Help Icon


Course Title
Systems Security Certified Practitioner (SSCP) Training


Systems Security Certified Practitioner (SSCP) is a premier security certification offered by ISC(2). This is an ideal program for those seeking the SSCP certification or preparing to find a position as a network administrator or a security administrator. This program is focused on several domains, including access controls, administration, auditing and monitoring, risk, response and recovery, cryptography, data communication, and malicious code/malware. Offered in partnership with ed2go.


In this program, you'll learn about the following:

  • Logical access controls for subjects and objects
  • Authentication
  • Access control concepts
  • Network trusts
  • Identity management
  • Cloud computing security concepts
  • Physical network security and network data security
  • OSI and TCP/ IP models
  • Remote access
  • Firewalls and proxies
  • Wireless security and cellular technologies
  • Security policies and awareness training

You’ll also learn how to manage various tasks related to:

  • Malware identification and mitigation
  • Risk management
  • Security assessment and incident handling
  • Business continuity plans and disaster recovery plans
  • Cryptography
  • PKI and certificates
  • IPSec
  • Encryption
  • VPNs
  • Security auditing
  • Change management
  • Data management
  • System monitoring and analysis


I. Introduction, Authentication and Access Control

A. Authentication

B. User Account Management

C. Access Control Concepts

D. Access Control Lists

E. Password Policy


II. Networking and Malware

A. Physical Network Security

B. Network Data Security

C. OSI and TCP/IP Models

D. Remote Access

E. Firewalls

F. Wireless Security


H. Malware Identification

I. Malware Mitigation


III. Risk, Response and Recovery and Cryptography

A. Risk Management

B. Security Assessment

C. Incident Handling

D. Business Continuity Plans and Disaster Recovery Plans

E. PKI and Certificates

F. IPSec

G. Encryption



IV. Monitoring and Security Policy

A. Security Auditing

B. Change Management

C. Security Policies

D. Data Management

E. System Monitoring

F. System Analysis

Method of Instruction



Class participation