SSCP
Systems Security Certified Practitioner Exam Preparation
SSCP Course Introduction
The Official (ISC)2 SSCP CBK Review Seminar is the most comprehensive, complete review of information systems security concepts and industry best practices, and the only review course endorsed by (ISC)2. Review Seminars are held worldwide and conducted by (ISC)2-authorized instructors, each of whom is up-to-date on the latest information security-related developments and is an expert in the specific domains.
SSCP Course Objectives
- To offers a high-level review of the main topics of SSCP CBK.
- To identify areas students/SSCP Candidates need to study.
- To provide an overview of the scope of the information security field.
- To study for SSCP examination.
SSCP Course Prerequisite
Target Group
- Network Security Engineer
- Systems/Network Administrator
- Security Analyst
- Systems Engineer
- Security Consultant/Specialist
- Security Administrator
- Systems/Network Analyst
Course Outline of SSCP
Day 1
Domain 1 Access Controls
- Principles of access control systems
- Internetwork trust architectures
- Federated identity management
- Identity management lifecycle
- Various access control frameworks
Domain 2 Security Operations and Administration
- Identification of information assets
- Documentation of policies, standards, procedures and guidelines
Domain 3 Risk Identification, Monitoring, and Analysis
- Identification, evaluation and prioritization of potential threats
- Systematic application of resources to monitor, manage and mitigate potential threats
- Risk management concepts
- Assessment activities
- Monitoring terminology, techniques and systems.
Day 2
Domain 4 Incident Response and Recovery
- Incident handling processes and procedures
- Addressing security incidents
- Supporting forensic investigations
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
Domain 5 Cryptography
- Common cryptographic concepts, methodologies, and technologies
- Legal and regulatory requirements
- Key management concepts
- Public key infrastructure
- Implementation and use of secure protocols
Day 3
Domain 6 Networks and Communications Security
- Encompasses network architecture
- Transmission methods
- Transport formats
- Control devices
- Security measures
- Information transmitted over communication networks
Domain 7 Systems and Application Security
- Common attack vectors and associated countermeasures
- Impact of virtualization
- Mobile devices
- Cloud computing
- Big Data vulnerabilities
- Configuration and security