Systems Security Certified Practitioner (SSCP)

31 Jul - 3 Aug 2018 | Kuala Lumpur 13 - 16 Nov 2018 | Kuala Lumpur
Book Your Seat Today!

Kindly advise me your company detail and our consultant will contact you soonest!

Course Objectives

  • Access Control
  • Security Operations and Administration
  • Risk Identification, Monitoring, and Analysis
  • Incident Response and Recovery
  • Cryptography
  • Networks and Communications Security
  • Systems and Application Security

Description

The best way to combat an attack on an organization’s information assets is to have qualified information security professionals with the appropriate practices and controls to implement, monitor and administer IT infrastructure to ensure data confidentiality, integrity and availability. This official SSCP course validates student’s ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.

Target Audience

This course has proven to be very valuable to personnel in an organization that are fairly new to the field of information security or that do not have security as their primary job responsibility. Many of the attendees have been Information Systems Auditors, System and Network Administrators, Application Programmers and Project Managers.

Training Outline

Access Controls
  • Apply Logical Access Control in Terms of Subjects
  • Apply Logical Access Controls in Terms of Objects of Object Groups
  • Implement Authentication Mechanisms
  • Operate Internetwork Trust Architectures
  • Administer Identify Management Life Cycle
  • Implement Access Controls
Security Operations and Administration
  • Understand and Comply with Code of Ethics
  • Understand Security Concepts
  • Document and Operate Security Controls
  • Participate in Asset Management
  • Implement and Assess Compliance with Controls
  • Participate in Change Management Duties
  • Participate in Security Awareness Training
  • Participate in Physical Security Operations
Risk Identification, Monitoring, and Analysis
  • Understand the Risk Management Process
  • Perform Security Assessment Activities
  • Operate and Maintain Monitoring Systems
  • Analyze and Report Monitoring Results
Incident Response and Recovery
  • Participate in Incident Handling
  • Understand and Support Forensics Investigations
  • Understand and Support Business Continuity (BCP) and Disaster Recovery Plan (DRP)
Cryptography
  • Understand and Apply Fundamental Concepts of Cryptography
  • Understand Requirements for Cryptography
  • Operate and Implement Cryptographic Systems
Networks and Communications Security
  • Understand Security Issues Related to Networks
  • Protect Telecommunications Technologies
  • Control Network Access
  • Manage LAN-Based Security
  • Operate and Configure Network-Based Security Devices
  • Element and Operate Wireless Technologies</li
Systems and Application Security
  • Identify and Analyze Malicious Code and Activity
  • Implement and Operate Endpoint Device Security
  • Operate and Configure Cloud Security
  • Secure Big Data Systems
  • Operate and Secure Virtual Environments

Prerequisite

  • Systems administration experience
  • Familiarity with TCP/IP
  • An understanding of UNIX, Linux, and Windows
  • Intermediate-level knowledge of the security concepts