SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Preparing for (ISC) Certification Course

  • 1. Course Introduction
    2m
  • 2. (ISC)? Exam Overview
    2m
  • 3. Virtual Machine
    4m
  • 4. Lab Setup
    5m

Access Controls: Part 1

  • 1. Section Objectives
    1m
  • 2. AAA and Authentication Factors
    2m
  • 3. Trust Relations and Architecture
    2m
  • 4. Subject-Based versus Object-Based
    2m
  • 5. MAC versus DAC
    2m
  • 6. Role–Based and Attribute–Based
    2m
  • 7. Management Lifecycle
    3m

Access Controls: Part 2

  • 1. Section Objectives
    1m
  • 2. IEEE 802.1X and Mac Security
    3m
  • 3. RADIUS and TACACS+
    2m
  • 4. NAC and RAT
    2m
  • 5. IPSec and SSL/TLS VPN
    2m

Security Operations and Administration

  • 1. Section Objective
    1m
  • 2. Asset Management and Change Management
    3m
  • 3. Configuration Management and Impact Management
    3m
  • 4. Security Training and Physical Security Operations
    3m
  • 5. AUP Policy Enforcement
    4m

Security Policy and Terminologies

  • 1. Section Objectives
    1m
  • 2. Threat, Risk, and Vulnerability
    17m
  • 3. Compromise Indicators
    3m
  • 4. Security Triad
    2m
  • 5. Written Security Policy
    3m
  • 6. Countermeasure and Mitigation
    3m

Risk Identification, Monitoring, and Analysis: Part 1

  • 1. Section Objectives
    1m
  • 2. Risk Management and Assessment
    7m
  • 3. Qualitative Risk Management
    2m
  • 4. Quantitative Risk Management
    2m
  • 5. Risk Visibility
    2m
  • 6. Reporting
    3m
  • 7. Auditing
    3m

Risk Identification, Monitoring, and Analysis: Part 2

  • 1. Section Objectives
    1m
  • 2. Regular Monitoring Importance
    4m
  • 3. Syslog
    2m
  • 4. SNMP and NetFlow
    2m
  • 5. Security Analytics, Metrices, and Trends
    2m
  • 6. Visualization
    2m
  • 7. Data Analysis
    2m
  • 8. Communicating Findings
    3m

Incident Response and Recovery

  • 1. Section Objectives
    1m
  • 2. Incident Handling Lifecycle
    3m
  • 3. Forensics Investigations
    5m
  • 4. BCP and DRP
    2m
  • 5. Emergency Response
    1m
  • 6. Restoration
    2m
  • 7. Testing and Drills
    3m

Overview of Cryptography

  • 1. Section Objectives
    1m
  • 2. Cryptography Basics
    5m
  • 3. Cipher and Types
    6m
  • 4. Identify Algorithm
    4m
  • 5. Encryption and Types
    7m
  • 6. Hashing
    6m

Beyond the Basics of Cryptography

  • 1. Section Objectives
    1m
  • 2. Key Management
    5m
  • 3. Digital Signatures
    2m
  • 4. PKI and Components
    3m
  • 5. Expiration and Suspension
    2m
  • 6. Cryptography Attacks
    7m
  • 7. Mitigation
    3m

Networks and Communications Security: Protocols and Services

  • 1. Section Objectives
    1m
  • 2. OSI and TCP/IP Model
    1m
  • 3. Physical and Logical Topologies
    3m
  • 4. Layer 2-4
    2m
  • 5. Layer 5-7
    3m

Networks and Communications Security: Security Devices

  • 1. Section Objectives
    1m
  • 2. Routers
    2m
  • 3. Switches
    2m
  • 4. Firewall
    6m
  • 5. Proxies
    6m
  • 6. IDS and IPS
    4m
  • 7. VPNs
    7m

Networks and Communications Security: Device Protection

  • 1. Section Objectives
    1m
  • 2. Device Hardening
    9m
  • 3. Security Controls and Types
    2m
  • 4. Segmentation and Zoning
    2m
  • 5. Device Protection Best Practices
    3m

System and Application Security: Identify Malware Threats

  • 1. Section Objectives
    1m
  • 2. Virus, Worm, and Trojan
    10m
  • 3. Ransomwares and Crypters
    3m
  • 4. Spyware, Backdoor, and Logic Bombs
    4m
  • 5. Identify Malicious Systems
    7m
  • 6. Attack Tools and Kits
    5m
  • 7. Malware Attack Countermeasure
    6m

System and Application Security: Secure Practices

  • 1. Section Objectives
    1m
  • 2. Application Security Basics
    16m
  • 3. Data Storage Security
    13m
  • 4. Third Party Outsourcing
    2m
  • 5. Virtualization Security
    1m
  • 6. Cloud Computing Security
    2m
  • 7. Big Data Security
    2m
  • 8. Legal Concerns
    2m
Study4Pass does not provide real Microsoft exam questions. Similarly, Study4Pass does not supply real Amazon exam questions. The materials offered by Study4Pass lack real questions and answers from Cisco's certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of Study4Pass content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

© study4pass.com 2025. All rights reserved.