Top of Page
 

Online Training

Official (ISC)² CBK Online Training Seminars for the SSCP

SSCP Course Overview

Led by an (ISC)² authorized instructor, the Official (ISC)² SSCP CBK Training Seminar provides a comprehensive review of information security concepts and industry best practices, covering the 7 domains of the SSCP CBK:

  • Access Controls
  • Security Operations and Administration
  • Risk Identification, Monitoring, and Analysis
  • Incident Response and Recovery
  • Cryptography
  • Networks and Communications Security
  • Systems and Application Security

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the SSCP exam and features:

  • Official (ISC)² courseware
  • Taught by an authorized (ISC)² instructor
  • Student handbook in electronic format
  • Interactive Online Flash Cards
  • Post-course Assessment
  • Collaboration with classmates
  • Real-world learning activities and scenarios

ACE CREDIT

The Official (ISC)² SSCP CBK Training Seminar has earned ACE CREDIT. Students who complete the course can apply for 2 undergraduate credits at participating universities and colleges. (ISC)²’s SSCP training seminar is the only SSCP training available that provides college credits. For more information click here.

Who should attend?

This training course is intended for those with proven technical skills and practical, hand-on security knowledge in operational IT roles. The candiate is required to have a minimum of 1 year of cumulative paid full-time work experience in 1 of the 7 domains of the SSCP CBK. The training seminar is ideal for those working in positions such as, but not limited to:

  • Network Security Engineer
  • Systems/Network Administrator
  • Security Analyst
  • Systems Engineer
  • Security Consultant/Specialist
  • Security Administrator
  • Systems/Network Analyst
  • Database Administrator

Learning Objectives

  • Understand the different Access Control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability
  • Understand the processes necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information as it is applied by the Security Operations and Administration
  • The Risk Identification, Monitoring, and Analysis Domain identifies the how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk
  • Identify how to handle Incident Response and Recovery using consistent, applies approaches including the use of the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts in order to mitigate damages, recover business operations, and avoid critical business interruption; and emergency response and post-disaster recovery
  • Identify and differentiate key cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure as it applies to securing communications in the presence of third parties
  • Define and identify the Networks and Communications Security needed to secure network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted
  • The Systems and Application Security section identifies and defines technical and non-technical attacks and how an organization can protect itself from these attacks including the concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments
Select Certification Dates/Schedule Region
SSCP CBK Online Instructor-Led EMEA 6 Aug - 26 Sep, 2019 [BST] To purchase the course, contact the EMEA Office. Email: info-emea@isc2.org or call Phone: +44 (0) 203.960.7804
Tues/Thurs 1800-2030 BST (GMT+1)
8 weeks:
Aug: 6, 8, 13, 15, 20, 22, 27, 29
Sept: 3, 5, 10, 12, 17, 19, 24, 26.
Europe/Middle East/Africa [EMEA]
SSCP CBK Online Instructor-Led NAR Aug 12 - Oct 7, 2019 [EST] Mon/Wed 1900-2130 EST
Week 1 Aug 12, 14
Week 2 Aug 19, 21
Week 3 Aug 26, 28
Week 4 Sep 4
Week 5 Sep 9, 11
Week 6 Sep 16, 18
Week 7 Sep 23, 25
Week 8 Sep 30, Oct 2
Week 9 Oct 7
North America EST
SSCP CBK Online Instructor-Led NAR Sep 16-20, 2019 [EST] Mon-Fri 0800-1700 EST
Day 1 Sep 16
Day 2 Sep 17
Day 3 Sep 18
Day 4 Sep 19
Day 5 Sep 20
North America EST
SSCP CBK Online Instructor-Led NAR Oct 15 - Dec 10, 2019 [EST] Tues/Thurs 1900-2130 EST
Week 1 Oct 15, 17
Week 2 Oct 22, 24
Week 3 Oct 29, 31
Week 4 Nov 5, 7
Week 5 Nov 12, 14
Week 6 Nov 19, 21
Week 7 Nov 26
Week 8 Dec 3, 5
Week 9 Dec 10
North America EST
SSCP CBK Online Instructor-Led NAR Nov 11-15, 2019 [EST] Mon-Fri 0800-1700 EST
Day 1 Nov 11
Day 2 Nov 12
Day 3 Nov 13
Day 4 Nov 14
Day 5 Nov 15
North America EST
SSCP CBK Online Instructor-Led NAR Dec 2, 2019 - Jan 29, 2020 [EST] Mon/Wed 1900-2130 EST
Week 1 Dec 2, 4
Week 2 Dec 9, 11
Week 3 Dec 16, 18
Week 4 Dec 23
Week 5 Dec 30
Week 6 Jan 6, 8
Week 7 Jan 13, 15
Week 8 Jan 20, 22
Week 9 Jan 27, 29
North America EST