SSCP Certification (Systems Security Certified Practitioner
3.6 (69 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
300 students enrolled

SSCP Certification (Systems Security Certified Practitioner

Imbibe the most up-to-date penetration testing and management skills to determine resiliency against cyber-attacks
3.7 (69 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
300 students enrolled
Created by Packt Publishing
Last updated 4/2019
English
English [Auto-generated]
Current price: $86.99 Original price: $124.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and usage of cryptographic standards and products.
  • Install and configure network- and host-based security technologies.
  • Describe the standards and products used to enforce security on web and application technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Requirements
  • This course aims to provide a complete coverage of every objective on the SSCP certification exam. The course is filled with apt demonstration and explanation in a concise manner to help you succeed in the exam with ease.
Description

The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. Initially Course provides information about certification exam. Then It covers 7 domains of SSCP Examination Curriculum. Successful candidates will become competent in the following 7 domains:

• Access Controls

• Security Operations and Administration

• Risk Identification, Monitoring, and Analysis

• Incident Response and Recovery

• Cryptography

• Network and Communications Security

• Systems and Application Security

After Completion this course, Student will be able to secure systems, networks, applications and will be able to implement IT security policies

About the Author

A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of many key organizations.Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients’ expectations.Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.

Who this course is for:
  • This video Course targets Ethical Hackers, Penetration Testers, Cyber Security Professionals, Network Engineers, Web Security Specialists, Application Security Experts and InformationSecurity Professionals, Administrators
Course content
Expand all 95 lectures 05:25:04
+ Preparing for (ISC) ² Certification Course
5 lectures 16:03

This video gives a brief overview on the course

Preview 02:11

In this video, you will get information about Syllabus

  • Learn about the course

  • Explore various domains in Syllabus

  • Get explanation on domains

Course Introduction
01:57

In this video, you will learn about SSCP exam

  • Learn about SSCP

  • Get the exam information

  • Learn about SSCP certification

(ISC)² Exam Overview
02:18

In this video, you will install Virtual Machine in the system

  • Learn about Virtual Machine

  • Download Virtual Machine

  • Installation process

Virtual Machine
04:25

In this video, you will set up lab in system.

  • Learn about lab setup

  • Explore Windows installation

  • Learn about Kali Linux installation

Lab Setup
05:12
+ Access Controls: Part 1
7 lectures 14:19

In this video, you will get an overview on the section topics and objectives

  • Explore the list of topics

  • Learn about these topics

  • Get explanation

Preview 01:06

In this video, you will learn about Authentication Factors

  • Learn about AAA

  • Explore AAA features

  • Understand the AAA process

AAA and Authentication Factors
01:46

In this video, you will learn about Relations and Architecture

  • Learn about Trust Relations

  • Learn about Architecture

  • Get explanation on the process

Trust Relations and Architecture
01:49

In this video, you will learn the difference between subject based and object based

  • Learn about subject based

  • Explore object based

  • Understand the difference between object based and subject based

Subject-Based versus Object-Based
02:01

In this video, you will learn about MAC and DAC

  • Learn about MAC

  • Explore DAC

  • Basic difference between MAC and DAC

MAC versus DAC
02:02

In this video, you will learn about role-based and attribute-based features

  • Learn about role based

  • Explore attribute based

  • Basic difference between role based and attribute based

Role–Based and Attribute–Based
02:15

In this video, you will learn about management lifecycle components

  • Learn about the management lifecycle

  • Explore various components

  • Understand the working of components

Management Lifecycle
03:20
+ Access Controls: Part 2
5 lectures 10:21

In this video, you will get an overview on the section topics and objectives

  • Explore the list of topics

  • Brief explanation on how the topics will be covered

Preview 01:04

In this video, you will learn about IEEE 802.1x and Mac Security

  • Learn about 802.1x

  • Learn about Mac Security

  • Explanation of process

IEEE 802.1X and Mac Security
02:35

In this video, you will learn about RADIUS and TACACS+

  • Learn about RADIUS

  • Learn about TACACS+

  • Understand the basic difference between RADIUS and TACACS+

RADIUS and TACACS+
02:05

This video will help you learn about NAC and RAT

  • Learn about NAC

  • Understand what RAT is

  • Get explanation of its working

NAC and RAT
02:15

In this video, you will learn about IPsec and SSL/TLS VPN

  • Learn about IPsec

  • Understand the working of IPsec

  • Explore the working of SSL/TLS VPN

IPSec and SSL/TLS VPN
02:22
+ Security Operations and Administration
5 lectures 14:38

In this video, you will get an overview on the section topics and objectives

  • Explore the list of topics

  • Learn about these topics

  • Get explanation

Preview 01:21

In this video, you will learn about Asset Management and Change Management

  • Learn about Asset Management

  • Understand Change Management

  • Explore the basic difference between Asset and Change Management

Asset Management and Change Management
03:18

This video will help you learn about Configuration Management and Impact Management

  • Learn about Configuration Management

  • Explore Impact Management

  • Understand the basic difference between Configuration and Impact Management


Configuration Management and Impact Management
03:00

This video will help you learn about Security Training and Security Operations

  • Learn about Security Training and why it is necessary

  • Understand Security Operations

  • Get explanation of process

Security Training and Physical Security Operations
02:58

In this video, you will learn about AUP

  • Learn about AUP

  • Explore the list of policies

  • Get explanation

AUP Policy Enforcement
04:01
+ Security Policy and Terminologies
6 lectures 29:19

This video will give you an overview on section topics and objectives

  • Explore the list of topics

  • Learn about these topics

  • Get explanation

Preview 00:57

In this video, you will learn about threat, risk, and vulnerability

  • Learn about threat and its various types

  • Learn about risk

  • Explore vulnerability

Threat, Risk, and Vulnerability
16:59

This video will help you learn about IOC (Indicators of compromise)

  • Learn about IOC

  • Explore the list of IOC

  • Get explanation

Compromise Indicators
03:20

In this video, you will learn about Security Triad

  • Learn about Security Triad

  • Explore Triad components

  • Get an explanation of its working

Security Triad
02:17

This video will help you learn various written security policies

  • Learn about security policies

  • Explore the list of policies

  • Get explanation of policies

Written Security Policy
02:31

In this video, you will learn about Countermeasure and Mitigation techniques

  • Learn about Countermeasure techniques

  • Explore the list of Mitigation techniques

  • Get explanation of techniques

Countermeasure and Mitigation
03:15
+ Risk Identification, Monitoring, and Analysis: Part 1
7 lectures 19:00

In this video, you will get an overview on section topics and objectives.

  • Explore list of topics

  • Learn about these topics

  • Get explanation

Preview 01:05

This video will help you learn about risk management and risk assessment.

  • Explore risk management

  • Learn about risk assessment

  • Get explanation of process

Risk Management and Assessment
06:38

In this video, you will learn about qualitative risk management.

  • Learn about qualitative risk management

  • Understand risk register and risk ranking

  • Get explanation of process

Qualitative Risk Management
01:58

In this video, you will learn about quantitative risk management.

  • Learn about quantitative risk management

  • Explore objectives

  • Explanation of objectives

Quantitative Risk Management
01:43

In this video, you will explore risk visibility.

  • Learn about risk visibility

  • Explore various components

  • Get explanation of components

Risk Visibility
01:53

This video will help you learn about reporting and components.

  • Learn about reporting

  • Take a look at an example of a report

  • Get explanation of report components

Reporting
03:08

This video will help you learn about auditing and components.

  • Learn about auditing

  • Explore auditing process

  • Explore auditing components

Auditing
02:35
+ Risk Identification, Monitoring, and Analysis: Part 2
8 lectures 19:05

In this video, you will explore section topics and objectives.

  • Explore list of topics

  • Learn about these topics

  • Get explanation

Preview 01:16

This video will help you learn about log monitoring.

  • Learn about log monitoring

  • Monitor Windows logs

  • Monitor Linux logs

Regular Monitoring Importance
04:04

In this video, you will learn about syslog and process.

  • Learn about syslog

  • Explore syslog components

  • Explore the syslog process


Syslog
01:48

In this video, you will learn about SNMP and NetFlow.

  • Learn about SNMP

  • Explore about NetFlow

  • Understand the basic difference between SNMP and NetFlow

SNMP and NetFlow
01:47

In this video, you will learn about security trends.

  • Learn about security trends

  • Explore the list of security trends

  • Get explanation

Security Analytics, Metrices, and Trends
02:27

This video will help you learn about visualization process.

  • Learn about visualization

  • Explore the visualization components

  • Explanation of components

Visualization
02:10

In this video, you will learn about data analysis process.

  • Learn about data analysis

  • Explore the list of data analysis points

  • Get explanation about data analysis points

Data Analysis
02:14

In this video, you will learn about communicating findings.

  • Learn about communicating findings

  • Explore the risk assessment report

  • Understand various report components

Communicating Findings
03:19
+ Incident Response and Recovery
7 lectures 17:55

This video will give an overview on section topics and objectives.

  • Explore the list of topics

  • Learn about these topics

  • Get explanation

Preview 01:03

This video will help you learn about incident lifecycle.

  • Learn about incident lifecycle

  • Explore its various components

  • Get explanation about components

Incident Handling Lifecycle
03:16

In this video, you will learn about forensics.

  • Learn about forensics investigation

  • Explore various forensics techniques

  • Get explanation about techniques

Forensics Investigations
05:28

In this video, you will learn about BCP and DRP.

  • Learn about BCP

  • Learn about DRP

  • Explore features of BCP and DRP

BCP and DRP
02:23

This video learn about emergency response and features.

  • Learn about emergency response

  • Explore emergency response conditions

  • Get explanation about various conditions


Emergency Response
01:20

In this video, you will learn restoration process after attack.

  • Learn about restoration process

  • Take a look at example of restoration

  • Get explanation of restoration process

Restoration
01:36

This video will help you learn about testing phases.

  • Learn about testing and drills

  • Explore various testing phases

  • Get explanation of phases


Testing and Drills
02:49
+ Overview of Cryptography
6 lectures 29:57

In this video, you will explore section topics and objectives.

  • Explore the list of topics

  • Learn about these topics

  • Get explanation

Preview 00:55

In this video, you will learn about basics of cryptography.

  • Learn about cryptography

  • Take a look at the example of cryptography

  • Get explanation of working

Cryptography Basics
05:19

In this video, you will learn about ciphers and types.

  • Learn about ciphers

  • Explore the cipher types

  • Get explanation of ciphers types

Cipher and Types
06:04

In this video, you will learn about algorithm identification tool.

  • Learn about algorithm identification

  • Learn about tool

  • Explore the use of tool

Identify Algorithm
04:09

In this video, you will learn about encryption and types.

  • Learn about encryption

  • Explore the encryption types

  • Get explanation of encryption types

Encryption and Types
07:22

This video will help you learn about hashing process.

  • Learn about hashing

  • Explore the hashing examples

  • Get explanation of hashing process

Hashing
06:08
+ Beyond the Basics of Cryptography
7 lectures 23:05

In this video, you will take a look at the section topics and objectives.

  • Explore the list of topics

  • Learn about these topics

  • Explanation

Section Objectives
01:19

In this video, you will learn about key management.

  • Learn about key management

  • Explore the types of keys

  • Learn about key management steps

Key Management
04:50

This video will help you learn about digital signature.

  • Learn about digital signature

  • Take a look example of digital signature

  • Get explanation of digital signature process

Digital Signatures
02:06

In this video, you will learn about PKI and components.

  • Learn about PKI

  • Explore various components

  • Explanation of PKI components

PKI and Components
03:03

In this video, you will learn about expiration and suspension.

  • About expiration process

  • About suspension process

  • Explanation of expiration and suspension process

Expiration and Suspension
02:01

In this video, you will learn about cryptography attacks.

  • Learn about cryptography

  • Explore the list of cryptography attacks

  • Get explanation of cryptography attacks

Cryptography Attacks
07:03

In this video, you will learn mitigation steps.

  • Learn about mitigation

  • Explore the mitigation points

  • Get explanation of mitigation points

Mitigation
02:43