Help Icon

ETG8072

Course
ETG8072
Course Title
SSCP Systems Security Certified Practitioner (Voucher Included)

Description

Systems Security Certified Practitioner (SSCP) is a premier security certification offered by ISC(2), ideal for those wanting to begin or advance a career in computer networking or security.

This program will prepare you for this industry recognized certification, as well as a career in the information technology sector.

Upon completion of the program, you will be given vouchers to take the Systems Security Certified Practitioner (SSCP) exam.

Objectives

In this program, you'll learn about the following:

  • Logical access controls for subjects and objects
  • Authentication
  • Access control concepts
  • Network trusts
  • Identity management
  • Cloud computing security concepts
  • Physical network security and network data security
  • OSI and TCP/ IP models
  • Remote access
  • Firewalls and proxies
  • Wireless security and cellular technologies
  • Security policies and awareness training

You’ll also learn how to manage various tasks related to:

  • Malware identification and mitigation
  • Risk management
  • Security assessment and incident handling
  • Business continuity plans and disaster recovery plans
  • Cryptography
  • PKI and certificates
  • IPSec
  • Encryption
  • VPNs
  • Security auditing
  • Change management
  • Data management
  • System monitoring and analysis

Content

I. Introduction, Authentication and Access Control

A. Authentication

B. User Account Management

C. Access Control Concepts

D. Access Control Lists

E. Password Policy

II. Networking and Malware

A. Physical Network Security

B. Network Data Security

C. OSI and TCP/IP Models

D. Remote Access

E. Firewalls

F. Wireless Security

G. VLANs

H. Malware Identification

I. Malware Mitigation

III. Risk, Response and Recovery and Cryptography

A. Risk Management

B. Security Assessment

C. Incident Handling

D. Business Continuity Plans and Disaster Recovery Plans

E. PKI and Certificates

F. IPSec

G. Encryption

H. VPNs

IV. Monitoring and Security Policy

A. Security Auditing

B. Change Management

C. Security Policies

D. Data Management

E. System Monitoring

F. System Analysis

Method of Instruction

Online

Evaluation

Class participation