(SSCP) Systems Security Certified Practitioner, 2nd Edition

(SSCP) Systems Security Certified Practitioner, 2nd Edition

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 153 Lessons (13h 24m) | 2.88 GB

(SSCP) Systems Security Certified Practitioner Complete Video Course (Video Training), Second Edition

SSCP (Systems Security Certified Practitioner) Complete Video Course provides comprehensive video that teaches you everything you need to know to get up and running with systems security. The content in this title has been updated to include coverage of the all-new topics in the 2022 exam release. The (ISC)2 SSCP exam is a solid introductory certification in IT security, and this comprehensive video course walks you through every topic on the exam blueprint so you can learn about system security from the ground up and gain the knowledge and skills you need to pass the SSCP exam. Full of live trainer discussions, hands-on demos, whiteboard work, and deep-dive discussions, this course covers security fundamentals and principles in a way that is easy to access.

This video course covers every objective in the SSCP certification exam so you can use it as a complete study tool to pass the test, including the updates in the 2022 exam release, along with the knowledge and skills you need to advance your cybersecurity career. The (ISC)2 SSCP exam is a vendor-neutral world-recognized certification that endorses your IT security knowledge. It is also a great way to start your path toward CISSP certification, which is the next step through (ISC)2.

Topics include

  • Access controls
  • Security operations and administration
  • Risk identification, monitoring, and analysis
  • Incident response and recovery
  • Cryptography
  • Network and communications security
  • Systems and application security

What You Will Learn

  • Key concepts for all the objectives on the SSCP exam
  • Security and cybersecurity fundamentals and principles

Who Should Take This Course

The target audience for this course consists of systems/network/application security professionals who are preparing for the SSCP exam. A secondary audience consists of any IT professional who wants to gain a broad understanding of how to secure modern enterprises.

Table of Contents

Introduction
1 Systems Security Certified Practitioner (SSCP) Introduction

Module 1 Security Operations and Administration
2 Module introduction

Lesson 1 Fundamental Security Concepts
3 Learning Object
4 (ISC)² Code of Ethics
5 Understand Security Concepts
6 Identify and Implement Security Controls
7 Document and Maintain Functional Security Controls

Lesson 2 Security Management Lifecycles
8 Learning objectives
9 Implementation and Operation Phases
10 Archiving and Disposal Phases
11 Change and Configuration Management

Lesson 3 Security Awareness and Training
12 Learning objectives
13 Security Training During Onboarding
14 Continual Security Awareness
15 Security Education for the Enterprise

Lesson 4 Collaborate with Physical Security Operations
16 Learning objectives
17 Defense-in-Depth
18 Campus Physical Security
19 Facility Physical Security
20 Operational Physical Security

Module 2 Practical Cryptography
21 Module introduction

Lesson 5 Cryptography Use Cases
22 Learning objectives
23 The CIAN Model
24 Data Sensitivity Cases
25 Regulatory Use Cases

Lesson 6 Applied Cryptographic Concepts
26 Learning objectives
27 Cryptographic Hashing and HMACs
28 Salt and Pepper
29 Symmetric vs. Asymmetric Cryptosystems
30 Digital Signatures
31 Strength of Encryption Algorithms and Keys
32 Cryptographic Attacks and Cryptanalysis

Lesson 7 Public Key Infrastructure
33 Learning objectives
34 Web of Trust
35 Digital Certificates
36 Internet PKI
37 Fundamental Key Management Concepts

Lesson 8 Understand Secure Protocols
38 Learning objectives
39 Services and Protocols
40 Common Use Cases
41 Limitations and Vulnerabilities

Module 3 Access Controls
42 Module introduction

Lesson 9 Implement and Maintain Authentication Methods
43 Learning objectives
44 SingleMulti-factor Authentication (MFA)
45 Single Sign-on (SSO) and Federated Access
46 Device Authentication

Lesson 10 Support Internetwork Trust Architectures
47 Learning objectives
48 Trust Relationships
49 Internet, Intranet, and Extranet
50 Third-party Connections

Lesson 11 The Identity Management Lifecycle
51 Learning objectives
52 Authorization and Proofing
53 Provisioning and De-Provisioning
54 Maintenance and Entitlement
55 Identity and Access Management (IAM) Systems

Lesson 12 Understand and Apply Access Controls
56 Learning objectives
57 Mandatory Access Controls (MAC)
58 Discretionary Access Controls
59 Role-Based Access Controls (RBAC)
60 Rule-Based Access Controls (ACLs)

Module 4 Risk Identification, Monitoring and Analysis
61 Module introduction

Lesson 13 The Risk Management Process
62 Learning objectives
63 Risk Management Concepts and Terminology
64 Risk Treatment and Tolerance
65 Qualitative vs. Quantitative Risk Analysis
66 Risk Management Frameworks
67 Regulatory and Legal Concerns

Lesson 14 Vulnerability Assessment and Management
68 Learning objectives
69 Vulnerability Management Lifecycle
70 Vulnerability Assessment Tools and Methods
71 Security Testing and Risk Review

Lesson 15 Security Testing and Risk Review
72 Learning objectives
73 Source Systems
74 Events of Interest
75 Log Management
76 Event Aggregation and Correlation

Lesson 16 Risk Identification, Monitoring, and Analysis
77 Learning objectives
78 Security Baselines and Anomalies
79 Visualizations, Metrics, and Trends
80 Document and Communicate Findings

Module 5 Network and Communications Security
81 Module introduction

Lesson 17 Fundamental Networking Concepts
82 Learning objectives
83 OSI and TCPIP Reference Models
84 Network Topologies and Relationships
85 Commonly Used Ports and Protocols
86 Transmission Media Types
87 Software-Defined Networking (SDN)

Lesson 18 Network Attacks
88 Learning objectives
89 Spoofing and Flooding
90 Denial of Service and Botnets
91 MitM and Poisoning
92 Wireless Attacks

Lesson 19 Network Access Controls
93 Learning objectives
94 RADIUS and TACACS+
95 IEEE 802.1x PNAC
96 Remote Access Security
97 IPsec v4 and v6

Lesson 20 Manage Network Security
98 Learning objectives
99 Security Device Placement
100 Zoning and Segmentation
101 Secure Routers
102 Secure Switches

Lesson 21 Network Security Device Operation
103 Learning objectives
104 Firewalls and Proxies
105 IDS and IPS
106 Traffic Shaping

Lesson 22 Secure Wireless Communication
107 Learning objectives
108 Survey of Wireless Technologies
109 Authentication and Encryption Protocols
110 Internet of Things (IoT)

Module 6 Systems and Application Security
111 Module introduction

Lesson 23 Identify Malicious Code and Actions
112 Learning objectives
113 Survey of Malware
114 Malware Countermeasures
115 Survey of Malicious Exploits and Activity
116 Malware Activity Countermeasures
117 Social Engineering and Countermeasures

Lesson 24 Implement Endpoint Security
118 Learning objectives
119 HIPS and Host-based Firewalls
120 Endpoint Encryption and TPM
121 Secure Browsers
122 Endpoint Detection and Response (EDR)

Lesson 25 Enterprise Mobility Management (EMM)
123 Learning objectives
124 MDM vs. MAM
125 Provisioning Techniques
126 Containerization and Encryption
127 Mobile Application Management (MAM)

Lesson 26 Cloud Security
128 Learning objectives
129 Service and Deployment Models
130 Legal and Regulatory Concerns
131 Data Storage, Processing, and Transmission
132 Third-party and Outsourcing Requirements

Lesson 27 Operate Secure Virtual Environments
133 Learning objectives
134 Types of Hypervisors
135 Containers
136 Virtual Appliance Continuity and Resilience
137 Attacks and Countermeasures

Module 7 Incident Response and Recovery
138 Module introduction

Lesson 28 Incident Response Lifecycle
139 Learning objectives
140 Preparation
141 Detection, Analysis, and Escalation
142 Containment and Eradication
143 Recovery and Lessons Learned

Lesson 29 Forensic Investigations
144 Learning objectives
145 Legal and Ethical Principles
146 Evidence Handling
147 Reporting of Analysis

Lesson 30 Business Continuity Planning
148 Learning objectives
149 Business Impact Analysis (BIA)
150 Backup, Redundancy, and Restoration
151 Disaster Recovery Planning (DRP)
152 Testing and Drills

Summary
153 Systems Security Certified Practitioner (SSCP) Summary

Homepage