close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Systems Security Certified Practitioner Course Outline

The Systems Security Certified Practitioner training course will explore the seven domains that feature the Common Body of Knowledge. The domains encompass a range of IT security areas whereby knowledge is essential.

Domain 1: Security Operations and Administration

Module 1: Comply with Codes of Ethics

  • (ISC)² Code of Ethics
  • Organisational Code of Ethics

Module 2: Understand Security Concepts

  • Confidentiality
  • Integrity
  • Availability
  • Accountability
  • Privacy
  • Non-repudiation
  • Least Privilege
  • Separation of Duties (SoD)

Module 3: Identify and Implement Security Controls

  • Technical Controls
  • Physical Controls
  • Administrative Controls
  • Assessing Compliance
  • Periodic Audit and Review

Module 4: Document and Maintain Functional Security Controls

  • Deterrent Controls
  • Preventative Controls
  • Detective Controls
  • Corrective Controls
  • Compensating Controls

Module 5: Participate in Asset Management Lifecycle

  • Process, Planning, Design, and Initiation
  • Development/Acquisition
  • Inventory and Licensing
  • Operation/Maintenance
  • Archiving and Retention Requirements
  • Disposal and Destruction

Module 6: Participate in Change Management Lifecycle

  • Change Management
  • Security Impact Analysis
  • Configuration Management (CM)

Module 7: Participate in Implementing Security Awareness and Training

  • Introduction
  • Steps

Module 8: Collaborate with Physical Security Operations

  • Overview
  • Data Centre Assessment
  • Badging

Domain 2: Access Controls

Module 9: Implement and Maintain Authentication Methods

  • Single/Multi-factor Authentication (MFA)
  • Single Sign-On (SSO)
  • Device Authentication
  • Federated Access

Module 10: Support Internetwork Trust Architectures

  • Trust Relationships
  • Internet, Intranet, Extranet
  • Third Party Connections

Module 11: Participate in the Identity Management Lifecycle

  • Authorisation
  • Proofing
  • Provisioning/ De-provisioning
  • Maintenance
  • Entitlement
  • Identity and Access Management (IAM) System

Module 12: Understand and Apply Access Controls

  • Mandatory
  • Discretionary
  • Role Based
  • Rule Based

Domain 3: Risk Identification, Monitoring, and Analysis

Module 13: Understand the Risk Management Process

  • Risk Visibility and Reporting
  • Risk Management Concepts
  • Risk Management Frameworks
  • Risk Tolerance
  • Risk Treatment

Module 14: Understand Legal and Regulatory Concerns

  • Jurisdiction
  • Privacy

Module 15: Participate in Security Assessment and Vulnerability Management Activities

  • Security Testing
  • Risk Review
  • Vulnerability Management Lifecycle

Module 16: Operate and Monitor Security Platforms

  • Source System
  • Event of Interest
  • Log Management
  • Event Aggregation and Correlation

Module 17: Analyse Monitoring Results

  • Security Baseline and Anomalies
  • Visualisation, Metrics, and Trends
  • Event Data Analysis
  • Document and Communicate Findings

Domain 4: Incident Response and Recovery

Module 18: Support Incident Lifecycle

  • Preparation
  • Detection, Analysis, Escalation
  • Containment
  • Eradication
  • Recovery
  • Lesson Learned/ Implementation of New Countermeasure

Module 19: Understand and Support Forensic Investigations

  • Legal and Ethical Principles
  • Evidence Handling
  • Reporting of Analysis

Module 20: Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)

  • Emergency Response Plans and Procedures
  • Interim or Alternative Processing Strategies
  • Restoration Planning
  • Backup and Redundancy Implementation
  • Testing and Drills

Domain 5: Cryptography

Module 21: Understand Cryptography

  • Confidentiality
  • Integrity and Authenticity
  • Data Sensitivity
  • Regulatory and Industry Best Practice

Module 22: Apply Cryptography Concepts

  • Hashing
  • Salting
  • Symmetric/Asymmetric Encryption/Elliptic Curve Cryptography (ECC)
  • Non-Repudiation
  • Strength of Encryption Algorithms and Keys
  • Cryptographic Attacks Cryptanalysis and Countermeasures

Module 23: Understand and Implement Secure Protocols

  • Services and Protocols
  • Common Use Cases
  • Limitations and Vulnerabilities

Module 24: Understand Public Key Infrastructure (PKI)

  • Fundamental Key Management Concepts
  • Web of Trust

Domain 6: Network and Communication Security

Module 25: Understand and Apply Fundamental Concepts of Networking

  • Open System Interconnections and Transmission Control Protocol/Internet Protocol Models
  • Network Topologies
  • Network Relationships
  • Transmission Media Types
  • Software-defined Networking (SDN)
  • Commonly Used Ports and Protocols

Module 26: Understand Network Attacks

  • Types of Network Attacks

Module 27: Manage Network Access Controls

  • Network Access Controls, Standards and Protocols
  • Remote Access Operation and Configuration

Module 28: Manage Network Security

  • Logical and Physical Placement of Network Devices
  • Segmentation
  • Secure Device Management

Module 29: Operate and Configure Network-based Security Devices

  • Firewalls and Proxies
  • Network Intrusion Detection/Prevention Systems
  • Routers and Switches
  • Routers and Switches
  • Traffic Shaping Devices

Module 30: Secure Wireless Communications

  • Technologies
  • Authentication and Encryption Protocols
  • Internet of Things (IOT)

Domain 7: Systems and Application Security

Module 31: Identity and Analyse Malicious Code and Activity

  • Malware
  • Malware Countermeasures
  • Malicious Activity
  • Malicious Activity Countermeasures

Module 32: Implement and Operate Endpoint Device Security

  • Host-Based Intrusion Prevention System (HIPS)
  • Host-Based Firewalls
  • Application Whitelisting
  • Endpoint Encryption
  • Trusted Platform Module (TPM)
  • Secure Browsing
  • Endpoint Detection and Response (EDR)

Module 33: Administer Mobile Device Management (MDM)

  • Provisioning Techniques
  • Containerisation
  • Encryption
  • Mobile Application Management (MAM)

Module 34: Understand and Configure Cloud Security

  • Deployment Models
  • Service Models
  • Virtualisation
  • Legal and Regulatory Concerns
  • Data Storage, Processing, and Transmission
  • Third Party/Outsourcing Requirements
  • Shared Responsibility Model

Module 35: Operate and Maintain Secure Virtual Environments

  • Hypervisor
  • Virtual Appliances
  • Containers
  • Continuity and Resilience
  • Attacks and Countermeasures
  • Shared Storage

Show moredowndown

Prerequisites

There are no formal prerequisites for attending this Systems Security Certified Practitioner (SSCP) Training.

Audience

This course is designed for those who are interested in pursuing a career in information security or enhancing their existing knowledge and skills.

Systems Security Certified Practitioner Course Overview

Systems Security Certified Practitioner (SSCP) is a professional certification programme designed to confirm fundamental information security knowledge and skills. It covers network and endpoint security, access restrictions, security operations, incident response, and other security subjects. This certification is worldwide recognised and assists professionals in demonstrating their knowledge of information security. This training helps organisations better protect their networks and systems from potential threats, comply with industry regulations, and mitigate the risk of data breaches. Pursuing training in systems security will help individuals enhance their career prospects and potentially lead to higher salaries and career advancement opportunities.

In this 3-day Systems Security Certified Practitioner (SSCP) Training course, the delegates will learn foundational knowledge and skills in information security, including network and endpoint security, access controls, security operations, and incident response. They will also gain an understanding of compliance, regulations, and ethical practices in security. Our highly expert trainer with years of teaching experience will conduct this course and help delegates to understand all necessary topics.

Course Objectives

  • To develop knowledge of network and endpoint security concepts
  • To understand access controls and authentication mechanisms
  • To learn about security operations and incident response procedures
  • To identify and manage security risks and vulnerabilities
  • To gain an understanding of cryptography and encryption techniques
  • To understand security regulations, compliance, and ethical practices

After attending this training course, the delegates will be able to use their skills in information security. They will also be able to work with network and endpoint security, access controls, security operations, incident response, and compliance with regulations and ethical practices.

Show moredowndown

What's included in this SSCP Training Course?

  • Delegate pack consisting of course notes and exercises
  • Experienced Instructor
  • Refreshments

Systems Security Certified Practitioner Exam Details

The examination for Systems Security Certified Practitioner is not included with this training course and will need to be booked via Pearson VUE. The exam consists of 125 questions, which delegates will have 3 hours to complete. In order to pass the exam and thus acquire the SSCP certification, delegates must achieve a scaled score of 700.

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

What our customers are saying

Systems Security Certified Practitioner (SSCP) FAQs

FAQ's

Please arrive at the venue by 8:45am.
There are no formal prerequisites for attending this Systems Security Certified Practitioner (SSCP) Training.
This course is designed for those who are interested in pursuing a career in information security or enhancing their existing knowledge and skills.
System security refers to the measures taken to protect computer systems and networks from unauthorised access, theft, damage, or disruption, using various hardware, software, and procedural controls.
The three pillars of system security are Confidentiality, Integrity, and Availability, also known as the CIA triad.
This course is 3 days
Common threats to system security include malware, phishing attacks, social engineering, insider threats, and Denial-of-Service (DoS) attacks.
Encryption in system security is the process of encoding data so that only authorised parties can access it.
In this Systems Security Certified Practitioner (SSCP) Training you will learn about various security domains such as access controls, security operations and administration, network and endpoint security, risk identification, monitoring and analysis, incident response and recovery, cryptography, and more.
The price for Systems Security Certified Practitioner (SSCP) certification in the United States starts from $1995
The Knowledge Academy is the Leading global training provider for Systems Security Certified Practitioner (SSCP).
Please see our SSCP Training courses available in the United States

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on SSCP Training?

backBack to course information

Advanced Data Protection Bundle

Save upto 40%
4 courses
Included courses:

ISO 27001 Lead Auditor$2295

CISSP Certification Course$2295

Certified EU General Data Protection Regulation (EU GDPR) Foundation and Practitioner$2295

Systems Security Certified Practitioner (SSCP)$1995

Total without package:  $8880

Package price:  $5295 (Save $3585)

Purchase now