Acerca de este Curso

5,327 vistas recientes
Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 16 horas para completar
Inglés (English)

Instructor

Certificado para compartir
Obtén un certificado al finalizar
100 % en línea
Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles
Restablece las fechas límite en función de tus horarios.
Nivel principiante
Aprox. 16 horas para completar
Inglés (English)

ofrecido por

Placeholder

(ISC)²

Programa - Qué aprenderás en este curso

Semana
1

Semana 1

5 horas para completar

Identify and Analyze Malicious Code and Activity

5 horas para completar
18 videos (Total 109 minutos), 18 lecturas, 1 cuestionario
18 videos
Malicious Code and Activity: Key Concepts6m
Malicious Code and Activity: Malicious Code Countermeasures4m
Malicious Code and Activity: Software Exploitation Methods6m
Malicious Code and Activity: Software Exploitation Methods5m
Malicious Code and Activity: Code Signing5m
Malicious Code and Activity: Social Engineering6m
Malicious Code and Activity: Security Awareness Training6m
Malicious Code and Activity: Long File Extensions5m
Malicious Code and Activity: E-mail7m
Malicious Code and Activity: Countermeasures5m
Malicious Code and Activity: Examples of Spoofing5m
Malicious Code and Activity: Techniques5m
Malicious Code and Activity: Botnet-Led Exploits6m
Malicious Code and Activity: Malicious Web Activity6m
Malicious Code and Activity: Zero-Day Exploits4m
Malicious Code and Activity: Infected Factory Builds and Media4m
Malicious Code and Activity: Inspection of Processes7m
18 lecturas
Systems and Application Security10m
Malicious Code and Activity: Key Concepts10m
Malicious Code and Activity: Malicious Code Countermeasures10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Code Signing10m
Malicious Code and Activity: Social Engineering10m
Malicious Code and Activity: Security Awareness Training10m
Malicious Code and Activity: Long File Extensions10m
Malicious Code and Activity: E-mail10m
Malicious Code and Activity: Countermeasures10m
Malicious Code and Activity: Examples of Spoofing10m
Malicious Code and Activity: Techniques10m
Malicious Code and Activity: Botnet-Led Exploits10m
Malicious Code and Activity: Malicious Web Activity10m
Malicious Code and Activity: Zero-Day Exploits10m
Malicious Code and Activity: Infected Factory Builds and Media10m
Malicious Code and Activity: Inspection of Processes10m
1 ejercicio de práctica
Quiz 130m
Semana
2

Semana 2

1 hora para completar

Implement and Operate Endpoint Device Security

1 hora para completar
3 videos (Total 15 minutos), 3 lecturas, 1 cuestionario
3 videos
Endpoint Device Security: Trusted Platform Module (TPM)6m
Endpoint Device Security: BYOD Policy Considerations2m
3 lecturas
Endpoint Device Security: HIDS10m
Endpoint Device Security: Trusted Platform Module (TPM)10m
Endpoint Device Security: BYOD Policy Considerations10m
1 ejercicio de práctica
Quiz 230m
Semana
3

Semana 3

5 horas para completar

Operate and Configure Cloud Security

5 horas para completar
16 videos (Total 105 minutos), 16 lecturas, 1 cuestionario
16 videos
Cloud Security: Hybrid5m
Cloud Security: Virtualization7m
Cloud Security: Hypervisor4m
Cloud Security: Country-Specific Legal Considerations6m
Cloud Security: P&DP Laws6m
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8m
Cloud Security: Data Dispersion5m
Cloud Security: Threat to Storage Types9m
Cloud Security: Technologies to Address Threats4m
Cloud Security: DLP Architecture7m
Cloud Security: Review Activity6m
Cloud Security: Key Storage in the Cloud4m
Cloud Security: Common Approaches for Data Masking4m
Cloud Security: Data Retention Policies7m
Cloud Security: Disposal Options8m
16 lecturas
Cloud Security: Five Essential Characteristics of Clouds10m
Cloud Security: Hybrid10m
Cloud Security: Virtualization10m
Cloud Security: Hypervisor10m
Cloud Security: Country-Specific Legal Considerations10m
Cloud Security: P&DP Laws10m
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10m
Cloud Security: Data Dispersion10m
Cloud Security: Threat to Storage Types10m
Cloud Security: Technologies to Address Threats10m
Cloud Security: DLP Architecture10m
Cloud Security: Review Activity10m
Cloud Security: Key Storage in the Cloud10m
Cloud Security: Common Approaches for Data Masking10m
Cloud Security: Data Retention Policies10m
Cloud Security: Disposal Options10m
1 ejercicio de práctica
Quiz 330m
Semana
4

Semana 4

3 horas para completar

Secure Big Data Systems & Operate and Secure Virtual Environments

3 horas para completar
9 videos (Total 70 minutos), 9 lecturas, 1 cuestionario
9 videos
Secure Big Data Systems: Interpreting Big Data4m
Secure Big data Systems: Key Challenges5m
Operate and Secure Virtual Environments: SDN5m
Operate and Secure Virtual Environments: Virtual Appliances8m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks6m
Operate and Secure Virtual Environments: Network Security5m
Operate and Secure Virtual Environments: Virtual Machine Security16m
9 lecturas
Secure Big Data Systems: Big Data10m
Secure Big Data Systems: Interpreting Big Data10m
Secure Big data Systems: Key Challenges10m
Operate and Secure Virtual Environments: SDN10m
Operate and Secure Virtual Environments: Virtual Appliances10m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks10m
Operate and Secure Virtual Environments: Network Security10m
Operate and Secure Virtual Environments: Virtual Machine Security10m
1 ejercicio de práctica
Quiz 430m

Reseñas

Principales reseñas sobre SYSTEMS AND APPLICATION SECURITY

Ver todas las reseñas

Acerca de (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Preguntas Frecuentes

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.