(ISC)2 SSCP: Systems Security Certified Practitioner Boot Camp

Description

Description

Duration: 5 Days

About the Course

Boost your career and create new, exciting opportunities. The SSCP demonstrates that you have advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using security best practices, policies and procedures. Advance your role with this gold-standard certification and apply your hands-on experience to your organization’s information security policies.

Audience Profile

The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets, including but not limited to those in the following positions:

  • Network Security Engineer
  • Systems Administrator
  • Security Analyst
  • Systems Engineer

Learning Objectives

  • Access Controls
  • Security Operations and Administration
  • Risk Identification, Monitoring, and Analysis
  • Incident Response and Recovery
  • Cryptography
  • Network and Communications Security
  • Systems and Application Security

Certification Exam

This course will prepare you for the ISC SSCP: Systems Security Certified Practitioner Exam

Prerequisites

Candidates must have a minimum of one year cumulative paid work experience in one or more of the seven domains of the SSCP CBK (outlined in the Learning Objectives section). A one year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic EnrollPrivate PricePrivate Enroll
12/20/202112/24/2021
01/10/202201/14/2022
01/31/202202/04/2022
02/21/202102/25/2022
03/14/202203/18/2022
04/04/202204/08/2022
04/25/202204/29/2022
05/16/202205/20/2022
06/06/202206/10/2022
06/27/202207/01/2022
07/18/202207/22/2022
08/08/202208/12/2022
08/29/202209/02/2022
09/19/202209/23/2022
10/10/202210/14/2022
10/31/202211/04/2022
11/21/202211/25/2022
12/12/202212/16/2022

Curriculum

Access Controls:

The heart of information protection is centered on access control. Access controls manage all of the information-related assets of the organization from databases to users and buildings to equipment. In the access control domain, you’ll learn how to manage the ways that users and processes can interact with data and systems resources and ensure that the needs of confidentiality, integrity, and compliance are met.

Monitoring and Analysis

Despite the controls and safeguards we have in place, we must all expect incidents, challenges, and system failures however, the only thing worse than having an incident is not to be aware of the problem. Through effective and timely monitoring of logs and system activity, we can gather the data needed to proactively respond to developing trends and perform the analysis required to address any security concerns.

Cryptography

Cryptography protects information in transit, storage, and processing, It protects sensitive information from unauthorized disclosure and enables modern business through ensuring the integrity and non-repudiation of network-based traffic and e-commerce.

Malicious Code and Activity

New forms of malware and cyber-attacks are developed every year. The security practitioner is on the front line of defending systems and networks from attack and must be knowledgeable about new forms of attacks, preventative, detective and corrective measures, and the methods and tools of the attacker.

Networks and Communications

Networks are the lifeblood of nearly every business today. Networks connect all types of devices ranging from computers to automobiles and from alarms circuits and critical infrastructure devices to building control systems. Networks must be maintained and operated in a secure and reliable manner, free from interruption, interference, and modification.

Risk, Response and Recovery

Risk management is the foundation of a security program. Security serves the business and helps the organization to meet its goals and objectives. Through careful management of risk, security can minimize disruptions to the business missions, manage all security incidents effectively, and restore supporting business functions following any outage or disaster.

Security Operations and Administration

Security Operations and Administration focuses on the dependable, resilient, and efficient operation of information systems and the protection of information. Systems must be operated in compliance with laws and regulations and according to the policies and procedures of the organization.