Systems Security Certified Practitioner (SSCP) (Voucher Included)

Systems Security Certified Practitioner (SSCP) (Voucher Included) 

Center for Continuing Professional Development

Systems Security Certified Practitioner (SSCP) is a premier security certification offered by ISC(2), ideal for those wanting to begin or advance a career in computer networking or security.

This program will prepare you for this industry recognized certification, as well as a career in the information technology sector.

Upon completion of the program, you will be given vouchers to take the Systems Security Certified Practitioner (SSCP) exam.

This program will prepare you for a career as a network administrator or security administrator. You’ll learn the dynamics of data communications, including network security, telecommunications, remote access, firewalls, proxy servers, and wireless and cellular technologies. You’ll learn how to identify and mitigate malicious codes such as viruses, Trojans, logic bombs, social engineering, insider threats, data theft, DDoS, spoofing, Phishing, Pharming, and spam. 

You'll also explore authentication and access control methods. You'll learn about AAA and trusts, and you'll become familiar with identity management and cloud computing concepts.

As you move through the program, you will learn skills that will prepare you for Risk Management. This includes risk assessment, incident handling, business continuity, and disaster recovery plans, and you’ll examine dynamic cryptography concepts like PKI, certificates, and secure protocols.

This program will teach you ethical responsibilities of a network administrator or a security administrator, as well as the vast range of administrative duties involved with the career track. You’ll learn about change management, security evaluation, topics of awareness, device security, data management policies, and analysis and system monitoring.

 

# of Hours 80
Format Distance education - online 

Prerequisites
There are no prerequisites for this course, but basic computer knowledge is recommended. Students with no prior computing knowledge should take CompTIA A+ first. 
Audience

What Will I Learn?

This program will teach you the dynamics of data communications, including network security, telecommunications, remote access, firewalls, proxy servers, and wireless and cellular technologies.

You’ll learn how to identify and mitigate malicious codes such as viruses, Trojans, logic bombs, social engineering, insider threats, data theft, DDoS, spoofing, Phishing, Pharming, and spam.

You'll also explore authentication and access control methods. You'll learn about AAA and trusts, and you'll become familiar with identity management and cloud computing concepts.

Competency Checklist

  • Authentication, identity management, and network trusts
  • Cloud computing security concepts, as well as network data security
  • Wireless security and cellular technologies
  • Malware identification adn mitigation
  • Risk management, security assessment, and incident handling
  • Crypotography, encryption, PKI, and certificates
  • Security auditing and systems monitoring and analysis

 

Possible Careers Include…

  • Information Security Analysts
  • Computer Systems Analysts
  • Security Management Specialists
  • Computer User Support Specialist
Outline
  1. Introduction, Authentication and Access Control
    1. Authentication
    2. User Account Management
    3. Access Control Concepts
    4. Access Control Lists
    5. Password Policy
  2. Networking and Malware
    1. Physical Network Security
    2. Network Data Security
    3. OSI and TCP/IP Models
    4. Remote Access
    5. Firewalls
    6. Wireless Security
    7. VLANs
    8. Malware Identification
    9. Malware Mitigation
  3. Risk, Response and Recovery and Cryptography
    1. Risk Management
    2. Security Assessment
    3. Incident Handling
    4. Business Continuity Plans and Disaster Recovery Plans
    5. PKI and Certificates
    6. IPSec
    7. Encryption
    8. VPNs
  4. Monitoring and Security Policy
    1. Security Auditing
    2. Change Management
    3. Security Policies
    4. Data Management
    5. System Monitoring
    6. System Analysis
Abstract

Requirements

Students can take this program from either a Mac or PC. It's compatible with Windows XP and later operating systems, including Windows 8. There are no specific computer requirements other than an Internet connection and an email account. We recommend that you use the latest version of Internet Explorer to access this program.

Adobe Flash Player and Adobe Acrobat Reader are required for this program.

Click here to download the Acrobat Reader.
Click here to download the Flash Player.

The following materials will be included in your tuition:

  • SSCP Systems Security Certified Practitioner All-in-One Exam Guide