Systems Security Certified Practitioner
Starting dates and places
Description
Prerequisites:
If you wish to sit the SSCP exam you must have one year working in the Information Security arena, covering at least one of the domains from the SSCP CBK. Proof of this must be supplied to (ISC)2.Course Description:
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification covers seven domains which they describe as 'the compendium of topics pertaining to an Information Systems Security Practitioner', the CBK (Common Body of Knowledge). The seven domains maps directly to the seven modules of this course listed below, it is referred to as a taxonomy or collection of past, present and future topics around Information Security.
The SSCP is aimed at security go-to-peopl…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
If you wish to sit the SSCP exam you must have one year working in the Information Security arena, covering at least one of the domains from the SSCP CBK. Proof of this must be supplied to (ISC)2.Course Description:
The (ISC)2 Systems Security Certified Practitioner (SSCP) certification covers seven domains which they describe as 'the compendium of topics pertaining to an Information Systems Security Practitioner', the CBK (Common Body of Knowledge). The seven domains maps directly to the seven modules of this course listed below, it is referred to as a taxonomy or collection of past, present and future topics around Information Security.
The SSCP is aimed at security go-to-people, on the front line of a business dealing with technologies employed to protect Information. If you are responsible for implementing and maintaining countermeasures such as Firewalls, Intrusion Detection or Prevention, Anti-Virus solutions or Public Key Infrastructures and you want a certification to attest to your skills and professionalism within Information Security, this is it.
(ISC)2 SSCP. The exam is not a part of the course, delegates will be required to book their own exam through (ISC)2 and should reference for a schedule.
This course includes the following modules:
Access Controls
- Identification Authentication Authorisation and Accounting
- Logical Access Controls (Subjects accessing Objects)
- Implementing Authentication
- Access Control Models, MAC, DAC, NDAC and RBAC
- TCSEC, ITSEC and Common Criteria
Cryptography
- Public Key Infrastructures
- Confidentiality and Integrity
- Digital Signatures
- Transmission Security
Malicious Code and Activity
- Viruses, Trojans, Worms and their characteristics
- Anatomy of an attack
- Hackers and Crackers
- Incident detection and prevention, tools and techniques
Monitoring and Analysis
- Security Auditing and Frameworks
- Vulnerability and Penetration Testing
- IDS and IPS and Firewalls
- Logging and Monitoring
Networks and Communications
- OSI and Networking Technologies
- TCP/IP and LAN based protocols
- Remote Access Protocols
- Wireless Security
Risk, Response and Recovery
- Risk Management
- Business Continuity Planning
- Disaster Recovery Planning
- Incident Response and Forensics
Security Operations and Administration
- Policies, Standards and Guidelines
- Change and Configuration Management
- System Development Lifecycle
- Security best practices
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.