Sale!

(ISC)2 SSCP Systems Security Certified Practitioner Course & PDF Guides

Original price was: $35.00.Current price is: $15.00.

  • Price: $15.00 USD
  • Size: 21.5 GB
  • Duration: 27+ Hours
  • Number of Video Lessons: 77
  • Brand:
  • Language: English
  • Bonus: (ISC)² SSCP PDF Guides + Official Practice Tests
  • Delivery: Instant Download
  • Rating: ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

(ISC)2 SSCP Systems Security Certified Practitioner Course + PDF Guides

 

(ISC)2 SSCP Systems Security Certified Practitioner Course + PDF Guides

 

THE SSCP TOOLBOX

Course Overview

What Is The SSCP Toolbox?

Who Are You?

What Does Your Study Plan Look Like?

What Is Your Timeline?

 

SECURITY OPERATIONS AND ADMINISTRATION

Comply With Codes Of Ethics

Understand Security Concepts

Identify + Implement Security Controls

Functional Security Controls

The Asset Management Lifecycle – First Half

The Asset Management Lifecycle – Second Half

The Change Management Lifecycle

Implementing Security Awareness + Training

Collaborate With Physical Security Operations

Security Operations + Administration – Key Points

 

ACCESS CONTROLS

Single/Multi-Factor Authentication (MFA)

Single Sign-On (SSO)

Spotlight On Kerberos

Device Authentication

Federated Access

Support Internetwork Trust Architectures

The Identity Management Lifecycle

Understand And Apply Access Controls

Understand Security Models

Access Controls – Key Points

 

RISK IDENTIFICATION, MONITORING + ANALYSIS

Risk Management Concepts – Vocabulary

Spotlight On Business Impact Analysis (BIA)

Risk Management Concepts – Impact Assessments

Risk Management Concepts – Threat Modeling

Risk Management Concepts – Threat Intelligence

Risk Tolerance + Treatment

Risk Management Frameworks

Spotlight On The Risk Management Framework (RMF)

Risk Visibility + Reporting

Legal + Regulatory Concerns

Spotlight On The GDPR

Security Assessment + Vulnerability Management

Spotlight On Risk Review

Operate + Monitor Security Platforms

Analyze Monitoring Results

Risk Identification, Monitoring + Analysis – Key Points

 

INCIDENT RESPONSE AND RECOVERY

Support The Incident Lifecycle

Forensic Investigations – Legal

Forensic Investigations – Evidence Handling

BCP + DRP – Planning

BCP + DRP – Backup + Redundancy

BCP + DRP – Alternate Strategies

BCP + DRP – Testing + Drills

Incident Response + Recovery – Key Points

 

CRYPTOGRAPHY

Reasons + Requirements For Cryptography

Cryptography Concepts – Hashing + Salting

Cryptography Concepts – Encryption

Cryptography Concepts – Non-Repudiation

Spotlight On Secure Protocols

Spotlight On IPsec

Public Key Infrastructure (PKI) Systems

Cryptography Concepts – Cryptographic Attacks

Cryptography – Key Points

 

NETWORK AND COMMUNICATIONS SECURITY

Spotlight On The OSI Model

Spotlight On Internet Protocol (IP) Networking

Topologies, Relationships + Transmission Types

Software-Defined Networking (SDN)

Network Attacks

Manage Network Access Controls

Manage Network Security

Network-Based Security Devices

Secure Wireless Communications

Network + Communications Security – Key Points

 

SYSTEMS AND APPLICATION SECURITY

Malicious Code + Activity

Implement + Operate Endpoint Device Security

Administer Mobile Device Management (MDM)

Cloud Security – Basics

Cloud Security – Legal + Regulatory Concerns

Cloud Security – Data

Cloud Security – Third Party + Outsourcing

Secure Virtual Environments

Systems And Application Security – Key Points


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.