Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.



Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Systems Security Certified Practitioner Course Outline

The Systems Security Certified Practitioner training course will explore the seven domains that feature the Common Body of Knowledge. The domains encompass a range of IT security areas whereby knowledge is essential.

Domain 1: Security Operations and Administration

Module 1: Comply with Codes of Ethics

  • (ISC)² Code of Ethics
  • Organisational Code of Ethics

Module 2: Understand Security Concepts

  • Confidentiality
  • Integrity
  • Availability
  • Accountability
  • Privacy
  • Non-repudiation
  • Least Privilege
  • Separation of Duties (SoD)

Module 3: Identify and Implement Security Controls

  • Technical Controls
  • Physical Controls
  • Administrative Controls
  • Assessing Compliance
  • Periodic Audit and Review

Module 4: Document and Maintain Functional Security Controls

  • Deterrent Controls
  • Preventative Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls

Module 5: Participate in Asset Management Lifecycle

  • Process, Planning, Design, and Initiation
  • Development/Acquisition
  • Inventory and Licensing
  • Operation/Maintenance
  • Archiving and Retention Requirements
  • Disposal and Destruction

Module 6: Participate in Change Management Lifecycle

  • Change Management
  • Security Impact Analysis
  • Configuration Management (CM)

Module 7: Participate in Implementing Security Awareness and Training

  • Introduction
  • Steps

Module 8: Collaborate with Physical Security Operations

  • Overview
  • Data Centre Assessment
  • Badging

Domain 2: Access Controls

Module 9: Implement and Maintain Authentication Methods

  • Single/Multi-factor Authentication (MFA)
  • Single Sign-On (SSO)
  • Device Authentication
  • Federated Access

Module 10: Support Internetwork Trust Architectures

  • Trust Relationships
  • Internet, Intranet, Extranet
  • Third Party Connections

Module 11: Participate in the Identity Management Lifecycle

  • Authorisation
  • Proofing
  • Provisioning/ De-provisioning
  • Maintenance
  • Entitlement
  • Identity and Access Management (IAM) System

Module 12: Understand and Apply Access Controls

  • Mandatory
  • Discretionary
  • Role Based
  • Rule Based

Domain 3: Risk Identification, Monitoring, and Analysis

Module 13: Understand the Risk Management Process

  • Risk Visibility and Reporting
  • Risk Management Concepts
  • Risk Management Frameworks
  • Risk Tolerance
  • Risk Treatment

Module 14: Understand Legal and Regulatory Concerns

  • Jurisdiction
  • Privacy

Module 15: Participate in Security Assessment and Vulnerability Management Activities

  • Security Testing
  • Risk Review
  • Vulnerability Management Lifecycle

Module 16: Operate and Monitor Security Platforms

  • Source System
  • Event of Interest
  • Log Management
  • Event Aggregation and Correlation

Module 17: Analyse Monitoring Results

  • Security Baseline and Anomalies
  • Visualisation, Metrics, and Trends
  • Event Data Analysis
  • Document and Communicate Findings

Domain 4: Incident Response and Recovery

Module 18: Support Incident Lifecycle

  • Preparation
  • Detection, Analysis, Escalation
  • Containment
  • Eradication
  • Recovery
  • Lesson Learned/ Implementation of New Countermeasure

Module 19: Understand and Support Forensic Investigations

  • Legal and Ethical Principles
  • Evidence Handling
  • Reporting of Analysis

Module 20: Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)

  • Emergency Response Plans and Procedures
  • Interim or Alternative Processing Strategies
  • Restoration Planning
  • Backup and Redundancy Implementation
  • Testing and Drills

Domain 5: Cryptography

Module 21: Understand Cryptography

  • Confidentiality
  • Integrity and Authenticity
  • Data Sensitivity
  • Regulatory and Industry Best Practice

Module 22: Apply Cryptography Concepts

  • Hashing
  • Salting
  • Symmetric/Asymmetric Encryption/Elliptic Curve Cryptography (ECC)
  • Non-Repudiation
  • Strength of Encryption Algorithms and Keys
  • Cryptographic Attacks Cryptanalysis and Countermeasures

Module 23: Understand and Implement Secure Protocols

  • Services and Protocols
  • Common Use Cases
  • Limitations and Vulnerabilities

Module 24: Understand Public Key Infrastructure (PKI)

  • Fundamental Key Management Concepts
  • Web of Trust

Domain 6: Network and Communication Security

Module 25: Understand and Apply Fundamental Concepts of Networking

  • Open System Interconnections and Transmission Control Protocol/Internet Protocol Models
  • Network Topologies
  • Network Relationships
  • Transmission Media Types
  • Software-defined Networking (SDN)
  • Commonly Used Ports and Protocols

Module 26: Understand Network Attacks

  • Types of Network Attacks

Module 27: Manage Network Access Controls

  • Network Access Controls, Standards and Protocols
  • Remote Access Operation and Configuration

Module 28: Manage Network Security

  • Logical and Physical Placement of Network Devices
  • Segmentation
  • Secure Device Management

Module 29: Operate and Configure Network-based Security Devices

  • Firewalls and Proxies
  • Network Intrusion Detection/Prevention Systems
  • Routers and Switches
  • Routers and Switches
  • Traffic Shaping Devices

Module 30: Secure Wireless Communications

  • Technologies
  • Authentication and Encryption Protocols
  • Internet of Things (IOT)

Domain 7: Systems and Application Security

Module 31: Identity and Analyse Malicious Code and Activity

  • Malware
  • Malware Countermeasures
  • Malicious Activity
  • Malicious Activity Countermeasures

Module 32: Implement and Operate Endpoint Device Security

  • Host-Based Intrusion Prevention System (HIPS)
  • Host-Based Firewalls
  • Application Whitelisting
  • Endpoint Encryption
  • Trusted Platform Module (TPM)
  • Secure Browsing
  • Endpoint Detection and Response (EDR)

Module 33: Administer Mobile Device Management (MDM)

  • Provisioning Techniques
  • Containerisation
  • Encryption
  • Mobile Application Management (MAM)

Module 34: Understand and Configure Cloud Security

  • Deployment Models
  • Service Models
  • Virtualisation
  • Legal and Regulatory Concerns
  • Data Storage, Processing, and Transmission
  • Third Party/Outsourcing Requirements
  • Shared Responsibility Model

Module 35: Operate and Maintain Secure Virtual Environments

  • Hypervisor
  • Virtual Appliances
  • Containers
  • Continuity and Resilience
  • Attacks and Countermeasures
  • Shared Storage

Show moredowndown


There are no formal prerequisites for attending this Systems Security Certified Practitioner (SSCP) Training.


This course is designed for those who are interested in pursuing a career in information security or enhancing their existing knowledge and skills.

Systems Security Certified Practitioner Course Overview

Systems Security Certified Practitioner (SSCP) is a professional certification programme designed to confirm fundamental information security knowledge and skills. It covers network and endpoint security, access restrictions, security operations, incident response, and other security subjects. This certification is worldwide recognised and assists professionals in demonstrating their knowledge of information security. This training helps organisations better protect their networks and systems from potential threats, comply with industry regulations, and mitigate the risk of data breaches. Pursuing training in systems security will help individuals enhance their career prospects and potentially lead to higher salaries and career advancement opportunities.

In this 3-day Systems Security Certified Practitioner (SSCP) Training course, the delegates will learn foundational knowledge and skills in information security, including network and endpoint security, access controls, security operations, and incident response. They will also gain an understanding of compliance, regulations, and ethical practices in security. Our highly expert trainer with years of teaching experience will conduct this course and help delegates to understand all necessary topics.

Course Objectives

  • To develop knowledge of network and endpoint security concepts
  • To understand access controls and authentication mechanisms
  • To learn about security operations and incident response procedures
  • To identify and manage security risks and vulnerabilities
  • To gain an understanding of cryptography and encryption techniques
  • To understand security regulations, compliance, and ethical practices

After attending this training course, the delegates will be able to use their skills in information security. They will also be able to work with network and endpoint security, access controls, security operations, incident response, and compliance with regulations and ethical practices.

Show moredowndown

What's included in this SSCP Training Course?

  • Delegate pack consisting of course notes and exercises
  • Experienced Instructor
  • Refreshments

Systems Security Certified Practitioner Exam Details

The examination for Systems Security Certified Practitioner is not included with this training course and will need to be booked via Pearson VUE. The exam consists of 125 questions, which delegates will have 3 hours to complete. In order to pass the exam and thus acquire the SSCP certification, delegates must achieve a scaled score of 700.

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.


Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.


State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible


Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience


Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.


Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.


Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.


Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.


Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

Systems Security Certified Practitioner (SSCP) FAQs


Please arrive at the venue by 8:45am.
There are no formal prerequisites for attending this Systems Security Certified Practitioner (SSCP) Training.
This course is designed for those who are interested in pursuing a career in information security or enhancing their existing knowledge and skills.
System security refers to the measures taken to protect computer systems and networks from unauthorised access, theft, damage, or disruption, using various hardware, software, and procedural controls.
The three pillars of system security are Confidentiality, Integrity, and Availability, also known as the CIA triad.
This course is 3 days
Common threats to system security include malware, phishing attacks, social engineering, insider threats, and Denial-of-Service (DoS) attacks.
Encryption in system security is the process of encoding data so that only authorised parties can access it.
In this Systems Security Certified Practitioner (SSCP) Training you will learn about various security domains such as access controls, security operations and administration, network and endpoint security, risk identification, monitoring and analysis, incident response and recovery, cryptography, and more.
The price for Systems Security Certified Practitioner (SSCP) certification in the United Kingdom starts from £1795
The Knowledge Academy is the Leading global training provider for Systems Security Certified Practitioner (SSCP).
Please see our SSCP Training courses available in the United Kingdom

Why choose us


Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.


Many delivery methods

Flexible delivery methods are available depending on your learning style.


High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on SSCP Training?

backBack to course information

Advanced Data Protection Bundle

Save upto 40%
4 courses
Included courses:

ISO 27001 Lead Auditor£1995

CISSP Certification Course£1995

Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner£1995

Systems Security Certified Practitioner (SSCP)£1795

Total without package:  £7780

Package price:  £4695 (Save £3085)

Purchase now