Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This specialization prepares you for the Systems Security Certified Practitioner (SSCP) certification exam. It offers a deep dive into essential topics such as security operations, cryptography, network security, and access controls, ensuring you gain the knowledge and skills necessary to excel in the field. With expert-led instruction and hands-on learning, you'll be equipped to tackle real-world security challenges and advance your career in IT security.
Syllabus
- Course 1: (SSCP) Systems Security Certified Practitioner: Unit 1
- Course 2: (SSCP) Systems Security Certified Practitioner: Unit 2
- Course 3: (SSCP) Systems Security Certified Practitioner: Unit 3
- Course 4: (SSCP) Systems Security Certified Practitioner: Unit 4
- Course 5: (SSCP) Systems Security Certified Practitioner: Unit 5
- Course 6: (SSCP) Systems Security Certified Practitioner: Unit 6
- Course 7: (SSCP) Systems Security Certified Practitioner: Unit 7
Courses
-
This course covers key aspects of security management. You'll learn about the CIA triad, the importance of change and configuration management, and the role of security awareness training. You will also learn about the ISC2 SSCP Code of Ethics and how administrative controls can strengthen your organization's security. Additionally, you'll learn to incorporate physical security measures for a comprehensive defense strategy. By the end of the course, you'll have the skills to manage security operations and protect your organization's assets effectively.
-
This course covers data security and encryption. Learn about cryptographic applications, from basic to advanced solutions for protecting information. Understand public key infrastructure (PKI), essential for secure digital communication and establishing trust. Navigate secure protocols and make informed decisions to protect data integrity. Understand symmetric and asymmetric encryption techniques and the importance of hashing for data integrity.
-
This course covers access control mechanisms and security protocols. You will explore the identity management lifecycle and learn to implement and maintain robust authentication methods. Gain insights into discretionary, mandatory, and role-based access controls, crucial for determining who can access sensitive information. Learn about internetwork trust architectures and the importance of third-party trust relationships in secure communications. You will also cover vulnerability assessment and management, equipping you with the tools to identify and mitigate security threats effectively. Additionally, the course covers continuous security monitoring, preparing you for threat detection and log management.
-
This course covers risk management and security monitoring. You'll gain a comprehensive understanding of risk identification, monitoring, and analysis. Learn about vulnerability assessment and management, and about how to identify and patch vulnerabilities effectively. Develop proficiency in continuous security monitoring, ensuring you can manage logs and security information management systems (SIMs). You will also learn to analyze and interpret monitoring results, empowering you to detect and trace malicious activities with precision.
-
This course covers network and communication security. You'll gain a deep understanding of essential network concepts, including the TCP/IP and OSI models, which are crucial for any aspiring SSCP professional. Explore network attacks, such as spoofing, flooding, and denial of service, and learn effective strategies to counteract them. This course also covers the operation of network security devices, including firewalls and intrusion detection systems, ensuring you can implement and manage these tools effectively. You also learn about secure wireless communication, examining the security of wireless internet, Bluetooth, and cellular technologies. Additionally, you will cover managed network security techniques, including secure device placement and router configuration, and understand the importance of network access controls like TACACS+ and PNAC.
-
This course covers systems and application security. You'll explore the critical aspects of endpoint security, learning to build, install, and maintain security measures using technologies like TPM, IDS, IPS, and host-based firewalls. Gain insights into identifying and mitigating malicious code and social engineering attacks, equipping you with proactive strategies to safeguard systems. You'll learn about secure virtual environments, including hypervisors, containers, and virtual appliances to effectively manage virtualization technologies. You'll also learn about cloud security, including service deployment models and navigating legal and regulatory concerns. Additionally, the course covers Enterprise Mobility Management, focusing on mobile device security and provisioning techniques.
-
This course covers incident response and recovery and teaches you the essential skills to manage and recover from cybersecurity incidents. You'll explore the Incident Response Lifecycle. You'll learn about forensic investigations, where you'll cover evidence handling, ethics, and legal considerations. This course covers business continuity planning, teaching you how to maintain operations during disruptions like power outages or network failures. You'll also learn about disaster recovery, backups, and the Business Impact Analysis (BIA), focusing on criticality prioritization and resource management.
Taught by
Pearson