SSCP Certification Training | Systems Security Certified Practitioner Training

SSCP Certification Training | Systems Security Certified Practitioner Training

Print Friendly, PDF & Email


SSCP Certification Training | Systems Security Certified Practitioner Training Course Description

SSCP Certification Training, The best way to combat an attack on an organization’s information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability.

This official SSCP Certification Training course validates student’s ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.

Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC)2®’s seven domains. Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).

Duration: 5 days

SSCP Certification Training
SSCP Certification TrainingRelated Courses

Customize It:

» If you are familiar with some aspects of SSCP Certification Training, we can omit or shorten their discussion.
» We can adjust the emphasis placed on the various topics or build the SSCP Certification Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
» If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the SSCP Certification Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this SSCP Certification Training course:

» Network security engineer
» Security administrator
» Security analyst
» Systems engineer
» Network administrator
» Systems administrator
» Security specialist
» Systems/network analyst
» Security consultant
» Database administrator


The knowledge and skills that a learner must have before attending this SSCP Certification Training course are:

» Recommended: An understanding of UNIX, Linux, and Windows
» Recommended: Familiarity with TCP/IP
» Recommended: Intermediate-level knowledge of the security concepts
» Recommended: Systems administration experience


Upon completing this SSCP Certification Training course, learners will be able to meet these objectives:

» Access Control
» Security Operations and Administration
» Risk Identification, Monitoring, and Analysis
» Incident Response and Recovery
» Cryptography
» Networks and Communications Security
» Systems and Application Security

SSCP Certification Training – Course Syllabus:

Access Controls

Apply Logical Access Control in Terms of Subjects
Apply Logical Access Controls in Terms of Objects of Object Groups
Implement Authentication Mechanisms
Operate Internetwork Trust Architectures
Administer Identify Management Life Cycle
Implement Access Controls

Security Operations and Administration

Understand and Comply with Code of Ethics
Understand Security Concepts
Document and Operate Security Controls
Participate in Asset Management
Implement and Assess Compliance with Controls
Participate in Change Management Duties
Participate in Security Awareness Training
Participate in Physical Security Operations

Risk Identification, Monitoring, and Analysis

Understand the Risk Management Process
Perform Security Assessment Activities
Operate and Maintain Monitoring Systems
Analyze and Report Monitoring Results

Incident Response and Recovery

Participate in Incident Handling
Understand and Support Forensics Investigations
Understand and Support Business Continuity (BCP) and Disaster Recovery Plan (DRP)


Understand and Apply Fundamental Concepts of Cryptography
Understand Requirements for Cryptography
Operate and Implement Cryptographic Systems

Networks and Communications Security

Understand Security Issues Related to Networks
Protect Telecommunications Technologies
Control Network Access
Manage LAN-Based Security
Operate and Configure Network-Based Security Devices
Implement and Operate Wireless Technologies

Systems and Application Security

Identify and Analyze Malicious Code and Activity
Implement and Operate Endpoint Device Security
Operate and Configure Cloud Security
Secure Big Data Systems
Operate and Secure Virtual Environments

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Time frame:

No Comments Yet.

Leave a comment