Each course includes a case study that will require students to put into practice the knowledge they have gained throughout each course. Successful completion of course projects will require the basic understanding of the topics covered and the ability to relate those topics to the real world. The objective of each project is to determine whether students have understood course concepts and are able to use them in a real world setting.
(ISC)² Systems Security Certified Practitioner (SSCP)
Advance Your IT Career with Cybersecurity Skills. Gain Flexibility with Self-Paced Learning.
Acerca de este certificado
Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability.
Sigue el orden sugerido o elige el tuyo.
Diseñado para ayudarte a practicar y aplicar las habilidades que aprendiste.
Resalta tus nuevas habilidades en tu currículum o LinkedIn.
Descripción general de los proyectos
- Certificado de principiante
- No prior experience required.
Access ControlsPróxima sesión: Jun 25
Acerca del CursoWelcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help man
Security Operations and AdministrationPróxima sesión: Jun 25
Acerca del CursoSecurity operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability
Identifying, Monitoring, and Analyzing Risk and Incident Response and RecoveryPróxima sesión: Jun 25
Acerca del CursoRisk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and eva
CryptographyPróxima sesión: Jun 25
Acerca del CursoWelcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity
Networks and Communications SecurityPróxima sesión: Jun 25
Acerca del CursoWelcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to mai
Systems and Application SecurityPróxima sesión: Jun 25
Acerca del CursoWelcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed
(ISC)² Education & Training
More questions? Visit the Learner Help Center.