logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

SSCP Certification Prep Course

SS Course: GK1642

Course Overview

TOP

The best way to combat an attack on an organization s information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability. This SSCP certification prep course validates student s ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.

Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).

This updated edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this course gets you prepared to pass the exam and enter the information security workforce with confidence.

                                                                  

Scheduled Classes

TOP
05/13/24 - GVT - Virtual Classroom - Virtual Instructor-Led
07/08/24 - GVT - Virtual Classroom - Virtual Instructor-Led
09/09/24 - GVT - Virtual Classroom - Virtual Instructor-Led

Outline

TOP
  • Chapter 1: The Business Case for Decision Assurance and Information Security
  • Chapter 2: Information Security Fundamentals
  • Chapter 3: Integrated Information Risk Management
  • Chapter 4: Operationalizing Risk Mitigation
  • Chapter 5: Communications and Network Security
  • Chapter 6: Identity and Access Control
  • Chapter 7: Cryptography
  • Chapter 8: Hardware and Systems Security
  • Chapter 9: Applications, Data, and Cloud Security
  • Chapter 10: Incident Response and Recovery
  • Chapter 11: Business Continuity via Information Security and People Power
  • Chapter 12: Cross-Domain Challenges

    Prerequisites

    TOP
    • Systems administration experience
    • Familiarity with TCP/IP
    • An understanding of UNIX, Linux, and Windows
    • Intermediate-level knowledge of network security concepts

      Who Should Attend

      TOP
      • Network security engineer
      • Security administrator
      • Security analyst
      • Systems engineer
      • Network administrator
      • Systems administrator
      • Security specialist
      • Systems/network analyst
      • Security consultant
      • Database administrator