Scroll to top button

Systems Security Certified Practitioner

ISBN : 9781616912055

Gain hands-on expertise in (ISC)² SSCP exam with Systems Security Certified Practitioner Study Guide. This course covers all the domains of (ISC)² SSCP exam and includes topics such as access controls; security operations and administration; risk identification, monitoring and analysis; cryptography; network and communications security; and so on.

The SSCP exam is an entry-level security exam sponsored by International Information Systems Security Certification Consortium, Inc., or (ISC)². It is considered by many to be a stepping stone on the path of earning the (ISC)² Certified Information Systems Security Practitioner (CISSP). (ISC)² describes the person with the SSCP certification as the person doing the hands-on work or the enforcer that everyone is going to for answers. The exam is still focused on understanding key security concepts.

Glossary of terms
Pre Assessment Questions
Full Length Tests
Post Assessment Questions
  • Implement Logical Access Controls in Terms of Subjects
  • Implement Logical Access Controls in Terms of Objects
  • Implement Authentication Mechanisms
  • Apply Access Control Concepts
  • Manage Internetwork Trust Architectures
  • Implement identity management
  • Understand basic security concepts related to cloud computing
  • Adhere to Code of Ethics
  • Perform Security Administrative Duties
  • Perform Change Management Duties
  • Provide security evaluation and assistance to the organization
  • Participate in Security Awareness Education
  • Assess the information communication technology infrastructure using appropriate tools
  • Understand concepts of endpoint device security
  • Comply with data management policies
  • Understand security concepts
  • Maintain Effective Monitoring Systems
  • Analyze Monitoring Results
  • Understand Risk Management Process
  • Perform Security Assessment Activities
  • Participate in incident handling analysis
  • Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • Understand basic concepts of Cryptography
  • Understand Requirements for Cryptography
  • Support Certificate and Key Management
  • Understand the use of Secure Protocols
  • Understand Security issues related to Networks
  • Understand Telecommunications
  • Understand Remote Access
  • Understand Firewalls and Proxies
  • Understand Wireless and Cellular Technologies
  • Identify Malicious Code
  • Implement Malicious Code Countermeasures
  • Identify Malicious Activity
  • Implement Malicious Activity Countermeasures