Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
SSCP Domain : Networks and Telecommunications Part 2 $74.95
SSCP Domain : Security Operations and Administration Part 1 $74.95
SSCP Domain : Security Operations and Administration Part 2 $74.95
SSCP Domain: Security Operations and Administration Part 3 $74.95
SSCP Domain : Risk, Response, and Recovery $74.95

Bundle Price: $199.00
Total Savings: $175.75


SSCP Domain : Networks and Telecommunications Part 2

In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data integrity with a focus on wireless communications and new messaging and exchange technologies. This course teaches the learner how to optimize security standards, policies and procedures for LAN, WAN and WLAN enterprise environment IT infrastructures. The course explains network vulnerabilities, VPNs, the IEEE 802 security standards, IDS solutions and best practices for deploying wireless APs and for configuring firewalls. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Identify components of a LAN
  • Recognize important LAN security considerations
  • Describe clientless VPNs
  • Describe common firewall types and configuration considerations
  • Recognize IDS solutions and monitoring techniques
  • Optimize a network enterprise environment security infrastructure
  • Describe the most widely used 802.11 standards
  • Identify best practices for deploying wireless APs and recognize WLAN security vulnerabilities
  • Describe security considerations for WiMAX implementations
  • Describe security considerations for Bluetooth connections and mobile networks
  • Identify mitigation techniques for RFID and NFC security issues
  • Recognize methods of securing wireless networks from outside attacks
  • Describe how the use of new technologies can expose an enterprise environment to attack
  • Recognize how to secure the seven domains of an IT infrastructure
  • Recognize security countermeasures that can be implemented in a network environment
  • Optimize an enterprise environment WLAN security infrastructure
  • Optimize security standards, policies and procedures for an enterprise environment

SSCP Domain : Security Operations and Administration Part 1

Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course teaches the learner about the importance of Confidentiality, Integrity and Availability (The C-I-A Triad) and how to determine appropriate methods for dealing with security and threats. It teaches how to assess and optimize your own security plan and program. The course also demonstrates the importance of Ethics in Business Security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Describe the objectives that effective security controls should meet
  • Describe security architecture design best practices
  • Describe the PDCA improvement cycle for an ISMS
  • Identify features the ISO/SEC 27002 security standards framework
  • Describe how to manage identity and access and privileged user accounts
  • Recognize the considerations for managing outsourced security partners
  • Assess a security program's objectives, architecture and framework
  • Determine appropriate measures for managing identify, access and privileged accounts and for selecting an MSSP
  • Describe the phases of a policy life cycle
  • Recognize security standards and baselines
  • Describe industry standards and open standards
  • Describe the importance of well documented security procedures
  • Recognize the main responsibilities of a security officer in the security plan development process
  • Identify confidentiality protection methods
  • Recognize important considerations for information classification
  • Assess security policies and standards
  • Optimize security procedures and plans and determine appropriate information protection and classification methods

SSCP Domain : Security Operations and Administration Part 2

Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course examines the secure storage of data as well as encryption, retention, sanitization and disposal of data. It teaches the learner the fundamentals of secure application development and demonstrates common web vulnerabilities. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Describe the key methods for maintaining confidential information security
  • Recognize appropriate techniques for restricting sensitive data access
  • Identify key management policy considerations
  • Propose appropriate techniques for destroying magnetic media
  • Identify key considerations for handling sensitive data
  • Describe the functions of a data leakage prevention strategy
  • Describe common methodologies for deploying software applications
  • Recognize the most commonly exploited vulnerabilities of web applications
  • Describe how to implement guidelines for protecting against web vulnerabilities
  • Assess the data and information security program for a particular scenario
  • Optimize the application development process for a particular scenario

SSCP Domain: Security Operations and Administration Part 3

Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course teaches the learner about Software Release Management and Deployment. It examines Accreditation and Assurance as well as Change Control and Configuration Management and demonstrates Endpoint Security and Metrics for Measuring Security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Recognize how to implement a release management policy
  • Select appropriate EAL levels to evaluate an information system for certification and accreditation
  • Describe the software certification and accreditation process
  • Recognize appropriate configuration management techniques for a particular scenario
  • Describe the steps of the patch management process
  • Describe endpoint security management solutions
  • Identify important endpoint security considerations
  • Recognize how to measure security performance using metrics
  • Identify critical success factors for security awareness programs
  • Analyze application deployment security measures for a particular scenario
  • Optimize endpoint security and security awareness

SSCP Domain : Risk, Response, and Recovery

With more and more business success relying on secure and guaranteed access to data, having plans and policies in place to manage risks and recover from disasters is pivotal. This course provides the learner with the knowledge to provide data redundancy and handling incidents and risks. This course teaches the learner how to identify the threats and vulnerabilities that can put information systems at risk and how to optimize a risk assessment and management system to protect resources. It covers risk limitation and mitigation and the security incident handling process. The course covers business continuity planning and shows how to design an effective disaster contingency plan and an optimized data recovery and restoration methodology. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Learning Objectives
  • Recognize threats and vulnerabilities that expose information technology systems to risk
  • Define key risk management concepts
  • Recognize key factors for improving a risk management system
  • Specify appropriate risk limitation controls for a particular scenario
  • Describe a security incident detection and analysis process
  • Describe a security incident containment and eradication process
  • Identify key considerations for gathering and handling evidence
  • Optimize a risk assessment methodology for a particular scenario
  • Determine appropriate risk and incident handling methods for a particular scenario
  • Describe a business impact analysis process
  • Define key business impact analysis concepts
  • Select an appropriate disaster recovery site for a particular scenario
  • Identify key considerations for disaster recovery planning
  • Describe disaster plan testing methodologies
  • Identify an appropriate data backup rotation schedule for a particular scenario
  • Identify features of high-availability and load-balancing clustering
  • Select an appropriate RAID level for a particular scenario
  • Optimize a disaster planning process for a particular scenario
  • Analyze a data backup and restoration methodology
Register Now
SSCP Part 2 e-learning bundle
  • Course ID:
    252704
  • Duration:
    11 hours
  • Price:
    $199