Network Security

The Systems Security Certified Practitioner (SSCP)

James Hollis
James Hollis
CISM, SSCP, CASP, Security+, MCSE Mobility, MCSE, Cloud Platform and Infrastructure, Securing Windows Server 2016

This course is included in our All Access Pass! Get unlimited streaming access to 13,000+ videos, workbooks, and practice exams today!
Choose your plan!


Course Description
The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner's ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability.
  • Course
    • Domain 1: Access Control
      • Domain 1 Access Control (Introduction)
      • Implement Authentication Mechanisms
      • Operate Internetwork Trust Architectures
      • Participate in the Identity-Management Lifecycle
      • Implement Access Controls
    • Domain 2: Security Operations and Administration
      • Domain 2 Security Operations and Administration (Introduction)
      • Understand and Comply with Codes of Ethics
      • Understand Security Concepts
      • Document and Operate Security Controls
      • Participate in Asset Management
      • Implement and Assess Compliance with Controls
      • Participate in Change Management
      • Participate in Security Awareness and Training
      • Participate in Physical Security Operations
    • Domain 3: Risk Identification, Monitoring, and Analysis
      • Domain 3 Risk Identification, Monitoring, and Analysis (Introduction)
      • Understand the Risk Management Process
      • Perform Security Assessment Activities
      • Operate and Maintain Monitoring Systems
      • Analyze Monitoring Results
    • Domain 4: Incident Response and Recovery
      • Domain 4 Incident Response and Recovery
      • Participate in Incident Handling
      • Understand and support forensic investigations
      • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
    • Domain 5: Cryptography
      • Domain 5 Cryptography
      • Understand and Apply Fundamental Concepts of Cryptography
      • Understand Requirements for Cryptography
      • Understand and Support Secure Protocols
      • Operate and implement cryptographic systems
    • Domain 6: Network and Communications Security
      • Domain 6 Network and Communications Security
      • Understand Security Issues Related to Networks
      • Protect TelecommunicationsTechnologies
      • Control Network Access
      • Manage LAN-based security
      • Operate and Configure Network-Based Security Device
      • Implement and Operate Wireless Technologies
    • Domain 7: Systems and Application Security
      • Domain 7 Systems and Application Security
      • Identify and Analyze Malicious Code and Activity
      • Implement and Operate Endpoint Device Security
      • Operate and Configure Cloud Security
      • Secure Big Data Systems
      • Operate and Secure Virtual Environments
Course Outline:
  • Course
    • Domain 1: Access Control
      • Domain 1 Access Control (Introduction)
      • Implement Authentication Mechanisms
      • Operate Internetwork Trust Architectures
      • Participate in the Identity-Management Lifecycle
      • Implement Access Controls
    • Domain 2: Security Operations and Administration
      • Domain 2 Security Operations and Administration (Introduction)
      • Understand and Comply with Codes of Ethics
      • Understand Security Concepts
      • Document and Operate Security Controls
      • Participate in Asset Management
      • Implement and Assess Compliance with Controls
      • Participate in Change Management
      • Participate in Security Awareness and Training
      • Participate in Physical Security Operations
    • Domain 3: Risk Identification, Monitoring, and Analysis
      • Domain 3 Risk Identification, Monitoring, and Analysis (Introduction)
      • Understand the Risk Management Process
      • Perform Security Assessment Activities
      • Operate and Maintain Monitoring Systems
      • Analyze Monitoring Results
    • Domain 4: Incident Response and Recovery
      • Domain 4 Incident Response and Recovery
      • Participate in Incident Handling
      • Understand and support forensic investigations
      • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
    • Domain 5: Cryptography
      • Domain 5 Cryptography
      • Understand and Apply Fundamental Concepts of Cryptography
      • Understand Requirements for Cryptography
      • Understand and Support Secure Protocols
      • Operate and implement cryptographic systems
    • Domain 6: Network and Communications Security
      • Domain 6 Network and Communications Security
      • Understand Security Issues Related to Networks
      • Protect TelecommunicationsTechnologies
      • Control Network Access
      • Manage LAN-based security
      • Operate and Configure Network-Based Security Device
      • Implement and Operate Wireless Technologies
    • Domain 7: Systems and Application Security
      • Domain 7 Systems and Application Security
      • Identify and Analyze Malicious Code and Activity
      • Implement and Operate Endpoint Device Security
      • Operate and Configure Cloud Security
      • Secure Big Data Systems
      • Operate and Secure Virtual Environments