SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course
Best Seller
94 Lectures
5h 17m
Prepare for your ISC2 examination with our training course. The SSCP course contains a complete batch of videos that will provide you with profound and thorough knowledge related to ISC2 certification exam. Pass the ISC2 SSCP test with flying colors.
$14.99$24.99
Curriculum For This Course
- 1. Course Introduction 2m
- 2. (ISC)? Exam Overview 2m
- 3. Virtual Machine 4m
- 4. Lab Setup 5m
- 1. Section Objectives 1m
- 2. AAA and Authentication Factors 2m
- 3. Trust Relations and Architecture 2m
- 4. Subject-Based versus Object-Based 2m
- 5. MAC versus DAC 2m
- 6. Role–Based and Attribute–Based 2m
- 7. Management Lifecycle 3m
- 1. Section Objectives 1m
- 2. IEEE 802.1X and Mac Security 3m
- 3. RADIUS and TACACS+ 2m
- 4. NAC and RAT 2m
- 5. IPSec and SSL/TLS VPN 2m
- 1. Section Objective 1m
- 2. Asset Management and Change Management 3m
- 3. Configuration Management and Impact Management 3m
- 4. Security Training and Physical Security Operations 3m
- 5. AUP Policy Enforcement 4m
- 1. Section Objectives 1m
- 2. Threat, Risk, and Vulnerability 17m
- 3. Compromise Indicators 3m
- 4. Security Triad 2m
- 5. Written Security Policy 3m
- 6. Countermeasure and Mitigation 3m
- 1. Section Objectives 1m
- 2. Risk Management and Assessment 7m
- 3. Qualitative Risk Management 2m
- 4. Quantitative Risk Management 2m
- 5. Risk Visibility 2m
- 6. Reporting 3m
- 7. Auditing 3m
- 1. Section Objectives 1m
- 2. Regular Monitoring Importance 4m
- 3. Syslog 2m
- 4. SNMP and NetFlow 2m
- 5. Security Analytics, Metrices, and Trends 2m
- 6. Visualization 2m
- 7. Data Analysis 2m
- 8. Communicating Findings 3m
- 1. Section Objectives 1m
- 2. Incident Handling Lifecycle 3m
- 3. Forensics Investigations 5m
- 4. BCP and DRP 2m
- 5. Emergency Response 1m
- 6. Restoration 2m
- 7. Testing and Drills 3m
- 1. Section Objectives 1m
- 2. Cryptography Basics 5m
- 3. Cipher and Types 6m
- 4. Identify Algorithm 4m
- 5. Encryption and Types 7m
- 6. Hashing 6m
- 1. Section Objectives 1m
- 2. Key Management 5m
- 3. Digital Signatures 2m
- 4. PKI and Components 3m
- 5. Expiration and Suspension 2m
- 6. Cryptography Attacks 7m
- 7. Mitigation 3m
- 1. Section Objectives 1m
- 2. OSI and TCP/IP Model 1m
- 3. Physical and Logical Topologies 3m
- 4. Layer 2-4 2m
- 5. Layer 5-7 3m
- 1. Section Objectives 1m
- 2. Routers 2m
- 3. Switches 2m
- 4. Firewall 6m
- 5. Proxies 6m
- 6. IDS and IPS 4m
- 7. VPNs 7m
- 1. Section Objectives 1m
- 2. Device Hardening 9m
- 3. Security Controls and Types 2m
- 4. Segmentation and Zoning 2m
- 5. Device Protection Best Practices 3m
- 1. Section Objectives 1m
- 2. Virus, Worm, and Trojan 10m
- 3. Ransomwares and Crypters 3m
- 4. Spyware, Backdoor, and Logic Bombs 4m
- 5. Identify Malicious Systems 7m
- 6. Attack Tools and Kits 5m
- 7. Malware Attack Countermeasure 6m
- 1. Section Objectives 1m
- 2. Application Security Basics 16m
- 3. Data Storage Security 13m
- 4. Third Party Outsourcing 2m
- 5. Virtualization Security 1m
- 6. Cloud Computing Security 2m
- 7. Big Data Security 2m
- 8. Legal Concerns 2m
Hot Exams
How to Open Test Engine .dumpsqueen Files
Use FREE DumpsQueen Test Engine player to open .dumpsqueen files
Your purchase with DumpsQueen.com is safe and fast.
The DumpsQueen.com website is protected by 256-bit SSL from Cloudflare, the leader in online security.