Every registration supports local education. TrainUp Gives Back

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

When you register for training with TrainUp.com, you are also supporting local education. Find out how.
  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
  • calendar Image 6-12 Months
    To Complete


Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course examines the secure storage of data as well as encryption, retention, sanitization and disposal of data. It teaches the learner the fundamentals of secure application development and demonstrates common web vulnerabilities. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Describe the key methods for maintaining confidential information security
  • Recognize appropriate techniques for restricting sensitive data access
  • Identify key management policy considerations
  • Propose appropriate techniques for destroying magnetic media
  • Identify key considerations for handling sensitive data
  • Describe the functions of a data leakage prevention strategy
  • Describe common methodologies for deploying software applications
  • Recognize the most commonly exploited vulnerabilities of web applications
  • Describe how to implement guidelines for protecting against web vulnerabilities
  • Assess the data and information security program for a particular scenario
  • Optimize the application development process for a particular scenario
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.