Acerca de este Curso
4,518 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 12 horas para completar

Sugerido: 4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
5 horas para completar

Identify and Analyze Malicious Code and Activity

18 videos (Total 109 minutos), 18 lecturas, 1 cuestionario
18 videos
Malicious Code and Activity: Key Concepts6m
Malicious Code and Activity: Malicious Code Countermeasures4m
Malicious Code and Activity: Software Exploitation Methods6m
Malicious Code and Activity: Software Exploitation Methods5m
Malicious Code and Activity: Code Signing5m
Malicious Code and Activity: Social Engineering6m
Malicious Code and Activity: Security Awareness Training6m
Malicious Code and Activity: Long File Extensions5m
Malicious Code and Activity: E-mail7m
Malicious Code and Activity: Countermeasures5m
Malicious Code and Activity: Examples of Spoofing5m
Malicious Code and Activity: Techniques5m
Malicious Code and Activity: Botnet-Led Exploits6m
Malicious Code and Activity: Malicious Web Activity6m
Malicious Code and Activity: Zero-Day Exploits4m
Malicious Code and Activity: Infected Factory Builds and Media4m
Malicious Code and Activity: Inspection of Processes7m
18 lecturas
Systems and Application Security10m
Malicious Code and Activity: Key Concepts10m
Malicious Code and Activity: Malicious Code Countermeasures10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Code Signing10m
Malicious Code and Activity: Social Engineering10m
Malicious Code and Activity: Security Awareness Training10m
Malicious Code and Activity: Long File Extensions10m
Malicious Code and Activity: E-mail10m
Malicious Code and Activity: Countermeasures10m
Malicious Code and Activity: Examples of Spoofing10m
Malicious Code and Activity: Techniques10m
Malicious Code and Activity: Botnet-Led Exploits10m
Malicious Code and Activity: Malicious Web Activity10m
Malicious Code and Activity: Zero-Day Exploits10m
Malicious Code and Activity: Infected Factory Builds and Media10m
Malicious Code and Activity: Inspection of Processes10m
1 ejercicio de práctica
Quiz 120m
Semana
2
1 hora para completar

Implement and Operate Endpoint Device Security

3 videos (Total 15 minutos), 3 lecturas, 1 cuestionario
3 videos
Endpoint Device Security: Trusted Platform Module (TPM)6m
Endpoint Device Security: BYOD Policy Considerations2m
3 lecturas
Endpoint Device Security: HIDS10m
Endpoint Device Security: Trusted Platform Module (TPM)10m
Endpoint Device Security: BYOD Policy Considerations10m
1 ejercicio de práctica
Quiz 210m
Semana
3
5 horas para completar

Operate and Configure Cloud Security

16 videos (Total 105 minutos), 16 lecturas, 1 cuestionario
16 videos
Cloud Security: Hybrid5m
Cloud Security: Virtualization7m
Cloud Security: Hypervisor4m
Cloud Security: Country-Specific Legal Considerations6m
Cloud Security: P&DP Laws6m
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8m
Cloud Security: Data Dispersion5m
Cloud Security: Threat to Storage Types9m
Cloud Security: Technologies to Address Threats4m
Cloud Security: DLP Architecture7m
Cloud Security: Review Activity6m
Cloud Security: Key Storage in the Cloud4m
Cloud Security: Common Approaches for Data Masking4m
Cloud Security: Data Retention Policies7m
Cloud Security: Disposal Options8m
16 lecturas
Cloud Security: Five Essential Characteristics of Clouds10m
Cloud Security: Hybrid10m
Cloud Security: Virtualization10m
Cloud Security: Hypervisor10m
Cloud Security: Country-Specific Legal Considerations10m
Cloud Security: P&DP Laws10m
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10m
Cloud Security: Data Dispersion10m
Cloud Security: Threat to Storage Types10m
Cloud Security: Technologies to Address Threats10m
Cloud Security: DLP Architecture10m
Cloud Security: Review Activity10m
Cloud Security: Key Storage in the Cloud10m
Cloud Security: Common Approaches for Data Masking10m
Cloud Security: Data Retention Policies10m
Cloud Security: Disposal Options10m
1 ejercicio de práctica
Quiz 320m
Semana
4
3 horas para completar

Secure Big Data Systems & Operate and Secure Virtual Environments

9 videos (Total 70 minutos), 9 lecturas, 1 cuestionario
9 videos
Secure Big Data Systems: Interpreting Big Data4m
Secure Big data Systems: Key Challenges5m
Operate and Secure Virtual Environments: SDN5m
Operate and Secure Virtual Environments: Virtual Appliances8m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks6m
Operate and Secure Virtual Environments: Network Security5m
Operate and Secure Virtual Environments: Virtual Machine Security16m
9 lecturas
Secure Big Data Systems: Big Data10m
Secure Big Data Systems: Interpreting Big Data10m
Secure Big data Systems: Key Challenges10m
Operate and Secure Virtual Environments: SDN10m
Operate and Secure Virtual Environments: Virtual Appliances10m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks10m
Operate and Secure Virtual Environments: Network Security10m
Operate and Secure Virtual Environments: Virtual Machine Security10m
1 ejercicio de práctica
Quiz 412m
4.7
11 revisionesChevron Right

Principales revisiones sobre Systems and Application Security

por DKMar 9th 2019

really worth attending this course, there is so much information available for security professionals. This course is adding weight to my skills and understanding of Cloud and Applications security.

por GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

Instructor

Avatar

(ISC)² Education & Training

Education & Training

Acerca de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Acerca de (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

  • Sí, puedes acceder a una vista preliminar del primer video y ver el programa antes de inscribirte. Debes comprar el curso para acceder a contenido que no está incluido en la vista preliminar

  • Si decides inscribirte en el curso antes de la fecha de inicio de la sesión, tendrás acceso a todos los videos y las lecturas de la lección para el curso. Podrás enviar tareas en cuanto comience la sesión.

  • Una vez que te inscribes y comienza la sesión, tendrás acceso a todos los videos y otros recursos, incluidos artículos de lectura y el foro de debate del curso. Podrás ver y enviar tareas de práctica y completar tareas con calificación obligatorias para obtener un título y un Certificado de curso

  • Si completas el curso de manera correcta, tu Certificado de curso electrónico se agregará a la página Logros. Desde allí, puedes imprimir tu Certificado de curso o agregarlo a tu perfil de LinkedIn

  • Este curso es uno de los pocos que se ofrecen en Coursera que está actualmente disponible solo para estudiantes que pagaron o que recibieron ayuda económica, si está disponible.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.