Sei sulla pagina 1di 3

 

 
 
   

Course Syllabus

Systems Security Certified Professional (SSCP)

Instructor Name: ​Pete Cipolone Course Creation Date: 10/08/2018

Course Description and Goals

Course Description: ​Obtaining your SSCP certification signifies that you possess the ability to
tackle the operational demands and responsibilities of security practitioners, including
authentication, security testing, intrusion detection/prevention, incident response and recovery,
attacks and countermeasures, cryptography, malicious code countermeasures, and more.

Study Resources: ​All study resources will be available to view in the resources tab of the
course page.

Course Goals: ​By the end of this course, students should be able to understand:

❏ Access control fundamental concepts, Types of access control, Security models,


Authentication mechanisms, Trust direction, Identity management life cycle.
❏ Code of ethics, CIA triad and beyond, Security architecture, Controls, Systems security
plans, secure development and acquisition life cycle, System vulnerabilities, Secure
development, And acquisition practices, Data, Data leakage.
❏ Risk management process, Risk treatment, Auditing, Vulnerability scanning and
analysis, Penetration testing, Operating and monitoring systems.
❏ Incident handling, Forensic evidence, Business continuity plans, Disaster recovery plans.
❏ Fundamental concepts, Symmetric cryptography, Asymmetric cryptography, Methods of
cryptanalytic attack, Key management concepts, Secure protocols.
❏ OSI and TCP/IP models, IP networking, Network topologies, DNS and LDAP, Commonly
used ports and protocols, Telecommunication technologies, Control network access,
Multimedia services and technologies, Network based security devices

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

 
 
   

❏ CIA TRIAD: Applicability to malcode, Vectors of infections. Malicious web activity,


Identifying infections, Analysis of malware, Malware mitigation, Cloud security, Cloud
privacy, Data storage and transmission and Encryption in the cloud.

Course Outline
Domain 1: Access Controls
Lesson 1.1: Access control Concept (SC) (9 Minutes)
Lesson 1.2: Security Models (SC) (2 Minutes)
Lesson 1.3: Authentication Mechanisms (SC) (22 Minutes)
Lesson 1.4: Trust Architectures (SC) (5 Minutes)

Domain 2: Security Operations


Lesson 2.1: Code of Ethics (SC) (10 Minutes)
Lesson 2.2: Security Architecture (SC) (13 Minutes)
Lesson 2.3: Secure Development and Acquisition Lifecycle (SC) (12 Minutes)
Lesson 2.4: Data (SC) (11 minutes)
Lesson 2.5: Data Leakage Prevention (SC) (14 minutes)
Lesson 2.6: Policy Document Format (SC) (6 minutes)
Lesson 2.7: Management (SC) (10 minutes)
Lesson 2.8: Configuration Management (SC) (10 minutes)
Lesson 2.9: Interior Intrusion Detection Systems (SC) (13 minutes)

Domain 3: Risk Identification, Monitoring, and Analysis


Lesson 3.1: Intro to Risk Management (SC) (12 Minutes)
Lesson 3.2: Risk Treatment (SC) (8 Minutes)
Lesson 3.3: Auditing (SC) (11 Minutes)
Lesson 3.4: Vulnerability Scanning and Analysis (SC) (14 Minutes)
Lesson 3.5: Penetration Testing (SC) (13 Minutes)
Lesson 3.6: Operating and Maintaining Monitoring Systems (SC) (11 Minutes)

Domain 4: Incident Response and Recovery


Lesson 3.1: Incident Handling (SC) (11 Minutes)

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 
 

 
 
   

Lesson 3.2: Forensic Investigations (SC) (6 Minutes)


Lesson 3.3: Business Continuity Plans (SC) (17 Minutes)

Domain 5: Cryptography
Lesson 5.1: Cryptography Fundamentals Concepts (SC) (11 Minutes)
Lesson 5.2: Cryptography and Ciphers (SC) (11 Minutes)
Lesson 5.3: Asymmetric Cryptography (SC) (10 Minutes)
Lesson 5.4: Methods of a Cryptanalytic Attack (SC) (9 Minutes)
Lesson 5.5: Key Management Concepts (SC) (14 Minutes)

Domain 6: Networks and Communications Security


Lesson 6.1: OSI and DoD Models (SC) (10 Minutes)
Lesson 6.2: IP Networking (SC) (12 Minutes)
Lesson 6.3: Network Topologies (SC) (13 Minutes)
Lesson 6.4: DNS and LDAP (SC) (12 Minutes)
Lesson 6.5 Telecommunications Technologies (SC) (8 Minutes)
Lesson 6.6 Network Access Controls (SC) (10 Minutes)
Lesson 6.7 Multimedia Services and Technologies (SC) (13 Minutes)
Lesson 6.8 Network Based Security Devices (SC) (11 Minutes)

Domain 7: Systems and Application Security


Lesson 7.1: C.I.A. Triad - Applicability to Malcode (SC) (11 Minutes)
Lesson 7.2: Vectors of Infection (SC) (9 Minutes)
Lesson 7.3: Malicious Web Activity (SC) (8 Minutes)
Lesson 7.4: Cloud Security (SC) (14 Minutes)
Lesson 7.5 Encryption in the Cloud (SC) (7 Minutes)
Lesson 7.6 Conclusion (SC) (1 Minute)

 
Brought to you by:  Develop your team with the ​fastest growing catalog​ in the 
cybersecurity industry. Enterprise-grade workforce development 
management, advanced training features and detailed skill gap and 
 
competency analytics. 

 

Potrebbero piacerti anche