SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Preparing for (ISC) Certification Course
-
1. Course Introduction2m
-
2. (ISC)? Exam Overview2m
-
3. Virtual Machine4m
-
4. Lab Setup5m
Access Controls: Part 1
-
1. Section Objectives1m
-
2. AAA and Authentication Factors2m
-
3. Trust Relations and Architecture2m
-
4. Subject-Based versus Object-Based2m
-
5. MAC versus DAC2m
-
6. Role–Based and Attribute–Based2m
-
7. Management Lifecycle3m
Access Controls: Part 2
-
1. Section Objectives1m
-
2. IEEE 802.1X and Mac Security3m
-
3. RADIUS and TACACS+2m
-
4. NAC and RAT2m
-
5. IPSec and SSL/TLS VPN2m
Security Operations and Administration
-
1. Section Objective1m
-
2. Asset Management and Change Management3m
-
3. Configuration Management and Impact Management3m
-
4. Security Training and Physical Security Operations3m
-
5. AUP Policy Enforcement4m
Security Policy and Terminologies
-
1. Section Objectives1m
-
2. Threat, Risk, and Vulnerability17m
-
3. Compromise Indicators3m
-
4. Security Triad2m
-
5. Written Security Policy3m
-
6. Countermeasure and Mitigation3m
Risk Identification, Monitoring, and Analysis: Part 1
-
1. Section Objectives1m
-
2. Risk Management and Assessment7m
-
3. Qualitative Risk Management2m
-
4. Quantitative Risk Management2m
-
5. Risk Visibility2m
-
6. Reporting3m
-
7. Auditing3m
Risk Identification, Monitoring, and Analysis: Part 2
-
1. Section Objectives1m
-
2. Regular Monitoring Importance4m
-
3. Syslog2m
-
4. SNMP and NetFlow2m
-
5. Security Analytics, Metrices, and Trends2m
-
6. Visualization2m
-
7. Data Analysis2m
-
8. Communicating Findings3m
Incident Response and Recovery
-
1. Section Objectives1m
-
2. Incident Handling Lifecycle3m
-
3. Forensics Investigations5m
-
4. BCP and DRP2m
-
5. Emergency Response1m
-
6. Restoration2m
-
7. Testing and Drills3m
Overview of Cryptography
-
1. Section Objectives1m
-
2. Cryptography Basics5m
-
3. Cipher and Types6m
-
4. Identify Algorithm4m
-
5. Encryption and Types7m
-
6. Hashing6m
Beyond the Basics of Cryptography
-
1. Section Objectives1m
-
2. Key Management5m
-
3. Digital Signatures2m
-
4. PKI and Components3m
-
5. Expiration and Suspension2m
-
6. Cryptography Attacks7m
-
7. Mitigation3m
Networks and Communications Security: Protocols and Services
-
1. Section Objectives1m
-
2. OSI and TCP/IP Model1m
-
3. Physical and Logical Topologies3m
-
4. Layer 2-42m
-
5. Layer 5-73m
Networks and Communications Security: Security Devices
-
1. Section Objectives1m
-
2. Routers2m
-
3. Switches2m
-
4. Firewall6m
-
5. Proxies6m
-
6. IDS and IPS4m
-
7. VPNs7m
Networks and Communications Security: Device Protection
-
1. Section Objectives1m
-
2. Device Hardening9m
-
3. Security Controls and Types2m
-
4. Segmentation and Zoning2m
-
5. Device Protection Best Practices3m
System and Application Security: Identify Malware Threats
-
1. Section Objectives1m
-
2. Virus, Worm, and Trojan10m
-
3. Ransomwares and Crypters3m
-
4. Spyware, Backdoor, and Logic Bombs4m
-
5. Identify Malicious Systems7m
-
6. Attack Tools and Kits5m
-
7. Malware Attack Countermeasure6m
System and Application Security: Secure Practices
-
1. Section Objectives1m
-
2. Application Security Basics16m
-
3. Data Storage Security13m
-
4. Third Party Outsourcing2m
-
5. Virtualization Security1m
-
6. Cloud Computing Security2m
-
7. Big Data Security2m
-
8. Legal Concerns2m