Scroll to top button

Systems Security Certified Practitioner

ISBN : 9781616912055

Gain hands-on expertise in (ISC)² SSCP exam with Systems Security Certified Practitioner Study Guide. This course covers all the domains of (ISC)² SSCP exam and includes topics such as access controls; security operations and administration; risk identification, monitoring and analysis; cryptography; network and communications security; and so on.

The SSCP exam is an entry-level security exam sponsored by International Information Systems Security Certification Consortium, Inc., or (ISC)². It is considered by many to be a stepping stone on the path of earning the (ISC)² Certified Information Systems Security Practitioner (CISSP). (ISC)² describes the person with the SSCP certification as the person doing the hands-on work or the enforcer that everyone is going to for answers. The exam is still focused on understanding key security concepts.

Lessons
Lessons
7+
Exercises
229+
Quizzes
86+
Flashcards
107+
Glossary of terms
107+
TestPrep
Pre Assessment Questions
15+
Full Length Tests
2+
Post Assessment Questions
100+
  • Implement Logical Access Controls in Terms of Subjects
  • Implement Logical Access Controls in Terms of Objects
  • Implement Authentication Mechanisms
  • Apply Access Control Concepts
  • Manage Internetwork Trust Architectures
  • Implement identity management
  • Understand basic security concepts related to cloud computing
  • Adhere to Code of Ethics
  • Perform Security Administrative Duties
  • Perform Change Management Duties
  • Provide security evaluation and assistance to the organization
  • Participate in Security Awareness Education
  • Assess the information communication technology infrastructure using appropriate tools
  • Understand concepts of endpoint device security
  • Comply with data management policies
  • Understand security concepts
  • Maintain Effective Monitoring Systems
  • Analyze Monitoring Results
  • Understand Risk Management Process
  • Perform Security Assessment Activities
  • Participate in incident handling analysis
  • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • Understand basic concepts of Cryptography
  • Understand Requirements for Cryptography
  • Support Certificate and Key Management
  • Understand the use of Secure Protocols
  • Understand Security issues related to Networks
  • Understand Telecommunications
  • Understand Remote Access
  • Understand Firewalls and Proxies
  • Understand Wireless and Cellular Technologies
  • Identify Malicious Code
  • Implement Malicious Code Countermeasures
  • Identify Malicious Activity
  • Implement Malicious Activity Countermeasures
×