Systems Security Certified Practitioner (2019)
Infosec theory & skills to protect networks46 H 56 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayThis course has a practice test
Episodes
Episodes
- Watch This First
- Overview
- Just the Basics
- Access Controls
- Control Access to Assets
- Manage Identification and Authentication
- Manage Identification and Authentication Pt.2
- Manage Identification and Authentication Pt.3
- Integrate Identity as a Third Party Service
- Authorization Mechanisms
- Authorization Mechanisms Part 2
- Authorization Mechanisms Part 3
- Authorization Mechanisms Part 4
- The Identity and Access Provisioning Lifecycle
- Access Control Attacks
- Access Controls - Key Points
- Security Operations & Administration
- The ISC2 Code of Professional Ethics
- Identify and Classify Assets
- Asset Ownership and Privacy Protection
- Establish Asset Handling Requirements
- Secure Provisioning and Resource Protection
- Databases and Data Warehouses
- Databases and Data Warehouses Part 2
- Foundational Security Operations Concepts
- Determine Data Security Controls
- Assessment, Test and Audit Strategies
- Control Selection and System Requirments
- Control Selection and System Requirements Part 2
- Participate in Change Management
- Implement Recovery Strategies
- Implement Recovery Strategies Part 2
- Implement Recovery Strategies Part 3
- Implement Physical Security
- Implement Physical Security Part 2
- Personnel Safety and Security Concerns
- Patch and Vulnerability Management
- Security in the SDLC
- Security in the SDLC Part 2
- Security Controls in Development Environments
- Security Operations, Administration - Key Points
- Risk Identification, Monitoring and Analysis
- Review of Confidentiality, Integrity, Availability
- Evaluate and Apply Security Governance Principles
- Determine Compliance Requirements
- Information Security in a Global Context
- Risk Management Concepts
- Risk Management Concepts Part 2
- Risk Management Concepts Part 3
- Threat Modeling Concepts
- Risk in the Supply Chain
- Assessment and Testing
- Assessment and Testing Part 2
- Assessment and Testing Part 3
- Logging and Monitoring
- Logging and Monitoring Part 2
- Risk Identification, Monitoring, Analysis Key Pnts
- Incident Response and Recovery
- Supporting Forensic Investigations
- Supporting Forensic Investigations Part 2
- Conduct Incident Management
- Business Continuity and Disaster Recovery
- Business Continuity and Disaster Recovery Pt.2
- Incident Response and Recovery - Key Points
- Cryptography
- Cryptography... Just What Is It Anyway
- Applied Cryptography
- Applied Cryptography Part 2
- Applied Cryptography Part 3
- Applied Cryptography Part 4
- Applied Cryptography Part 5
- Applied Cryptography Part 6
- Applied Cryptography Part 7
- Applied Cryptography Part 8
- Applied Cryptography Part 9
- Cryptography - Key Points
- Network and Communications Security
- Design Principles in Network Architecture
- Design Principles in Network Architecture Part 2
- Design Principles in Network Architecture Part 3
- Design Principles in Network Architecture Part 4
- Design Principles in Network Architecture Part 5
- Design Principles in Network Architecture Part 6
- Design Principles in Network Architecture Part 7
- Design Principles in Network Architecture Part 8
- Design Principles in Network Architecture Part 9
- Secure Network Components
- Secure Network Components Part 2
- Secure Network Components Part 3
- Implement Secure Communication Channels
- Implement Secure Communication Channels Pt.2
- Implement Secure Communication Channels Pt.3
- Implement Secure Communication Channels Pt.4
- Implement Secure Communication Channels Pt.5
- Network and Communication Security - Key Points
- Systems and Application Security
- Identify and Analyze Malicious Code
- Identify and Analyze Malicious Code Part 2
- Identify and Analyze Malicious Code Part 3
- Endpoint Device Security
- Endpoint Device Security Part 2
- Cloud Computing
- Operate and Secure Virtual Environments
- Systems and Application Security - Key Points
Overview
8 M



- Episode Description
- Transcript
The Systems Security Certified Practitioner (SSCP) certification is one of the leading certifications from (ISC)2. This is a certification for hands on practitioners with the responsibility of making sure IT security concerns are addressed in an enterprise environment and is designed for IT security professionals with one or more years of field experience who are seeking to advance their career by validating their knowledge and experience. If IT security is your preferred career path, then the SSCP is a great starting point for you.