Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

SSCP Certification Training

SSCP Certification Training

SSCP Certification or Systems Security Certified Practitioner (SSCP) Training:

SSCP Certification Training or Systems Security Certified Practitioner (SSCP) Training Course with Hands-On Labs (Online, Onsite, and Classroom)

Learn to implement, monitor and administer IT infrastructure in accordance with information security policies to prepare for the SSCP certification.

The best way to combat an attack on an organization’s information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor, and administer IT infrastructure to ensure data confidentiality, integrity, and availability. This SSCP Certification Training course validates students’ ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques, and systems.

Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).

This SSCP Certification Training course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

What’s Included

  • 5 Days of SSCP Certification Training from an Authorized (ISC)² Instructor
  • Official (ISC)² SSCP Student Guide
  • SSCP certification Exam voucher
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Resources

Related Courses:

Customize It:

  • If you are familiar with some aspects of Systems Security Certified Practitioner (SSCP), we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Systems Security Certified Practitioner (SSCP) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Systems Security Certified Practitioner (SSCP) course in manner understandable to lay audiences.

Audience / Target Group:

The intended audience for the Systems Security Certified Practitioner (SSCP) program is professionals who are involved in cybersecurity. Typically speaking, SSCP is ideal for those working in roles such as, but not limited to:

  • Network Security Engineer
  • Systems/Network Administrator
  • Security Analyst
  • Systems Engineer
  • Security Consultant/Specialist
  • Security Administrator
  • Systems/Network Analyst
  • Database Administrator

Prerequisites:

The knowledge and skills that a learner must have before attending this SSCP Certification Training course are:

  • Recommended: An understanding of UNIX, Linux, and Windows
  • Recommended: Familiarity with TCP/IP
  • Recommended: Intermediate-level knowledge of the security concepts
  • Recommended: Systems administration experience

Objectives:

This (ISC)² authorized SSCP Certification training seminar is based on the seven SSCP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the SSCP exam and enhance their overall competencies in cyber security.

  • Domain 1: Access Controls
  • Domain 2: Security Operations and Administration
  • Domain 3: Risk Identification, Monitoring, and Analysis
  • Domain 4: Incident Response and Recovery
  • Domain 5: Cryptography
  • Domain 6: Networks and Communications Security
  • Domain 7: Systems and Application Security

Course Syllabus:

Domain 1: Access Controls

Access Controls is the first domain reviewed in this official SSCP training seminar. Students can expect to learn about the underlying principles of access control systems and how to implement, manage and secure those systems. This includes internetwork trust architectures, federated identity management, identity management lifecycle, and various access control frameworks.

SSCP Training Objectives

  • Implementing Authentication Mechanisms
  • Operating Internetwork Trust Architectures
  • Participating in the Identity-Management Lifecycle
  • Implementing Access Controls

Domain 2: Security Operations and Administration

Security Operations and Administration is the second domain covered in this course. It focuses on the identification of information assets, along with the documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability.

SSCP Training Objectives

  • Understanding and Complying with Code of Ethics
  • Security Concepts
  • Documenting and Operating Security Controls
  • Asset Management
  • Implementing and Assessing Compliance with Controls
  • Change Management
  • Security Awareness and Training
  • Physical Security Operations

Domain 3: Risk Identification, Monitoring, and Analysis

Risk Identification, Monitoring, and Analysis is the third domain reviewed in our official SSCP training. It’s in this domain where students review the identification, evaluation, and prioritization of potential threats, while also learning the systematic application of resources to monitor, manage and mitigate those threats. Not only that, but students will also review a few additional subjects like risk management concepts, assessment activities, and monitoring terminology, techniques, and systems.

SSCP Training Objectives

  • Risk Management Process
  • Performing Security Assessment Activities
  • Operating and Maintaining Monitoring Systems
  • Analyzing Monitoring Results

Domain 4: Incident Response and Recovery

Incident Response and Recovery is the fourth domain reviewed in our SSCP training seminar. This domain reviews the proper implementation and exercise of incident-handling processes and procedures. The purpose of this is so students learn to provide rapid and consistent approaches to addressing security incidents, supporting forensic investigations, Business Continuity Planning (BCP), and Disaster Recovery Planning (DRP).

SSCP Training Objectives

  • Incident Handling
  • Forensic Investigations
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plan (DRP)

Domain 5: Cryptography

Cryptography is the fifth domain featured in our official SSCP training seminar. The material presented to students in this section reviews common cryptographic concepts, methodologies, and technologies. This includes legal and regulatory requirements, key management concepts, public key infrastructure, and the implementation and use of secure protocols.

SSCP Training Objectives

  • Applying Fundamental Concepts of Cryptography
  • Requirements of Cryptography
  • Supporting Secure Protocols
  • Operating and Implementing Cryptographic Systems

Domain 6: Networks and Communications Security

Networks and Communications Security is the sixth domain in this course. The main area of focus for this domain is on a number of topics like network architecture, transmission methods, transport formats, control devices, and the security measures used to maintain the confidentiality, integrity, and availability of the information transmitted over communication networks.

SSCP Training Objectives

  • Security Issues Related to Networks
  • Protecting Telecommunications Technologies
  • Controlling Network Access
  • Managing LAN-based Security
  • Operating and Configuring Network-Based Security Devices
  • Implementing and Operating Wireless Technologies

Domain 7: Systems and Application Security

Systems and Application Security is the seventh and final domain reviewed in this official SSCP training course. The main area of focus here is common attack vectors and associated countermeasures. This includes the impact of virtualization, mobile devices, cloud computing, Big Data vulnerabilities, configuration, and security.

SSCP Training Objectives

  • Identifying and Analyzing Malicious Code and Activity
  • Implementing and Operating Endpoint Device Security
  • Operating and Configuring Cloud Security
  • Securing Big Data Systems
  • Operating and Securing Virtual Environments

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: