Network Security

The Systems Security Certified Practitioner (SSCP)

James Hollis
James Hollis
CISM, SSCP, CASP, Security+, MCSE Mobility, MCSE, Cloud Platform and Infrastructure, Securing Windows Server 2016

This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description
The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner's ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
  • Course
    • Domain 1: Access Control
      • Domain 1 Access Control (Introduction)
      • Implement Authentication Mechanisms
      • Operate Internetwork Trust Architectures
      • Participate in the Identity-Management Lifecycle
      • Implement Access Controls
    • Domain 2: Security Operations and Administration
      • Domain 2 Security Operations and Administration (Introduction)
      • Understand and Comply with Codes of Ethics
      • Understand Security Concepts
      • Document and Operate Security Controls
      • Participate in Asset Management
      • Implement and Assess Compliance with Controls
      • Participate in Change Management
      • Participate in Security Awareness and Training
      • Participate in Physical Security Operations
    • Domain 3: Risk Identification, Monitoring, and Analysis
      • Domain 3 Risk Identification, Monitoring, and Analysis (Introduction)
      • Understand the Risk Management Process
      • Perform Security Assessment Activities
      • Operate and Maintain Monitoring Systems
      • Analyze Monitoring Results
    • Domain 4: Incident Response and Recovery
      • Domain 4 Incident Response and Recovery
      • Participate in Incident Handling
      • Understand and support forensic investigations
      • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
    • Domain 5: Cryptography
      • Domain 5 Cryptography
      • Understand and Apply Fundamental Concepts of Cryptography
      • Understand Requirements for Cryptography
      • Understand and Support Secure Protocols
      • Operate and implement cryptographic systems
    • Domain 6: Network and Communications Security
      • Domain 6 Network and Communications Security
      • Understand Security Issues Related to Networks
      • Protect TelecommunicationsTechnologies
      • Control Network Access
      • Manage LAN-based security
      • Operate and Configure Network-Based Security Device
      • Implement and Operate Wireless Technologies
    • Domain 7: Systems and Application Security
      • Domain 7 Systems and Application Security
      • Identify and Analyze Malicious Code and Activity
      • Implement and Operate Endpoint Device Security
      • Operate and Configure Cloud Security
      • Secure Big Data Systems
      • Operate and Secure Virtual Environments
Course Outline:
  • Course
    • Domain 1: Access Control
      • Domain 1 Access Control (Introduction)
      • Implement Authentication Mechanisms
      • Operate Internetwork Trust Architectures
      • Participate in the Identity-Management Lifecycle
      • Implement Access Controls
    • Domain 2: Security Operations and Administration
      • Domain 2 Security Operations and Administration (Introduction)
      • Understand and Comply with Codes of Ethics
      • Understand Security Concepts
      • Document and Operate Security Controls
      • Participate in Asset Management
      • Implement and Assess Compliance with Controls
      • Participate in Change Management
      • Participate in Security Awareness and Training
      • Participate in Physical Security Operations
    • Domain 3: Risk Identification, Monitoring, and Analysis
      • Domain 3 Risk Identification, Monitoring, and Analysis (Introduction)
      • Understand the Risk Management Process
      • Perform Security Assessment Activities
      • Operate and Maintain Monitoring Systems
      • Analyze Monitoring Results
    • Domain 4: Incident Response and Recovery
      • Domain 4 Incident Response and Recovery
      • Participate in Incident Handling
      • Understand and support forensic investigations
      • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
    • Domain 5: Cryptography
      • Domain 5 Cryptography
      • Understand and Apply Fundamental Concepts of Cryptography
      • Understand Requirements for Cryptography
      • Understand and Support Secure Protocols
      • Operate and implement cryptographic systems
    • Domain 6: Network and Communications Security
      • Domain 6 Network and Communications Security
      • Understand Security Issues Related to Networks
      • Protect TelecommunicationsTechnologies
      • Control Network Access
      • Manage LAN-based security
      • Operate and Configure Network-Based Security Device
      • Implement and Operate Wireless Technologies
    • Domain 7: Systems and Application Security
      • Domain 7 Systems and Application Security
      • Identify and Analyze Malicious Code and Activity
      • Implement and Operate Endpoint Device Security
      • Operate and Configure Cloud Security
      • Secure Big Data Systems
      • Operate and Secure Virtual Environments

If you would like more information on how to purchase this course individually, contact a Training Specialist.