What you’ll learn
Be prepared to take –and pass– the SSCP exam.
Understand which topics of the official SSCP Exam Outline they will need to study further.
Understand which topics of the official SSCP Exam Outline they currently have sufficient mastery in.
Have a list of additional resources from which to acquire supplemental information, as necessary.
Be equipped with study advice and test-taking recommendations to optimize their chances to pass the actual exam.
Be familiar with the specific elements of information that might appear on the actual exam.
Candidates for the SSCP certification should have at least two years of IT and security experience.
An explanation of the material found in the ISC2 SSCP Exam Outline, with particular focus on what you might expect to see on the exam. If you’ve been considering taking the SSCP test, this is the course for you. The course offers more than seven hours of video content at a highly-competitive price, and the accompanying coursebook can be purchased from the WannaBeA website. Drawn from the instructor’s own experience as an official ISC2 SSCP instructor, the course is delivered in a simple, straightforward manner, designed to help you pass the exam.Students are encouraged to review the ISC2 SSCP Exam Outline, available for free from the ISC2 website. The course includes other recommendations and suggestions for study purposes, as well as guidance on how to approach the test, and which topics are most likely to appear. This course is not a substitute for the requisite experience– the course content does not teach many of the basics necessary for attaining certification; students are expected to have a background in IT prior to this course. At least two years of specific experience is necessary to qualify for the certification; students should have that much knowledge, as a minimum, prior to taking this course.WannaBeA. Success and certification are only a class away.
Section 1: Introduction
Lecture 1 Introduction
Section 2: Domain 1: Security Operations and Administration
Lecture 2 Topic 1.1 Comply with codes of ethics
Lecture 3 Topic 1.2 Understand security concepts
Lecture 4 Topic 1.3 Identify and implement security controls
Lecture 5 Topic 1.4 Document and maintain functional security controls
Lecture 6 Topic 1.5 Participate in asset management lifecycle (hardware, software and data
Lecture 7 Topic 1.6 Participate in change management lifecycle
Lecture 8 Topic 1.7 Participate in implementing security awareness and training (e.g., soc
Lecture 9 Topic 1.8 Collaborate with physical security operations
Lecture 10 Domain Review
Section 3: Domain 2: Access Controls
Lecture 11 Topic 2.1 Implement and maintain authentication methods
Lecture 12 Topic 2.2 Support internetwork trust architectures
Lecture 13 Topic 2.3 Participate in the identity management lifecycle
Lecture 14 Topic 2.4 Understand and apply access controls
Lecture 15 Domain Review
Section 4: Domain 3: Risk Identification, Monitoring and Analysis
Lecture 16 Topic 3.1 Understand the risk management process
Lecture 17 Topic 3.2 Understand legal and regulatory concerns (e.g., jurisdiction, limitati
Lecture 18 Topic 3.3 Participate in security assessment and vulnerability management activi
Lecture 19 Topic 3.4 Operate and monitor security platforms (e.g., continuous monitoring)
Lecture 20 Topic 3.5 Analyze monitoring results
Lecture 21 Domain Review
Section 5: Domain 4: Incident Response and Recovery
Lecture 22 Topic 4.1 Support incident lifecycle
Lecture 23 Topic 4.2 Understand and support forensic investigations
Lecture 24 Topic 4.3 Understand and support BCP and DRP activities
Lecture 25 Domain Review
Section 6: Domain 5: Cryptography
Lecture 26 Topic 5.1 Understand reasons and requirements for cryptography
Lecture 27 Topic 5.2 Apply cryptography concepts
Lecture 28 Topic 5.3 Understand and implement secure protocols
Lecture 29 Topic 5.4 Understand and support public key infrastructure (PKI) systems
Lecture 30 Domain Review
Section 7: Domain 6: Network and Communications Security
Lecture 31 Topic 6.1 Understand and apply fundamental concepts of networking
Lecture 32 Topic 6.2 Understand network attacks
Lecture 33 Topic 6.3 Manage network access controls
Lecture 34 Topic 6.4 Manage network security
Lecture 35 Topic 6.5 Operate and configure network-based security devices
Lecture 36 Topic 6.6 Secure wireless communications
Lecture 37 Domain Review
Section 8: Domain 7: Systems and Application Security
Lecture 38 Topic 7.1 Identify and analyze malicious code and activity
Lecture 39 Topic 7.2 Implement and operate endpoint device security
Lecture 40 Topic 7.3 Administer Mobile Device Management (MDM)
Lecture 41 Topic 7.4 Understand and configure cloud security
Lecture 42 Topic 7.5 Operate and maintain secure virtual environments
Lecture 43 Domain Review
Candidates seeking to pass the SSCP exam.
Udemy | English | 7h 40m | 2.14 GB
Created by: Ben Malisow