SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Preparing for (ISC) Certification Course

  • 1. Course Introduction
    2m
  • 2. (ISC)? Exam Overview
    2m
  • 3. Virtual Machine
    4m
  • 4. Lab Setup
    5m

Access Controls: Part 1

  • 1. Section Objectives
    1m
  • 2. AAA and Authentication Factors
    2m
  • 3. Trust Relations and Architecture
    2m
  • 4. Subject-Based versus Object-Based
    2m
  • 5. MAC versus DAC
    2m
  • 6. Role–Based and Attribute–Based
    2m
  • 7. Management Lifecycle
    3m

Access Controls: Part 2

  • 1. Section Objectives
    1m
  • 2. IEEE 802.1X and Mac Security
    3m
  • 3. RADIUS and TACACS+
    2m
  • 4. NAC and RAT
    2m
  • 5. IPSec and SSL/TLS VPN
    2m

Security Operations and Administration

  • 1. Section Objective
    1m
  • 2. Asset Management and Change Management
    3m
  • 3. Configuration Management and Impact Management
    3m
  • 4. Security Training and Physical Security Operations
    3m
  • 5. AUP Policy Enforcement
    4m

Security Policy and Terminologies

  • 1. Section Objectives
    1m
  • 2. Threat, Risk, and Vulnerability
    17m
  • 3. Compromise Indicators
    3m
  • 4. Security Triad
    2m
  • 5. Written Security Policy
    3m
  • 6. Countermeasure and Mitigation
    3m

Risk Identification, Monitoring, and Analysis: Part 1

  • 1. Section Objectives
    1m
  • 2. Risk Management and Assessment
    7m
  • 3. Qualitative Risk Management
    2m
  • 4. Quantitative Risk Management
    2m
  • 5. Risk Visibility
    2m
  • 6. Reporting
    3m
  • 7. Auditing
    3m

Risk Identification, Monitoring, and Analysis: Part 2

  • 1. Section Objectives
    1m
  • 2. Regular Monitoring Importance
    4m
  • 3. Syslog
    2m
  • 4. SNMP and NetFlow
    2m
  • 5. Security Analytics, Metrices, and Trends
    2m
  • 6. Visualization
    2m
  • 7. Data Analysis
    2m
  • 8. Communicating Findings
    3m

Incident Response and Recovery

  • 1. Section Objectives
    1m
  • 2. Incident Handling Lifecycle
    3m
  • 3. Forensics Investigations
    5m
  • 4. BCP and DRP
    2m
  • 5. Emergency Response
    1m
  • 6. Restoration
    2m
  • 7. Testing and Drills
    3m

Overview of Cryptography

  • 1. Section Objectives
    1m
  • 2. Cryptography Basics
    5m
  • 3. Cipher and Types
    6m
  • 4. Identify Algorithm
    4m
  • 5. Encryption and Types
    7m
  • 6. Hashing
    6m

Beyond the Basics of Cryptography

  • 1. Section Objectives
    1m
  • 2. Key Management
    5m
  • 3. Digital Signatures
    2m
  • 4. PKI and Components
    3m
  • 5. Expiration and Suspension
    2m
  • 6. Cryptography Attacks
    7m
  • 7. Mitigation
    3m

Networks and Communications Security: Protocols and Services

  • 1. Section Objectives
    1m
  • 2. OSI and TCP/IP Model
    1m
  • 3. Physical and Logical Topologies
    3m
  • 4. Layer 2-4
    2m
  • 5. Layer 5-7
    3m

Networks and Communications Security: Security Devices

  • 1. Section Objectives
    1m
  • 2. Routers
    2m
  • 3. Switches
    2m
  • 4. Firewall
    6m
  • 5. Proxies
    6m
  • 6. IDS and IPS
    4m
  • 7. VPNs
    7m

Networks and Communications Security: Device Protection

  • 1. Section Objectives
    1m
  • 2. Device Hardening
    9m
  • 3. Security Controls and Types
    2m
  • 4. Segmentation and Zoning
    2m
  • 5. Device Protection Best Practices
    3m

System and Application Security: Identify Malware Threats

  • 1. Section Objectives
    1m
  • 2. Virus, Worm, and Trojan
    10m
  • 3. Ransomwares and Crypters
    3m
  • 4. Spyware, Backdoor, and Logic Bombs
    4m
  • 5. Identify Malicious Systems
    7m
  • 6. Attack Tools and Kits
    5m
  • 7. Malware Attack Countermeasure
    6m

System and Application Security: Secure Practices

  • 1. Section Objectives
    1m
  • 2. Application Security Basics
    16m
  • 3. Data Storage Security
    13m
  • 4. Third Party Outsourcing
    2m
  • 5. Virtualization Security
    1m
  • 6. Cloud Computing Security
    2m
  • 7. Big Data Security
    2m
  • 8. Legal Concerns
    2m