Description
(ISC)2 SSCP Systems Security Certified Practitioner Course + PDF Guides
(ISC)2 SSCP Systems Security Certified Practitioner Course + PDF Guides
THE SSCP TOOLBOX
Course Overview
What Is The SSCP Toolbox?
Who Are You?
What Does Your Study Plan Look Like?
What Is Your Timeline?
SECURITY OPERATIONS AND ADMINISTRATION
Comply With Codes Of Ethics
Understand Security Concepts
Identify + Implement Security Controls
Functional Security Controls
The Asset Management Lifecycle – First Half
The Asset Management Lifecycle – Second Half
The Change Management Lifecycle
Implementing Security Awareness + Training
Collaborate With Physical Security Operations
Security Operations + Administration – Key Points
ACCESS CONTROLS
Single/Multi-Factor Authentication (MFA)
Single Sign-On (SSO)
Spotlight On Kerberos
Device Authentication
Federated Access
Support Internetwork Trust Architectures
The Identity Management Lifecycle
Understand And Apply Access Controls
Understand Security Models
Access Controls – Key Points
RISK IDENTIFICATION, MONITORING + ANALYSIS
Risk Management Concepts – Vocabulary
Spotlight On Business Impact Analysis (BIA)
Risk Management Concepts – Impact Assessments
Risk Management Concepts – Threat Modeling
Risk Management Concepts – Threat Intelligence
Risk Tolerance + Treatment
Risk Management Frameworks
Spotlight On The Risk Management Framework (RMF)
Risk Visibility + Reporting
Legal + Regulatory Concerns
Spotlight On The GDPR
Security Assessment + Vulnerability Management
Spotlight On Risk Review
Operate + Monitor Security Platforms
Analyze Monitoring Results
Risk Identification, Monitoring + Analysis – Key Points
INCIDENT RESPONSE AND RECOVERY
Support The Incident Lifecycle
Forensic Investigations – Legal
Forensic Investigations – Evidence Handling
BCP + DRP – Planning
BCP + DRP – Backup + Redundancy
BCP + DRP – Alternate Strategies
BCP + DRP – Testing + Drills
Incident Response + Recovery – Key Points
CRYPTOGRAPHY
Reasons + Requirements For Cryptography
Cryptography Concepts – Hashing + Salting
Cryptography Concepts – Encryption
Cryptography Concepts – Non-Repudiation
Spotlight On Secure Protocols
Spotlight On IPsec
Public Key Infrastructure (PKI) Systems
Cryptography Concepts – Cryptographic Attacks
Cryptography – Key Points
NETWORK AND COMMUNICATIONS SECURITY
Spotlight On The OSI Model
Spotlight On Internet Protocol (IP) Networking
Topologies, Relationships + Transmission Types
Software-Defined Networking (SDN)
Network Attacks
Manage Network Access Controls
Manage Network Security
Network-Based Security Devices
Secure Wireless Communications
Network + Communications Security – Key Points
SYSTEMS AND APPLICATION SECURITY
Malicious Code + Activity
Implement + Operate Endpoint Device Security
Administer Mobile Device Management (MDM)
Cloud Security – Basics
Cloud Security – Legal + Regulatory Concerns
Cloud Security – Data
Cloud Security – Third Party + Outsourcing
Secure Virtual Environments
Systems And Application Security – Key Points
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.