 0 reviews

    14 hours 37 minutes

    View details
    Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Objectives 1. Describe how to implement Authentication mechanisms 2. Identify and operate internetwork trust architectures 3. Describe the process of administering identity management life cycle 4. Implement the different types of access controls (Subject/Object based)
  • 0 reviews

    16 hours 39 minutes

    View details
    Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Objectives 1. Identify malicious code activity 2. Describe malicious code and the various countermeasures 3. Describe the processes for operating endpoint device security 4. Define mobile device management processes 5. Describe the process for configuring cloud security 6. Explain the process for securing big data systems 7. Summarize the process for securing virtual environments
  • 0 reviews

    8 hours 59 minutes

    View details
    Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed. Course Objectives 1. Describe network-related security issues 2. Identify protective measures for telecommunication technologies 3. Define processes for controlling network access 4. Identify processes for managing LAN-based security 5. Describe procedures for operating and configuring networked-based security devices 6. Define procedures to implement and operate wireless technologies
  • 1 review

    23 hours 5 minutes

    View details
    Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives 1. Describe the risk management process 2. Perform security assessment activities 3. Describe processes for operating and maintaining monitoring systems 4. Identify events of interest 5. Describe the various source systems 6. Interpret reporting findings from monitoring results 7. Describe the incident handling process 8. Contribute to the incident handling process based upon role within the organization 9. Describe the supporting role in forensics investigation processes 10. Describe the supporting role in the business continuity planning process 11. Describe the supporting role in the disaster recovery planning process

Taught by

(ISC)² Education & Training

Tags

Related Courses

APIs
Meta via Coursera
Architecting with Google Kubernetes Engine en Español
Google Cloud via Coursera
Authentication and Authorization with AWS Identity and Access Management (Japanese) (日本語吹き替え版)
Amazon Web Services via AWS Skill Builder
AWS Security Fundamentals
Amazon Web Services via AWS Skill Builder
AWS Security Fundamentals (Second Edition) (French)
Amazon Web Services via AWS Skill Builder