Systems Security Certified Practitioner (2022)
SSCP27 H 4 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- The SSCP Toolbox
- Course Overview
- What is the SSCP Toolbox?
- Who are you?
- What does your study plan look like?
- What is your timeline?
- Security Operations and Administration
- Comply with Codes of Ethics
- Understand Security Concepts
- Identify & Implement Security Controls
- Functional Security Controls
- The Asset Management Lifecycle - First Half
- The Asset Management Lifecycle - Second Half
- The Change Management Lifecycle
- Implementing Security Awareness & Training
- Collaborate with Physical Security Operations
- Security Operations & Administration - Key Points
- Access Controls
- Single/Multi-factor Authentication (MFA)
- Single Sign-On (SSO)
- Spotlight on Kerberos
- Device Authentication
- Federated Access
- Support Internetwork Trust Architectures
- The Identity Management Lifecycle
- Understand and Apply Access Controls
- Understand Security Models
- Access Controls - Key Points
- Risk Identification, Monitoring & Analysis
- Risk Management Concepts - Vocabulary
- Spotlight on Business Impact Analysis (BIA)
- Risk Management Concepts - Impact Assessments
- Risk Management Concepts - Threat Modeling
- Risk Management Concepts - Threat Intelligence
- Risk Tolerance & Treatment
- Risk Management Frameworks
- Spotlight on the Risk Management Framework (RMF)
- Risk Visibility & Reporting
- Legal & Regulatory Concerns
- Spotlight on the GDPR
- Security Assessment & Vulnerability Management
- Spotlight on Risk Review
- Operate & Monitor Security Platforms
- Analyze Monitoring Results
- Risk Identification, Monitoring & Analysis - Key Points
- Incident Response and Recovery
- Support the Incident Lifecycle
- Forensic Investigations - Legal
- Forensic Investigations - Evidence Handling
- BCP & DRP - Planning
- BCP & DRP - Backup & Redundancy
- BCP & DRP - Alternate Strategies
- BCP & DRP - Testing & Drills
- Incident Response & Recovery - Key Points
- Cryptography
- Reasons & Requirements for Cryptography
- Cryptography Concepts - Hashing & Salting
- Cryptography Concepts - Encryption
- Cryptography Concepts - Non-repudiation
- Spotlight on Secure Protocols
- Spotlight on IPsec
- Public Key Infrastructure (PKI) Systems
- Cryptography Concepts - Cryptographic Attacks
- Cryptography - Key Points
- Network and Communications Security
- Spotlight on the OSI Model
- Spotlight on Internet Protocol (IP) networking
- Topologies, Relationships & Transmission Types
- Software-Defined Networking (SDN)
- Network Attacks
- Manage Network Access Controls
- Manage Network Security
- Network-based Security Devices
- Secure Wireless Communications
- Network & Communications Security - Key Points
- Systems and Application Security
- Malicious Code & Activity
- Implement & Operate Endpoint Device Security
- Administer Mobile Device Management (MDM)
- Cloud Security - Basics
- Cloud Security - Legal & Regulatory Concerns
- Cloud Security - Data
- Cloud Security - Third party & outsourcing
- Secure Virtual Environments
- Systems and Application Security - Key Points
Course Overview
6 M



- Episode Description
- Transcript