Acerca de este Curso
4.6
8 calificaciones
2 revisiones
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 17 horas para completar

Sugerido: 5 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Horas para completar

Aprox. 17 horas para completar

Sugerido: 5 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
3 horas para completar

Understand and Comply with Code of Ethics and Security Concepts

Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization. ...
Reading
10 videos (Total 67 min), 10 readings, 1 quiz
Video10 videos
Security Concepts: Confidentiality7m
Security Concepts: Ensuring Confidentiality4m
Security Concepts: Consequences of Integrity Failures6m
Security Concepts: Core Guidelines5m
Security Concepts: Least Privilege7m
Security Concepts: Additional Controls6m
Security Concepts: Risk Assessment Data5m
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls5m
Security Controls: Timeline of a Security Incident6m
Reading10 lecturas
Understand and Comply with Code of Ethics10m
Security Concepts: Confidentiality10m
Security Concepts: Ensuring Confidentiality10m
Security Concepts: Consequences of Integrity Failures10m
Security Concepts: Core Guidelines10m
Security Concepts: Least Privilege10m
Security Concepts: Additional Controls10m
Security Concepts: Risk Assessment Data10m
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls10m
Security Controls: Timeline of a Security Incident10m
Quiz1 ejercicio de práctica
Quiz 120m
Semana
2
Horas para completar
4 horas para completar

Participate in Asset Management

Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention....
Reading
14 videos (Total 84 min), 14 readings, 1 quiz
Video14 videos
Asset Management: The Waterfall Model10m
Asset Management: Benefits and Drawbacks5m
Asset Management: Deployment of System4m
Asset Management: OWASP Top Ten5m
Asset Management: Guidelines for Developers5m
Asset Management: IT Asset Management (ITAM)5m
Asset Management: Impact and Result4m
Asset Management: Encryption Vulnerabilities6m
Asset Management: Data Scrubbing6m
Asset Management: Considerations6m
Asset Management: Secure Output6m
Asset Management: Destruction of Magnetic Media4m
Asset Management: Disclosure Controls4m
Reading14 lecturas
Asset Management: Life Cycle10m
Asset Management: The Waterfall Model10m
Asset Management: Benefits and Drawbacks10m
Asset Management: Deployment of System10m
Asset Management: OWASP Top Ten10m
Asset Management: Guidelines for Developers10m
Asset Management: IT Asset Management (ITAM)10m
Asset Management: Impact and Result10m
Asset Management: Encryption Vulnerabilities10m
Asset Management: Data Scrubbing10m
Asset Management: Considerations10m
Asset Management: Secure Output10m
Asset Management: Destruction of Magnetic Media10m
Asset Management: Disclosure Controls10m
Quiz1 ejercicio de práctica
Quiz 220m
Semana
3
Horas para completar
3 horas para completar

Implement and Assess Compliance with Controls & Participate in Change Management Duties

Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures. Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process....
Reading
9 videos (Total 58 min), 9 readings, 1 quiz
Video9 videos
Compliance with Controls: Managerial Controls6m
Compliance with Controls: Policy Life Cycle7m
Change Management Duties: Implementation and Configuration Management Plan7m
Change Management Duties: Systems Assurance and Controls Validation5m
Change Management Duties: CM Process5m
Change Management Duties: Configuration Management for Operating Systems6m
Change Management Duties: Control8m
Change Management Duties: Testing Patches, Fixes, and Updates6m
Reading9 lecturas
Compliance with Controls: Technical Controls10m
Compliance with Controls: Managerial Controls10m
Compliance with Controls: Policy Life Cycle10m
Change Management Duties: Implementation and Configuration Management Plan10m
Change Management Duties: Systems Assurance and Controls10m
Change Management Duties: CM Process10m
Change Management Duties: Configuration Management for Operating Systems10m
Change Management Duties: Control10m
Change Management Duties: Testing Patches, Fixes, and Updates10m
Quiz1 ejercicio de práctica
Week 3 Quiz20m
Semana
4
Horas para completar
3 horas para completar

Participate in Physical Security Operations & Security Awareness Training

Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems. ...
Reading
11 videos (Total 65 min), 11 readings, 1 quiz
Video11 videos
Physical Security Operations: Doors4m
Physical Security Operations: Door Locks4m
Physical Security Operations: Turnstiles6m
Physical Security Operations: Securing the Area6m
Physical Security Operations: Rack Security5m
Physical Security Operations: HVAC6m
Security Operations: Sprinkler Systems5m
Security Operations: Gas Suppression Systems5m
Security Awareness Training: Critical Success Factors7m
Security Awareness Training: Training6m
Reading11 lecturas
Physical Security Operations: Physical Security10m
Physical Security Operations: Doors10m
Physical Security Operations: Door Locks10m
Physical Security Operations: Turnstiles10m
Physical Security Operations: Securing the Area10m
Physical Security Operations: Rack Security10m
Physical Security Operations: HVAC10m
Security Operations: Sprinkler Systems10m
Security Operations: Gas Suppression Systems10m
Security Awareness Training: Critical Success Factors10m
Security Awareness Training: Training10m
Quiz1 ejercicio de práctica
Week 4 Quiz20m
4.6
2 revisionesChevron Right

Principales revisiones

por GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

Instructor

Avatar

(ISC)² Education & Training

Education & Training

Acerca de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Acerca del programa especializado (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

  • Sí, puedes acceder a una vista preliminar del primer video y ver el programa antes de inscribirte. Debes comprar el curso para acceder a contenido que no está incluido en la vista preliminar

  • Si decides inscribirte en el curso antes de la fecha de inicio de la sesión, tendrás acceso a todos los videos y las lecturas de la lección para el curso. Podrás enviar tareas en cuanto comience la sesión.

  • Una vez que te inscribes y comienza la sesión, tendrás acceso a todos los videos y otros recursos, incluidos artículos de lectura y el foro de debate del curso. Podrás ver y enviar tareas de práctica y completar tareas con calificación obligatorias para obtener un título y un Certificado de curso

  • Si completas el curso de manera correcta, tu Certificado de curso electrónico se agregará a la página Logros. Desde allí, puedes imprimir tu Certificado de curso o agregarlo a tu perfil de LinkedIn

  • Este curso es uno de los pocos que se ofrecen en Coursera que está actualmente disponible solo para estudiantes que pagaron o que recibieron ayuda económica. / Si deseas tomar este curso, pero no puedes pagar la tarifa, te sugerimos enviar una solicitud de ayuda económica.

  • The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.