We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification.

Read more

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification.

Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together.

3 Steps to Career Advancement

1. Register for the course

2. Gain access for 120 days

3. Register and sit for the SSCP certification exam

Upon completing the SSCP Professional Certificate, you will:

1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below.

Course 1 - Access Controls

Course 2 - Security Operations and Administration

Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery

Course 4 - Cryptography

Course 5 - Network and Communication Security

Course 6 - Systems and Application Security

2. Receive a certificate of program completion.

3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Seven courses

Introducing Security: Aligning Asset and Risk Management

In this course, we will discuss security concepts, identify corporate assets, and examine the risk management process.

Risk Management: Use of Access Controls to Protect Assets

This course focuses on risk management options and access controls to protect assets. We will examine the steps to develop a security culture and policies, and how to use them to enforce security requirements. We will also cover access control models like MAC, DAC, RBAC, and identity management.

Securing Software, Data and End Points

Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and all the tax is data. Therefore, it's so critical, the total set of software powering an organization's business logic and processes must be kept secure.

Networks and Communications Security

Welcome to Networks and Communications Security! This course covers network structure, data transmission, transport formats, and security measures for data integrity, availability, authentication, and confidentiality. It also discusses concepts for public and private communication networks.

Cloud and Wireless Security

Course 6: Cloud and Wireless Security Welcome to course six. This course applies security concepts to two major changes in data usage: mobile access and cloud services. As a security practitioner, we can secure data by protecting it at rest, in motion, and in use.

Incident Detection and Response

Incident Detection and Response focuses on detecting intruders and responding to incidents. It covers precursors, indicators, and incident response policies.

Maturing Risk Management

Course 8: Maturing Risk Management In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient.

Save this collection

Save (ISC)² Systems Security Certified Practitioner (SSCP) to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser