Price: 10.00 USD | Size: 2.50 GB | Duration : 15 Hours | 137 Video Lessons | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : SSCP PDF Guides + official practice tests | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links
You can Download This Course immediately from the click that Links
SSCP Systems Security Certified Practitioner 2nd Edition Complete 15 Hours Course & PDF Guides
15 hours of video instruction to learn everything you need to know about the Systems Security Certified Practitioner (SSCP) certification exam. Includes the new content covering the 2022 update.
OverviewSSCP (Systems Security Certified Practitioner) Complete Video Course provides 15 hours of comprehensive video that teaches you everything you need to know to get up and running with systems security. The content in this title has been updated to include coverage of the all-new topics in the 2022 exam release. The (ISC)2 SSCP exam is a solid introductory certification in IT security, and this comprehensive video course walks you through every topic on the exam blueprint so you can learn about system security from the ground up and gain the knowledge and skills you need to pass the SSCP exam. Full of live trainer discussions, hands-on demos, whiteboard work, and deep-dive discussions, this course covers security fundamentals and principles in a way that is easy to access.
This video course covers every objective in the SSCP certification exam so you can use it as a complete study tool to pass the test, including the updates in the 2022 exam release, along with the knowledge and skills you need to advance your cybersecurity career. The (ISC)2 SSCP exam is a vendor-neutral world-recognized certification that endorses your IT security knowledge. It is also a great way to start your path toward CISSP certification, which is the next step through (ISC)2.
Topics include
- Access controls
- Security operations and administration
- Risk identification, monitoring, and analysis
- Incident response and recovery
- Cryptography
- Network and communications security
- Systems and application security
Skill Level
- Beginner
What You Will Learn
- Key concepts for all the objectives on the SSCP exam
- Security and cybersecurity fundamentals and principles
Who Should Take This Course
The target audience for this course consists of systems/network/application security professionals who are preparing for the SSCP exam. A secondary audience consists of any IT professional who wants to gain a broad understanding of how to secure modern enterprises.
Course Requirements
There are no prerequisites for this course, although fundamental networking knowledge is recommended.
Table of Contents
Introduction
Module 1: Security Operations and Administration
Lesson 1: Fundamental Security Concepts
1.1 (ISC)2 Code of Ethics
1.2 Understand Security Concepts
1.3 Identify and Implement Security Controls
1.4 Document and Maintain Functional Security Controls
Lesson 2: Security Management Lifecycles
2.1 Initiation and Development or Acquisition Phases
2.2 Implementation and Operation Phases
2.3 Archiving and Disposal Phases
2.4 Change and Configuration Management
Lesson 3: Security Awareness and Training
3.1 Security Training During Onboarding
3.2 Continual Security Awareness
3.3 Security Education for the Enterprise
Lesson 4: Collaborate with Physical Security Operations
4.1 Defense-in-Depth
4.2 Campus Physical Security
4.3 Facility Physical Security
4.4 Operational Physical Security
Module 2: Practical Cryptography
Lesson 5: Cryptography Use Cases
5.1 The CIAN Model
5.2 Data Sensitivity Cases
5.3 Regulatory Use Cases
Lesson 6: Applied Cryptographic Concepts
6.1 Cryptographic Hashing and HMACs
6.2 Salt and Pepper
6.3 Symmetric vs. Asymmetric Cryptosystems
6.4 Digital Signatures
6.5 Strength of Encryption Algorithms and Keys
6.6 Cryptographic Attacks and Cryptanalysis
Lesson 7: Public Key Infrastructure
7.1 Web of Trust
7.2 Digital Certificates
7.3 Internet PKI
7.4 Fundamental Key Management Concepts
Lesson 8: Understand Secure Protocols
8.1 Services and Protocols
8.2 Common Use Cases
8.3 Limitations and Vulnerabilities
Module 3: Access Controls
Lesson 9: Implement and Maintain Authentication Methods
9.1 Single/Multi-factor Authentication (MFA)
9.2 Single Sign-on (SSO) and Federated Access
9.3 Device Authentication
Lesson 10: Support Internetwork Trust Architectures