SSCP: System Security Certified Practitioner (SSCP)
Your ISC SSCP exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the SSCP certification test. Ace your ISC SSCP at the first attempt and obtain the System Security Certified Practitioner (SSCP) credential with ease.
Curriculum for SSCP Video Course
Preparing for (ISC) Certification Course
Video Name | Time | |
---|---|---|
1. Course Introduction | 2:00 | |
2. (ISC)? Exam Overview | 2:00 | |
3. Virtual Machine | 4:00 | |
4. Lab Setup | 5:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. AAA and Authentication Factors | 2:00 | |
3. Trust Relations and Architecture | 2:00 | |
4. Subject-Based versus Object-Based | 2:00 | |
5. MAC versus DAC | 2:00 | |
6. Role–Based and Attribute–Based | 2:00 | |
7. Management Lifecycle | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. IEEE 802.1X and Mac Security | 3:00 | |
3. RADIUS and TACACS+ | 2:00 | |
4. NAC and RAT | 2:00 | |
5. IPSec and SSL/TLS VPN | 2:00 |
Video Name | Time | |
---|---|---|
1. Section Objective | 1:00 | |
2. Asset Management and Change Management | 3:00 | |
3. Configuration Management and Impact Management | 3:00 | |
4. Security Training and Physical Security Operations | 3:00 | |
5. AUP Policy Enforcement | 4:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Threat, Risk, and Vulnerability | 17:00 | |
3. Compromise Indicators | 3:00 | |
4. Security Triad | 2:00 | |
5. Written Security Policy | 3:00 | |
6. Countermeasure and Mitigation | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Risk Management and Assessment | 7:00 | |
3. Qualitative Risk Management | 2:00 | |
4. Quantitative Risk Management | 2:00 | |
5. Risk Visibility | 2:00 | |
6. Reporting | 3:00 | |
7. Auditing | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Regular Monitoring Importance | 4:00 | |
3. Syslog | 2:00 | |
4. SNMP and NetFlow | 2:00 | |
5. Security Analytics, Metrices, and Trends | 2:00 | |
6. Visualization | 2:00 | |
7. Data Analysis | 2:00 | |
8. Communicating Findings | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Incident Handling Lifecycle | 3:00 | |
3. Forensics Investigations | 5:00 | |
4. BCP and DRP | 2:00 | |
5. Emergency Response | 1:00 | |
6. Restoration | 2:00 | |
7. Testing and Drills | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Cryptography Basics | 5:00 | |
3. Cipher and Types | 6:00 | |
4. Identify Algorithm | 4:00 | |
5. Encryption and Types | 7:00 | |
6. Hashing | 6:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Key Management | 5:00 | |
3. Digital Signatures | 2:00 | |
4. PKI and Components | 3:00 | |
5. Expiration and Suspension | 2:00 | |
6. Cryptography Attacks | 7:00 | |
7. Mitigation | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. OSI and TCP/IP Model | 1:00 | |
3. Physical and Logical Topologies | 3:00 | |
4. Layer 2-4 | 2:00 | |
5. Layer 5-7 | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Routers | 2:00 | |
3. Switches | 2:00 | |
4. Firewall | 6:00 | |
5. Proxies | 6:00 | |
6. IDS and IPS | 4:00 | |
7. VPNs | 7:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Device Hardening | 9:00 | |
3. Security Controls and Types | 2:00 | |
4. Segmentation and Zoning | 2:00 | |
5. Device Protection Best Practices | 3:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Virus, Worm, and Trojan | 10:00 | |
3. Ransomwares and Crypters | 3:00 | |
4. Spyware, Backdoor, and Logic Bombs | 4:00 | |
5. Identify Malicious Systems | 7:00 | |
6. Attack Tools and Kits | 5:00 | |
7. Malware Attack Countermeasure | 6:00 |
Video Name | Time | |
---|---|---|
1. Section Objectives | 1:00 | |
2. Application Security Basics | 16:00 | |
3. Data Storage Security | 13:00 | |
4. Third Party Outsourcing | 2:00 | |
5. Virtualization Security | 1:00 | |
6. Cloud Computing Security | 2:00 | |
7. Big Data Security | 2:00 | |
8. Legal Concerns | 2:00 |
Student Feedback
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo
Get 10% Discount on Your Purchase When You Sign Up for Email
Enter Your Email Address to Receive Your 10%
OFF Discount Code Plus... Our Exclusive Weekly Deals