IT Security C&T
Facebook
Twitter
Google
Youtube
Linkedin
Bookmark and Share
  change font size تصغير الخط تكبير الخط print
Home » (ISC)آ² Training Courses »

ISC2 SSCP -Systems Security Certified Practitioner

Course Overview

 

Led by an (ISC)² authorized instructor, the Official (ISC)² SSCP CBK Training Seminar provides a comprehensive review of information security concepts and industry best practices, covering the 7 domains of the SSCP CBK:

- Access Controls                                - Security Operations and Administration

- Cryptography                                    - Risk Identification, Monitoring, and Analysis

- Incident Response and Recovery      - Systems and Application Security

                         - Networks and Communications Security

 

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions. This interactive learning technique is based on sound adult learning theories.

 

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the SSCP exam and features:

- Official (ISC)² courseware     -  Taught by an authorized (ISC)² instructor

- Student handbook                  - Collaboration with classmates

                  - Real-world learning activities and scenarios

 

 

 

Upon Completion

Students will have knowledge to:

 

·   Understand the different Access Control systems.

·   Identify how to handle Incident Response and Recovery using consistent.

·   Identify and differentiate key cryptographic concepts and how to apply them.

·   The Systems and Application Security section identifies and defines technical and non-technical attacks.

·   The Risk Identification, Monitoring, and Analysis Domain identifies the how to identify.

 

Course Content

·      Access Controls.

·      Security Operations and Administration. 

·      Risk Identification, Monitoring, and Analysis. 

·      Incident Response and Recovery.

·      Cryptography.

·      Networks and Communications Security.

·      Systems and Application Security.  

 

Duration: 

5 days, 40 Hrs

 

Class Format Options:

Instructor-Led Training/Classroom

 

Who Should Attend:

·    Network Security Engineer

·    Systems/Network Administrator

·    Security Analyst

·    Systems Engineer

·    Security Consultant /Specialist

·    Security Administrator

·    Systems/Network Analyst

·    Database Administrator

 

 

 

 

 

Menu

Site By