Looking to move up in the information security field? If you have at least one year of security experience, you qualify for the Systems Security Certified Practitioner (SSCP) certification, which offers junior security professionals a way to validate their experience and demonstrate competence with (ISC)² 's seven domains. A free copy of the Official (ISC)² Guide to The SSCP CBK from (ISC)² Press and a SSCP certification practice exam from Self Test Software are included with the course.Interested in group training toward 8570.1 compliancy? This course can be a component of our 8570.1 Training Solution that can also include assessments, certification preparation and program management, post training and testing, 8570 compliancy tracking and reporting, and continuing education. Learn more about our 8570 Training Solution by contacting us at 1-888-DOD-8570
This course has proven to be very valuable to personnel in an organization that are fairly new to the field of information security or that do not have security as their primary job responsibility. Many of the attendees have been Information Systems Auditors, System and Network Administrators, Application Programmers and Project Managers.
In-depth coverage of the seven domains-required to pass the SSCP Exam:
Security Operations and Administration
Analysis and Monitoring
Networks and Telecommunications
Risk, Response, and Recovery
Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course
1. Testing-Taking Tips and Study Techniques
Preparation for the SSCP Exam
Submitting Required Paperwork
Resources and Study Aids
Passing the Exam the First Time
2. Security Operations and Administration
Change Control/Configuration Management
Vulnerability Assessment and Pen-Testing
3. Access Controls
Authentication Methods (Types 1, 2, & 3)
Authorization - DAC, RBAC, MAC
Accounting - Logging, Monitoring, Auditing
Single Sign-On - Kerberos, Radius, Diameter, TACACS
Vulnerabilities - Emanations, Impersonation, Rouge Infrastructure, Social Engineering
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.