O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SSCP Certification (Systems Security Certified Practitioner)

Video Description

Imbibe the most up-to-date penetration testing and management skills to determine resiliency against cyber-attacks

About This Video

  • Extensive exercises and practice sessions to understand real-world security issuesRobust training to troubleshoot
  • and solve System and Network risks.Intensive Topics for a first time clearance of the (ISC)² SSCP exam

In Detail

The Systems Security Certified Practitioner (SSCP) is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. Initially Course provides information about certification exam. Then It covers 7 domains of SSCP Examination Curriculum. Successful candidates will become competent in the following 7 domains:

  • Access Controls
  • Security Operations and Administration
  • Risk Identification, Monitoring, and Analysis
  • Incident Response and Recovery
  • Cryptography
  • Network and Communications Security
  • Systems and Application Security

After Completion this course, Student will be able to secure systems, networks, applications and will be able to implement IT security policies

Downloading the example code for this course: You can download the example code files for all Packt video courses you have purchased from your account at http://www.PacktPub.com. If you purchased this course elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Chapter 1 : Preparing for (ISC) ² Certification Course
    1. The Course Overview 00:02:12
    2. Course Introduction 00:01:57
    3. (ISC)² Exam Overview 00:02:19
    4. Virtual Machine 00:04:25
    5. Lab Setup 00:05:12
  2. Chapter 2 : Access Controls: Part 1
    1. Section Objectives 00:01:07
    2. AAA and Authentication Factors 00:01:46
    3. Trust Relations and Architecture 00:01:50
    4. Subject-Based versus Object-Based 00:02:02
    5. MAC versus DAC 00:02:02
    6. Role–Based and Attribute–Based 00:02:15
    7. Management Lifecycle 00:03:21
  3. Chapter 3 : Access Controls: Part 2
    1. Section Objectives 00:01:04
    2. IEEE 802.1X and Mac Security 00:02:36
    3. RADIUS and TACACS+ 00:02:05
    4. NAC and RAT 00:02:16
    5. IPSec and SSL/TLS VPN 00:02:22
  4. Chapter 4 : Security Operations and Administration
    1. Section Objective 00:01:22
    2. Asset Management and Change Management 00:03:19
    3. Configuration Management and Impact Management 00:03:00
    4. Security Training and Physical Security Operations 00:02:58
    5. AUP Policy Enforcement 00:04:02
  5. Chapter 5 : Security Policy and Terminologies
    1. Section Objectives 00:00:58
    2. Threat, Risk, and Vulnerability 00:17:00
    3. Compromise Indicators 00:03:20
    4. Security Triad 00:02:17
    5. Written Security Policy 00:02:32
    6. Countermeasure and Mitigation 00:03:15
  6. Chapter 6 : Risk Identification, Monitoring, and Analysis: Part 1
    1. Section Objectives 00:01:05
    2. Risk Management and Assessment 00:06:39
    3. Qualitative Risk Management 00:01:59
    4. Quantitative Risk Management 00:01:44
    5. Risk Visibility 00:01:54
    6. Reporting 00:03:09
    7. Auditing 00:02:35
  7. Chapter 7 : Risk Identification, Monitoring, and Analysis: Part 2
    1. Section Objectives 00:01:17
    2. Regular Monitoring Importance 00:04:05
    3. Syslog 00:01:48
    4. SNMP and NetFlow 00:01:47
    5. Security Analytics, Metrices, and Trends 00:02:28
    6. Visualization 00:02:10
    7. Data Analysis 00:02:14
    8. Communicating Findings 00:03:20
  8. Chapter 8 : Incident Response and Recovery
    1. Section Objectives 00:01:03
    2. Incident Handling Lifecycle 00:03:16
    3. Forensics Investigations 00:05:28
    4. BCP and DRP 00:02:24
    5. Emergency Response 00:01:21
    6. Restoration 00:01:37
    7. Testing and Drills 00:02:50
  9. Chapter 9 : Overview of Cryptography
    1. Section Objectives 00:00:56
    2. Cryptography Basics 00:05:20
    3. Cipher and Types 00:06:04
    4. Identify Algorithm 00:04:09
    5. Encryption and Types 00:07:22
    6. Hashing 00:06:08
  10. Chapter 10 : Beyond the Basics of Cryptography
    1. Section Objectives 00:01:19
    2. Key Management 00:04:51
    3. Digital Signatures 00:02:06
    4. PKI and Components 00:03:03
    5. Expiration and Suspension 00:02:02
    6. Cryptography Attacks 00:07:03
    7. Mitigation 00:02:44
  11. Chapter 11 : Networks and Communications Security: Protocols and Services
    1. Section Objectives 00:00:57
    2. OSI and TCP/IP Model 00:01:20
    3. Physical and Logical Topologies 00:03:26
    4. Layer 2-4 00:02:20
    5. Layer 5-7 00:03:10
  12. Chapter 12 : Networks and Communications Security: Security Devices
    1. Section Objectives 00:00:56
    2. Routers 00:01:34
    3. Switches 00:01:37
    4. Firewall 00:06:27
    5. Proxies 00:05:32
    6. IDS and IPS 00:04:00
    7. VPNs 00:06:57
  13. Chapter 13 : Networks and Communications Security: Device Protection
    1. Section Objectives 00:00:59
    2. Device Hardening 00:09:02
    3. Security Controls and Types 00:02:17
    4. Segmentation and Zoning 00:01:50
    5. Device Protection Best Practices 00:03:05
  14. Chapter 14 : System and Application Security: Identify Malware Threats
    1. Section Objectives 00:01:10
    2. Virus, Worm, and Trojan 00:09:39
    3. Ransomwares and Crypters 00:03:08
    4. Spyware, Backdoor, and Logic Bombs 00:03:54
    5. Identify Malicious Systems 00:07:27
    6. Attack Tools and Kits 00:04:30
    7. Malware Attack Countermeasure 00:05:32
  15. Chapter 15 : System and Application Security: Secure Practices
    1. Section Objectives 00:01:16
    2. Application Security Basics 00:15:41
    3. Data Storage Security 00:13:25
    4. Third Party Outsourcing 00:01:51
    5. Virtualization Security 00:01:25
    6. Cloud Computing Security 00:02:20
    7. Big Data Security 00:02:24
    8. Legal Concerns 00:02:28