Informações sobre o curso

5,924 visualizações recentes
Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 17 horas para completar
Inglês

Instrutores

Certificados compartilháveis
Tenha o certificado após a conclusão
100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis
Redefinir os prazos de acordo com sua programação.
Nível iniciante
Aprox. 17 horas para completar
Inglês

oferecido por

Placeholder

(ISC)²

Programa - O que você aprenderá com este curso

Semana
1

Semana 1

5 horas para concluir

Identify and Analyze Malicious Code and Activity

5 horas para concluir
18 vídeos (Total 109 mín.), 18 leituras, 1 teste
18 videos
Malicious Code and Activity: Key Concepts6min
Malicious Code and Activity: Malicious Code Countermeasures4min
Malicious Code and Activity: Software Exploitation Methods6min
Malicious Code and Activity: Software Exploitation Methods5min
Malicious Code and Activity: Code Signing5min
Malicious Code and Activity: Social Engineering6min
Malicious Code and Activity: Security Awareness Training6min
Malicious Code and Activity: Long File Extensions5min
Malicious Code and Activity: E-mail7min
Malicious Code and Activity: Countermeasures5min
Malicious Code and Activity: Examples of Spoofing5min
Malicious Code and Activity: Techniques5min
Malicious Code and Activity: Botnet-Led Exploits6min
Malicious Code and Activity: Malicious Web Activity6min
Malicious Code and Activity: Zero-Day Exploits4min
Malicious Code and Activity: Infected Factory Builds and Media4min
Malicious Code and Activity: Inspection of Processes7min
18 leituras
Systems and Application Security10min
Malicious Code and Activity: Key Concepts10min
Malicious Code and Activity: Malicious Code Countermeasures10min
Malicious Code and Activity: Software Exploitation Methods10min
Malicious Code and Activity: Software Exploitation Methods10min
Malicious Code and Activity: Code Signing10min
Malicious Code and Activity: Social Engineering10min
Malicious Code and Activity: Security Awareness Training10min
Malicious Code and Activity: Long File Extensions10min
Malicious Code and Activity: E-mail10min
Malicious Code and Activity: Countermeasures10min
Malicious Code and Activity: Examples of Spoofing10min
Malicious Code and Activity: Techniques10min
Malicious Code and Activity: Botnet-Led Exploits10min
Malicious Code and Activity: Malicious Web Activity10min
Malicious Code and Activity: Zero-Day Exploits10min
Malicious Code and Activity: Infected Factory Builds and Media10min
Malicious Code and Activity: Inspection of Processes10min
1 exercício prático
Quiz 130min
Semana
2

Semana 2

1 hora para concluir

Implement and Operate Endpoint Device Security

1 hora para concluir
3 vídeos (Total 15 mín.), 3 leituras, 1 teste
3 videos
Endpoint Device Security: Trusted Platform Module (TPM)6min
Endpoint Device Security: BYOD Policy Considerations2min
3 leituras
Endpoint Device Security: HIDS10min
Endpoint Device Security: Trusted Platform Module (TPM)10min
Endpoint Device Security: BYOD Policy Considerations10min
1 exercício prático
Quiz 230min
Semana
3

Semana 3

5 horas para concluir

Operate and Configure Cloud Security

5 horas para concluir
16 vídeos (Total 105 mín.), 16 leituras, 1 teste
16 videos
Cloud Security: Hybrid5min
Cloud Security: Virtualization7min
Cloud Security: Hypervisor4min
Cloud Security: Country-Specific Legal Considerations6min
Cloud Security: P&DP Laws6min
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8min
Cloud Security: Data Dispersion5min
Cloud Security: Threat to Storage Types9min
Cloud Security: Technologies to Address Threats4min
Cloud Security: DLP Architecture7min
Cloud Security: Review Activity6min
Cloud Security: Key Storage in the Cloud4min
Cloud Security: Common Approaches for Data Masking4min
Cloud Security: Data Retention Policies7min
Cloud Security: Disposal Options8min
16 leituras
Cloud Security: Five Essential Characteristics of Clouds10min
Cloud Security: Hybrid10min
Cloud Security: Virtualization10min
Cloud Security: Hypervisor10min
Cloud Security: Country-Specific Legal Considerations10min
Cloud Security: P&DP Laws10min
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10min
Cloud Security: Data Dispersion10min
Cloud Security: Threat to Storage Types10min
Cloud Security: Technologies to Address Threats10min
Cloud Security: DLP Architecture10min
Cloud Security: Review Activity10min
Cloud Security: Key Storage in the Cloud10min
Cloud Security: Common Approaches for Data Masking10min
Cloud Security: Data Retention Policies10min
Cloud Security: Disposal Options10min
1 exercício prático
Quiz 330min
Semana
4

Semana 4

3 horas para concluir

Secure Big Data Systems & Operate and Secure Virtual Environments

3 horas para concluir
9 vídeos (Total 70 mín.), 9 leituras, 1 teste
9 videos
Secure Big Data Systems: Interpreting Big Data4min
Secure Big data Systems: Key Challenges5min
Operate and Secure Virtual Environments: SDN5min
Operate and Secure Virtual Environments: Virtual Appliances8min
Operate and Secure Virtual Environments: DRS10min
Operate and Secure Virtual Environments: Common Attacks6min
Operate and Secure Virtual Environments: Network Security5min
Operate and Secure Virtual Environments: Virtual Machine Security16min
9 leituras
Secure Big Data Systems: Big Data10min
Secure Big Data Systems: Interpreting Big Data10min
Secure Big data Systems: Key Challenges10min
Operate and Secure Virtual Environments: SDN10min
Operate and Secure Virtual Environments: Virtual Appliances10min
Operate and Secure Virtual Environments: DRS10min
Operate and Secure Virtual Environments: Common Attacks10min
Operate and Secure Virtual Environments: Network Security10min
Operate and Secure Virtual Environments: Virtual Machine Security10min
1 exercício prático
Quiz 430min

Avaliações

Principais avaliações do SYSTEMS AND APPLICATION SECURITY

Visualizar todas as avaliações

Sobre (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Perguntas Frequentes – FAQ

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.