SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course
 
                    Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$13.74 / $24.99
Preparing for (ISC) Certification Course
- 
                                    1. Course Introduction2m
- 
                                    2. (ISC)? Exam Overview2m
- 
                                    3. Virtual Machine4m
- 
                                    4. Lab Setup5m
Access Controls: Part 1
- 
                                    1. Section Objectives1m
- 
                                    2. AAA and Authentication Factors2m
- 
                                    3. Trust Relations and Architecture2m
- 
                                    4. Subject-Based versus Object-Based2m
- 
                                    5. MAC versus DAC2m
- 
                                    6. Role–Based and Attribute–Based2m
- 
                                    7. Management Lifecycle3m
Access Controls: Part 2
- 
                                    1. Section Objectives1m
- 
                                    2. IEEE 802.1X and Mac Security3m
- 
                                    3. RADIUS and TACACS+2m
- 
                                    4. NAC and RAT2m
- 
                                    5. IPSec and SSL/TLS VPN2m
Security Operations and Administration
- 
                                    1. Section Objective1m
- 
                                    2. Asset Management and Change Management3m
- 
                                    3. Configuration Management and Impact Management3m
- 
                                    4. Security Training and Physical Security Operations3m
- 
                                    5. AUP Policy Enforcement4m
Security Policy and Terminologies
- 
                                    1. Section Objectives1m
- 
                                    2. Threat, Risk, and Vulnerability17m
- 
                                    3. Compromise Indicators3m
- 
                                    4. Security Triad2m
- 
                                    5. Written Security Policy3m
- 
                                    6. Countermeasure and Mitigation3m
Risk Identification, Monitoring, and Analysis: Part 1
- 
                                    1. Section Objectives1m
- 
                                    2. Risk Management and Assessment7m
- 
                                    3. Qualitative Risk Management2m
- 
                                    4. Quantitative Risk Management2m
- 
                                    5. Risk Visibility2m
- 
                                    6. Reporting3m
- 
                                    7. Auditing3m
Risk Identification, Monitoring, and Analysis: Part 2
- 
                                    1. Section Objectives1m
- 
                                    2. Regular Monitoring Importance4m
- 
                                    3. Syslog2m
- 
                                    4. SNMP and NetFlow2m
- 
                                    5. Security Analytics, Metrices, and Trends2m
- 
                                    6. Visualization2m
- 
                                    7. Data Analysis2m
- 
                                    8. Communicating Findings3m
Incident Response and Recovery
- 
                                    1. Section Objectives1m
- 
                                    2. Incident Handling Lifecycle3m
- 
                                    3. Forensics Investigations5m
- 
                                    4. BCP and DRP2m
- 
                                    5. Emergency Response1m
- 
                                    6. Restoration2m
- 
                                    7. Testing and Drills3m
Overview of Cryptography
- 
                                    1. Section Objectives1m
- 
                                    2. Cryptography Basics5m
- 
                                    3. Cipher and Types6m
- 
                                    4. Identify Algorithm4m
- 
                                    5. Encryption and Types7m
- 
                                    6. Hashing6m
Beyond the Basics of Cryptography
- 
                                    1. Section Objectives1m
- 
                                    2. Key Management5m
- 
                                    3. Digital Signatures2m
- 
                                    4. PKI and Components3m
- 
                                    5. Expiration and Suspension2m
- 
                                    6. Cryptography Attacks7m
- 
                                    7. Mitigation3m
Networks and Communications Security: Protocols and Services
- 
                                    1. Section Objectives1m
- 
                                    2. OSI and TCP/IP Model1m
- 
                                    3. Physical and Logical Topologies3m
- 
                                    4. Layer 2-42m
- 
                                    5. Layer 5-73m
Networks and Communications Security: Security Devices
- 
                                    1. Section Objectives1m
- 
                                    2. Routers2m
- 
                                    3. Switches2m
- 
                                    4. Firewall6m
- 
                                    5. Proxies6m
- 
                                    6. IDS and IPS4m
- 
                                    7. VPNs7m
Networks and Communications Security: Device Protection
- 
                                    1. Section Objectives1m
- 
                                    2. Device Hardening9m
- 
                                    3. Security Controls and Types2m
- 
                                    4. Segmentation and Zoning2m
- 
                                    5. Device Protection Best Practices3m
System and Application Security: Identify Malware Threats
- 
                                    1. Section Objectives1m
- 
                                    2. Virus, Worm, and Trojan10m
- 
                                    3. Ransomwares and Crypters3m
- 
                                    4. Spyware, Backdoor, and Logic Bombs4m
- 
                                    5. Identify Malicious Systems7m
- 
                                    6. Attack Tools and Kits5m
- 
                                    7. Malware Attack Countermeasure6m
System and Application Security: Secure Practices
- 
                                    1. Section Objectives1m
- 
                                    2. Application Security Basics16m
- 
                                    3. Data Storage Security13m
- 
                                    4. Third Party Outsourcing2m
- 
                                    5. Virtualization Security1m
- 
                                    6. Cloud Computing Security2m
- 
                                    7. Big Data Security2m
- 
                                    8. Legal Concerns2m
 
            