Systems Security Certified Practitioner (SSCP )


Description
The Systems Security Certified Practitioner (SSCP) course is a certification that has been awarded to security professionals who meet the required standards to demonstrate proficiency in network and systems security. The SSCP certification course covers topics such as risk management, cryptography, access controls, security operations, incident response and audit management. The course is designed to help security professionals assess system and network risks, vulnerabilities and risks, implement security policies and protocols, and monitor system security. It also offers guidance for managing security incidents, recovering from them and maintaining compliance. The SSCP is meant for a broad range of IT security personnel, including IT administrators, support staff and security profession
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Module 1: Security Operations and Administration |
Implement and maintain authentication methods Support internetwork trust architectures Participate in the identity management lifecycle Implement access controls |
| 2 | Module 2: Access Controls |
Comply with codes of ethics Understand security concepts Document, implement, and maintain functional security controls Participate in asset management Implement security controls and assess compliance Participate in change management Participate in security awareness and training Participate in physical security operations (e.g., data center assessment, badging) |
| 3 | Module 3: Risk Identification, Monitoring,and Analysis |
Understand the risk management process Perform security assessment activities Operate and maintain monitoring systems (e.g., continuous monitoring) Analyze monitoring results |
| 4 | Module 4: Incident Response and Recovery |
Support incident lifecycle Understand and support forensic investigations Understand and support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) activities |
| 5 | Module 5: Cryptography |
Understand fundamental concepts of cryptography Understand reasons and requirements for cryptography Understand and support secure protocols Understand Public Key Infrastructure (PKI) systems |
| 6 | Module 6: Network and Communications Security |
Understand and apply fundamental concepts of networking Understand network attacks and countermeasures (e.g., DDoS, man-in-the-middle, DNS poisoning) Manage network access controls Manage network security Operate and configure network-based security devices Operate and configure wireless technologies (e.g., bluetooth, NFC, WiFi) |
| 7 | Module 7: Systems and Application Security |
Identify and analyze malicious code and activity Implement and operate endpoint device security Operate and configure cloud security Operate and secure virtual environments |