(ISC)² Systems Security Certified Practitioner (SSCP) Specialization

Started Feb 19

(ISC)² Systems Security Certified Practitioner (SSCP)

Advance Your Career with Cybersecurity Skills. Acquire the knowledge and skills to help you implement and maintain security best practices.

About This Certificate

Looking to boost your career in information security? Not sure where to start? The Systems Security Certified Practitioner (SSCP®) Professional Certificate helps practitioners like you prove their ability to defend against cyber attacks. Completing the SSCP Professional Certificate and working towards earning the SSCP Certification will show your current or prospective employer that you have the knowledge and skills to ensure strong security practices are implemented and maintained across IT operations. Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.

Created by:

courses
6 courses

Follow the suggested order or choose your own.

projects
Projects

Designed to help you practice and apply the skills you learn.

certificates
Certificates

Highlight your new skills on your resume or LinkedIn.

Projects Overview

Courses
Beginner Certificate
No prior experience required.
  1. COURSE 1

    Access Controls

    Current session: Feb 19
    Subtitles
    English

    About the Course

    Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help
  2. COURSE 2

    Security Operations and Administration

    Current session: Feb 19
    Subtitles
    English

    About the Course

    Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availabil
  3. COURSE 3

    Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

    Current session: Feb 19
    Subtitles
    English

    About the Course

    Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and
  4. COURSE 4

    Cryptography

    Current session: Feb 19
    Subtitles
    English

    About the Course

    Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authentic
  5. COURSE 5

    Networks and Communications Security

    Current session: Feb 19
    Subtitles
    English

    About the Course

    Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to
  6. COURSE 6

    Systems and Application Security

    Starts 5 March
    Subtitles
    English

    About the Course

    Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Objectives 1. Identify malicious code activity 2. Describe malicious code and the various countermeasures 3. Describe the processes for operating endpoint device security 4. Define mobile device management processes 5. Describe the process for configuring cloud security 6. Explain the process for securing big data systems 7. Summarize the process for securing virtual environments

Creators

  • (ISC)²

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world.

    (ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org

  • (ISC)² Education & Training

    (ISC)² Education & Training

FAQs