Duration: 5 Days
About the Course
Boost your career and create new, exciting opportunities. The SSCP demonstrates that you have advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies and procedures. Advance your role with this gold-standard certification and apply your hands-on experience to your organization’s information security policies.
The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets, including but not limited to those in the following positions:
- Network Security Engineer
- Systems Administrator
- Security Analyst
- Systems Engineer
- Access Controls
- Security Operations and Administration
- Risk Identification, Monitoring, and Analysis
- Incident Response and Recovery
- Network and Communications Security
- Systems and Application Security
This course will prepare you for the ISC SSCP: Systems Security Certified Practitioner Exam
Candidates must have a minimum of one year cumulative paid work experience in one or more of the seven domains of the SSCP CBK (outlined in the Learning Objectives section). A one year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
- Instructor-Led (the best training format we offer)
- Live Online Classroom – Online Instructor-Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Turks and Caicos Islands
|Start||Finish||Public Price||Public Enroll||Private Price||Private Enroll|
The heart of information protection is centered on access control. Access controls manage all of the information-related assets of the organization from databases to users and buildings to equipment. In the access control domain, you’ll learn how to manage the ways that users and processes can interact with data and systems resources and ensure that the needs of confidentiality, integrity, and compliance are met.
Monitoring and Analysis
Despite the controls and safeguards we have in place, we must all expect incidents, challenges, and system failures however, the only thing worse than having an incident is not to be aware of the problem. Through effective and timely monitoring of logs and system activity, we can gather the data needed to proactively respond to developing trends and perform the analysis required to address any security concerns.
Cryptography protects information in transit, storage, and processing, It protects sensitive information from unauthorized disclosure and enables modern business through ensuring the integrity and non-repudiation of network-based traffic and e-commerce.
Malicious Code and Activity
New forms of malware and cyber-attacks are developed every year. The security practitioner is on the front line of defending systems and networks from attack and must be knowledgeable about new forms of attacks, preventative, detective and corrective measures, and the methods and tools of the attacker.
Networks and Communications
Networks are the lifeblood of nearly every business today. Networks connect all types of devices ranging from computers to automobiles and from alarms circuits and critical infrastructure devices to building control systems. Networks must be maintained and operated in a secure and reliable manner, free from interruption, interference, and modification.
Risk, Response and Recovery
Risk management is the foundation of a security program. Security serves the business and helps the organization to meet its goals and objectives. Through careful management of risk, security can minimize disruptions to the business missions, manage all security incidents effectively, and restore supporting business functions following any outage or disaster.
Security Operations and Administration
Security Operations and Administration focuses on the dependable, resilient, and efficient operation of information systems and the protection of information. Systems must be operated in compliance with laws and regulations and according to the policies and procedures of the organization.