Top of Page
 

Official ISC2 SSCP Online Self-Paced Training-- 180-day Materials access

SSCP-logo-2lines.jpg
Price: $600.00
Quantity:

Systems Security Certified Practitioner (SSCP) Online Self-Paced Training

SSCP Overview

Systems Security Certified Practitioner (SSCP) training leverages the power of artificial intelligence, guiding students through a self-paced learning experience adapted to their unique needs. It covers information security concepts and best practices for implementing, monitoring, and administering IT infrastructure using information security policies and procedures, ensuring the confidentiality, integrity, and availability of data.

Who Can Enroll?

SSCP training is for those seeking a comprehensive review to pursue the SSCP certification. It is ideal for early-career security professionals with a year of experience in one or more of the domains listed below.

What Is Covered?

  • • Domain 1: Security Concepts and Practices
  • • Domain 2: Access Controls
  • • Domain 3: Risk Identification, Monitoring, and Analysis
  • • Domain 4: Incident Response and Recovery
  • • Domain 5: Cryptography
  • • Domain 6: Network and Communications Security
  • • Domain 7: Systems and Application Security

What Will You Learn?

  • • Analyze the key concepts involved in implementing, documenting, and maintaining functional security controls.
  • • Implement the processes of the asset and change management life cycles in security operations and administration.
  • • Relate the access controls and authentication methods to the identity management life cycle.
  • • Apply the internet trust architectures to ensure secure and reliable interactions across interconnected networks.
  • • Select the vulnerability management activities based on security assessments, relevant compliance and legal issues, and the risk management process.
  • • Safeguard an organization’s IT environment by classifying and applying tools for information collection, prioritizing security events, and managing log files to support effective security monitoring.
  • • Develop the incident response policies and processes, business continuity plans, and disaster recovery strategies that align with organizational and regulatory requirements.
  • • Participate in forensic investigations by practicing methodologies for evidence collection, analysis, and reporting.
  • • Apply cryptography concepts.
  • • Apply protocols such as Transport Layer Security (TLS)/Secure Sockets Layer (SSL) for secure data transmission.
  • • Select the services and protocols to secure data transmission in consideration of their limitations and vulnerabilities.
  • • Apply the key management practices and Web of Trust principles to establish and maintain secure, trusted communications and data protection mechanisms.

What’s Included?

  • • Self-paced online adaptive learning journey
  • • Data-driven analytics dashboard for real-time feedback on learner progress
  • • Robust search functionality to narrow topics
  • • Pre- and post-course assessments
  • • Knowledge checks and end-of-domain quizzes
  • • Digital eTextbook
  • • Interactive content
  • • Domain-by-domain study sheets with key points
  • • Online interactive flash cards
  • • Glossary of terms
  • • Email content support
  • • 24/7/365 chat technical support
  • • 90-day or 180-day access available

Languages Offered

At this time, content is only available in English.

Learn More > Online learning options, certificate requisites and use, Continuing Professional Education (CPE) credits, and special requirements

Price: $600.00
Quantity: