Course Overview
TOPThe best way to combat an attack on an organization s information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability. This SSCP certification prep course validates student s ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.
Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).
This updated edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this course gets you prepared to pass the exam and enter the information security workforce with confidence.
Scheduled Classes
TOP09/09/24 - GVT - Virtual Classroom - Virtual Instructor-Led | |
09/09/24 - GVT - Virtual Classroom - Virtual Instructor-Led | |
11/18/24 - GVT - Virtual Classroom - Virtual Instructor-Led | |
11/18/24 - GVT - Virtual Classroom - Virtual Instructor-Led | |
01/06/25 - GVT - Virtual Classroom - Virtual Instructor-Led | |
01/06/25 - GVT - Virtual Classroom - Virtual Instructor-Led | |
03/17/25 - GVT - Virtual Classroom - Virtual Instructor-Led | |
03/17/25 - GVT - Virtual Classroom - Virtual Instructor-Led |
Outline
TOP- Chapter 1: The Business Case for Decision Assurance and Information Security
- Chapter 2: Information Security Fundamentals
- Chapter 3: Integrated Information Risk Management
- Chapter 4: Operationalizing Risk Mitigation
- Chapter 5: Communications and Network Security
- Chapter 6: Identity and Access Control
- Chapter 7: Cryptography
- Chapter 8: Hardware and Systems Security
- Chapter 9: Applications, Data, and Cloud Security
- Chapter 10: Incident Response and Recovery
- Chapter 11: Business Continuity via Information Security and People Power
- Chapter 12: Cross-Domain Challenges
Prerequisites
TOP- Systems administration experience
- Familiarity with TCP/IP
- An understanding of UNIX, Linux, and Windows
- Intermediate-level knowledge of network security concepts
Who Should Attend
TOP- Network security engineer
- Security administrator
- Security analyst
- Systems engineer
- Network administrator
- Systems administrator
- Security specialist
- Systems/network analyst
- Security consultant
- Database administrator