We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training
Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP...
Read more
Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.
Enroll now

Share

Help others find this collection page by sharing it with your friends and followers:

What's inside

Six courses

Security Operations and Administration

Security operations and administration involves identifying an organization's information assets and documenting policies, standards, and guidelines to ensure confidentiality, integrity, and availability. It also covers basic security concepts, ethical considerations, and core principles such as the CIA triad.

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

Risk Identification, Monitoring, and Analysis: Learn how to identify, measure, and control losses associated with adverse events. Review, analyze, select, and evaluate safeguards for mitigating risk. Learn processes for collecting information, identifying security events, assigning priority levels, taking appropriate actions, and reporting findings.

Cryptography

Welcome to Cryptography! Cryptography is the study of techniques for securing communications. You will learn how to protect information to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will gain a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure.

Access Controls

Welcome to Access Controls! Access Controls specify what users can do, the resources they can access, and the operations they can perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.

Systems and Application Security

Welcome to Systems and Application Security! This course explores malicious code, attacks, and protection strategies. Topics include endpoint device security, cloud infrastructure security, big data systems security, and virtual environment security.

Networks and Communications Security

Welcome to Networks and Communications Security! This course covers network structure, data transmission, transport formats, and security measures for data integrity, availability, authentication, and confidentiality. It also discusses concepts for public and private communication networks.

Save this collection

Save (ISC)² Systems Security Certified Practitioner (SSCP) to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser