Informações sobre o curso
3,698 visualizações recentes

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 13 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês
User
Os alunos fazendo este Course são
  • Consultants
  • Engineers
  • Software Engineers
User
Os alunos fazendo este Course são
  • Consultants
  • Engineers
  • Software Engineers

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 13 horas para completar

Sugerido: 4 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
5 horas para concluir

Identify and Analyze Malicious Code and Activity

18 vídeos (Total 109 mín.), 18 leituras, 1 teste
18 videos
Malicious Code and Activity: Key Concepts6min
Malicious Code and Activity: Malicious Code Countermeasures4min
Malicious Code and Activity: Software Exploitation Methods6min
Malicious Code and Activity: Software Exploitation Methods5min
Malicious Code and Activity: Code Signing5min
Malicious Code and Activity: Social Engineering6min
Malicious Code and Activity: Security Awareness Training6min
Malicious Code and Activity: Long File Extensions5min
Malicious Code and Activity: E-mail7min
Malicious Code and Activity: Countermeasures5min
Malicious Code and Activity: Examples of Spoofing5min
Malicious Code and Activity: Techniques5min
Malicious Code and Activity: Botnet-Led Exploits6min
Malicious Code and Activity: Malicious Web Activity6min
Malicious Code and Activity: Zero-Day Exploits4min
Malicious Code and Activity: Infected Factory Builds and Media4min
Malicious Code and Activity: Inspection of Processes7min
18 leituras
Systems and Application Security10min
Malicious Code and Activity: Key Concepts10min
Malicious Code and Activity: Malicious Code Countermeasures10min
Malicious Code and Activity: Software Exploitation Methods10min
Malicious Code and Activity: Software Exploitation Methods10min
Malicious Code and Activity: Code Signing10min
Malicious Code and Activity: Social Engineering10min
Malicious Code and Activity: Security Awareness Training10min
Malicious Code and Activity: Long File Extensions10min
Malicious Code and Activity: E-mail10min
Malicious Code and Activity: Countermeasures10min
Malicious Code and Activity: Examples of Spoofing10min
Malicious Code and Activity: Techniques10min
Malicious Code and Activity: Botnet-Led Exploits10min
Malicious Code and Activity: Malicious Web Activity10min
Malicious Code and Activity: Zero-Day Exploits10min
Malicious Code and Activity: Infected Factory Builds and Media10min
Malicious Code and Activity: Inspection of Processes10min
1 exercícios práticos
Quiz 120min
Semana
2
1 horas para concluir

Implement and Operate Endpoint Device Security

3 vídeos (Total 15 mín.), 3 leituras, 1 teste
3 videos
Endpoint Device Security: Trusted Platform Module (TPM)6min
Endpoint Device Security: BYOD Policy Considerations2min
3 leituras
Endpoint Device Security: HIDS10min
Endpoint Device Security: Trusted Platform Module (TPM)10min
Endpoint Device Security: BYOD Policy Considerations10min
1 exercícios práticos
Quiz 210min
Semana
3
5 horas para concluir

Operate and Configure Cloud Security

16 vídeos (Total 105 mín.), 16 leituras, 1 teste
16 videos
Cloud Security: Hybrid5min
Cloud Security: Virtualization7min
Cloud Security: Hypervisor4min
Cloud Security: Country-Specific Legal Considerations6min
Cloud Security: P&DP Laws6min
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8min
Cloud Security: Data Dispersion5min
Cloud Security: Threat to Storage Types9min
Cloud Security: Technologies to Address Threats4min
Cloud Security: DLP Architecture7min
Cloud Security: Review Activity6min
Cloud Security: Key Storage in the Cloud4min
Cloud Security: Common Approaches for Data Masking4min
Cloud Security: Data Retention Policies7min
Cloud Security: Disposal Options8min
16 leituras
Cloud Security: Five Essential Characteristics of Clouds10min
Cloud Security: Hybrid10min
Cloud Security: Virtualization10min
Cloud Security: Hypervisor10min
Cloud Security: Country-Specific Legal Considerations10min
Cloud Security: P&DP Laws10min
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10min
Cloud Security: Data Dispersion10min
Cloud Security: Threat to Storage Types10min
Cloud Security: Technologies to Address Threats10min
Cloud Security: DLP Architecture10min
Cloud Security: Review Activity10min
Cloud Security: Key Storage in the Cloud10min
Cloud Security: Common Approaches for Data Masking10min
Cloud Security: Data Retention Policies10min
Cloud Security: Disposal Options10min
1 exercícios práticos
Quiz 320min
Semana
4
3 horas para concluir

Secure Big Data Systems & Operate and Secure Virtual Environments

9 vídeos (Total 70 mín.), 9 leituras, 1 teste
9 videos
Secure Big Data Systems: Interpreting Big Data4min
Secure Big data Systems: Key Challenges5min
Operate and Secure Virtual Environments: SDN5min
Operate and Secure Virtual Environments: Virtual Appliances8min
Operate and Secure Virtual Environments: DRS10min
Operate and Secure Virtual Environments: Common Attacks6min
Operate and Secure Virtual Environments: Network Security5min
Operate and Secure Virtual Environments: Virtual Machine Security16min
9 leituras
Secure Big Data Systems: Big Data10min
Secure Big Data Systems: Interpreting Big Data10min
Secure Big data Systems: Key Challenges10min
Operate and Secure Virtual Environments: SDN10min
Operate and Secure Virtual Environments: Virtual Appliances10min
Operate and Secure Virtual Environments: DRS10min
Operate and Secure Virtual Environments: Common Attacks10min
Operate and Secure Virtual Environments: Network Security10min
Operate and Secure Virtual Environments: Virtual Machine Security10min
1 exercícios práticos
Quiz 412min
4.8
8 avaliaçõesChevron Right

Principais avaliações do Systems and Application Security

por DKMar 9th 2019

really worth attending this course, there is so much information available for security professionals. This course is adding weight to my skills and understanding of Cloud and Applications security.

por GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

Instrutores

Avatar

(ISC)² Education & Training

Education & Training

Sobre (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Sobre Programa de cursos integrados (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

  • Sim, você pode assistir uma prévia do primeiro vídeo e ver programa do curso antes de se inscrever. Você precisa comprar o curso para ter acesso ao conteúdo não incluído na prévia.

  • Se decidir se inscrever no curso antes da data de início da sessão, terá acesso a todos os vídeos das palestras e leituras do curso. Também poderá enviar tarefas assim que a sessão começar.

  • Uma vez inscrito, e tão logo sua sessão tenha iniciado, você terá acesso a todos os vídeos e outros recursos, incluindo itens de leitura e fórum de discussão do curso. Você poderá ver e enviar tarefas práticas e concluir tarefas com nota atribuída obrigatórias para obter uma nota e um Certificado de Curso.

  • Se você concluir o curso com êxito, seu Certificado de Curso eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn.

  • Este curso é um dos poucos oferecidos pela Coursera que está disponível apenas para alunos que tenham pago ou recebido auxílio financeiro, quando disponível.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.