Help Icon


Course Title
SSCP Systems Security Certified Practitioner (Voucher Included)


Systems Security Certified Practitioner (SSCP) is a premier security certification offered by ISC(2), ideal for those wanting to begin or advance a career in computer networking or security.

This program will prepare you for this industry recognized certification, as well as a career in the information technology sector.

Upon completion of the program, you will be given vouchers to take the Systems Security Certified Practitioner (SSCP) exam.


In this program, you'll learn about the following:

  • Logical access controls for subjects and objects
  • Authentication
  • Access control concepts
  • Network trusts
  • Identity management
  • Cloud computing security concepts
  • Physical network security and network data security
  • OSI and TCP/ IP models
  • Remote access
  • Firewalls and proxies
  • Wireless security and cellular technologies
  • Security policies and awareness training

You’ll also learn how to manage various tasks related to:

  • Malware identification and mitigation
  • Risk management
  • Security assessment and incident handling
  • Business continuity plans and disaster recovery plans
  • Cryptography
  • PKI and certificates
  • IPSec
  • Encryption
  • VPNs
  • Security auditing
  • Change management
  • Data management
  • System monitoring and analysis


I. Introduction, Authentication and Access Control

A. Authentication

B. User Account Management

C. Access Control Concepts

D. Access Control Lists

E. Password Policy

II. Networking and Malware

A. Physical Network Security

B. Network Data Security

C. OSI and TCP/IP Models

D. Remote Access

E. Firewalls

F. Wireless Security


H. Malware Identification

I. Malware Mitigation

III. Risk, Response and Recovery and Cryptography

A. Risk Management

B. Security Assessment

C. Incident Handling

D. Business Continuity Plans and Disaster Recovery Plans

E. PKI and Certificates

F. IPSec

G. Encryption


IV. Monitoring and Security Policy

A. Security Auditing

B. Change Management

C. Security Policies

D. Data Management

E. System Monitoring

F. System Analysis

Method of Instruction



Class participation