(SSCP) Systems Security Certified Practitioner, 2nd Edition
Focused View
13:14:43
68 View
001. Systems Security Certified Practitioner (SSCP) Introduction.mp4
02:37
001. Module introduction.mp4
00:25
001. Learning Object.mp4
00:19
002. 1.1 (ISC) Code of Ethics.mp4
02:34
003. 1.2 Understand Security Concepts.mp4
12:06
004. 1.3 Identify and Implement Security Controls.mp4
08:49
005. 1.4 Document and Maintain Functional Security Controls.mp4
06:14
001. Learning objectives.mp4
00:18
002. 2.2 Implementation and Operation Phases.mp4
11:54
003. 2.3 Archiving and Disposal Phases.mp4
05:26
004. 2.4 Change and Configuration Management.mp4
13:11
001. Learning objectives.mp4
00:16
002. 3.1 Security Training During Onboarding.mp4
06:12
003. 3.2 Continual Security Awareness.mp4
13:23
004. 3.3 Security Education for the Enterprise.mp4
08:44
001. Learning objectives.mp4
00:23
002. 4.1 Defense-in-Depth.mp4
05:54
003. 4.2 Campus Physical Security.mp4
14:49
004. 4.3 Facility Physical Security.mp4
13:23
005. 4.4 Operational Physical Security.mp4
11:11
001. Module introduction.mp4
00:23
001. Learning objectives.mp4
00:17
002. 5.1 The CIAN Model.mp4
03:31
003. 5.2 Data Sensitivity Cases.mp4
07:19
004. 5.3 Regulatory Use Cases.mp4
07:15
001. Learning objectives.mp4
00:19
002. 6.1 Cryptographic Hashing and HMACs.mp4
12:36
003. 6.2 Salt and Pepper.mp4
05:51
004. 6.3 Symmetric vs. Asymmetric Cryptosystems.mp4
18:03
005. 6.4 Digital Signatures.mp4
08:43
006. 6.5 Strength of Encryption Algorithms and Keys.mp4
06:38
007. 6.6 Cryptographic Attacks and Cryptanalysis.mp4
05:49
001. Learning objectives.mp4
00:24
002. 7.1 Web of Trust.mp4
05:22
003. 7.2 Digital Certificates.mp4
11:21
004. 7.3 Internet PKI.mp4
08:19
005. 7.4 Fundamental Key Management Concepts.mp4
05:09
001. Learning objectives.mp4
00:22
002. 8.1 Services and Protocols.mp4
16:19
003. 8.2 Common Use Cases.mp4
02:45
004. 8.3 Limitations and Vulnerabilities.mp4
07:18
001. Module introduction.mp4
00:36
001. Learning objectives.mp4
00:24
002. 9.1 SingleMulti-factor Authentication (MFA).mp4
09:15
003. 9.2 Single Sign-on (SSO) and Federated Access.mp4
05:25
004. 9.3 Device Authentication.mp4
06:02
001. Learning objectives.mp4
00:20
002. 10.1 Trust Relationships.mp4
08:02
003. 10.2 Internet, Intranet, and Extranet.mp4
04:53
004. 10.3 Third-party Connections.mp4
07:58
001. Learning objectives.mp4
00:22
002. 11.1 Authorization and Proofing.mp4
05:33
003. 11.2 Provisioning and De-Provisioning.mp4
05:18
004. 11.3 Maintenance and Entitlement.mp4
04:10
005. 11.4 Identity and Access Management (IAM) Systems.mp4
05:17
001. Learning objectives.mp4
00:24
002. 12.1 Mandatory Access Controls (MAC).mp4
11:39
003. 12.2 Discretionary Access Controls.mp4
03:43
004. 12.3 Role-Based Access Controls (RBAC).mp4
02:55
005. 12.4 Rule-Based Access Controls (ACLs).mp4
03:29
001. Module introduction.mp4
00:22
001. Learning objectives.mp4
00:21
002. 13.1 Risk Management Concepts and Terminology.mp4
09:26
003. 13.2 Risk Treatment and Tolerance.mp4
09:14
004. 13.3 Qualitative vs. Quantitative Risk Analysis.mp4
09:36
005. 13.4 Risk Management Frameworks.mp4
04:30
006. 13.5 Regulatory and Legal Concerns.mp4
04:05
001. Learning objectives.mp4
00:21
002. 14.1 Vulnerability Management Lifecycle.mp4
06:37
003. 14.2 Vulnerability Assessment Tools and Methods.mp4
04:14
004. 14.3 Security Testing and Risk Review.mp4
11:30
001. Learning objectives.mp4
00:24
002. 15.1 Source Systems.mp4
06:57
003. 15.2 Events of Interest.mp4
04:21
004. 15.3 Log Management.mp4
06:07
005. 15.4 Event Aggregation and Correlation.mp4
05:15
001. Learning objectives.mp4
00:28
002. 16.1 Security Baselines and Anomalies.mp4
06:58
003. 16.2 Visualizations, Metrics, and Trends.mp4
07:49
004. 16.3 Document and Communicate Findings.mp4
03:38
001. Module introduction.mp4
00:16
001. Learning objectives.mp4
00:20
002. 17.1 OSI and TCPIP Reference Models.mp4
08:09
003. 17.2 Network Topologies and Relationships.mp4
05:06
004. 17.3 Commonly Used Ports and Protocols.mp4
06:52
005. 17.4 Transmission Media Types.mp4
04:47
006. 17.5 Software-Defined Networking (SDN).mp4
04:32
001. Learning objectives.mp4
00:18
002. 18.1 Spoofing and Flooding.mp4
05:48
003. 18.2 Denial of Service and Botnets.mp4
08:49
004. 18.3 MitM and Poisoning.mp4
07:42
005. 18.4 Wireless Attacks.mp4
06:55
001. Learning objectives.mp4
00:25
002. 19.1 RADIUS and TACACS+.mp4
04:22
003. 19.2 IEEE 802.1x PNAC.mp4
03:02
004. 19.3 Remote Access Security.mp4
04:20
005. 19.4 IPsec v4 and v6.mp4
05:04
001. Learning objectives.mp4
00:26
002. 20.1 Security Device Placement.mp4
05:47
003. 20.2 Zoning and Segmentation.mp4
05:21
004. 20.3 Secure Routers.mp4
06:09
005. 20.4 Secure Switches.mp4
05:22
001. Learning objectives.mp4
00:23
002. 21.1 Firewalls and Proxies.mp4
06:59
003. 21.2 IDS and IPS.mp4
06:49
004. 21.3 Traffic Shaping.mp4
06:09
001. Learning objectives.mp4
00:24
002. 22.1 Survey of Wireless Technologies.mp4
11:06
003. 22.2 Authentication and Encryption Protocols.mp4
05:56
004. 22.3 Internet of Things (IoT).mp4
04:42
001. Module introduction.mp4
00:16
001. Learning objectives.mp4
00:29
002. 23.1 Survey of Malware.mp4
08:20
003. 23.2 Malware Countermeasures.mp4
06:47
004. 23.3 Survey of Malicious Exploits and Activity.mp4
03:46
005. 23.4 Malware Activity Countermeasures.mp4
04:55
006. 23.5 Social Engineering and Countermeasures.mp4
05:22
001. Learning objectives.mp4
00:28
002. 24.1 HIPS and Host-based Firewalls.mp4
04:48
003. 24.2 Endpoint Encryption and TPM.mp4
07:55
004. 24.3 Secure Browsers.mp4
03:21
005. 24.4 Endpoint Detection and Response (EDR).mp4
04:42
001. Learning objectives.mp4
00:21
002. 25.1 MDM vs. MAM.mp4
04:22
003. 25.2 Provisioning Techniques.mp4
04:11
004. 25.3 Containerization and Encryption.mp4
03:30
005. 25.4 Mobile Application Management (MAM).mp4
04:09
001. Learning objectives.mp4
00:23
002. 26.1 Service and Deployment Models.mp4
09:17
003. 26.2 Legal and Regulatory Concerns.mp4
05:03
004. 26.3 Data Storage, Processing, and Transmission.mp4
04:05
005. 26.4 Third-party and Outsourcing Requirements.mp4
06:13
001. Learning objectives.mp4
00:21
002. 27.1 Types of Hypervisors.mp4
05:42
003. 27.2 Containers.mp4
03:22
004. 27.3 Virtual Appliance Continuity and Resilience.mp4
05:06
005. 27.4 Attacks and Countermeasures.mp4
04:33
001. Module introduction.mp4
00:24
001. Learning objectives.mp4
00:22
002. 28.1 Preparation.mp4
08:45
003. 28.2 Detection, Analysis, and Escalation.mp4
07:10
004. 28.3 Containment and Eradication.mp4
04:26
005. 28.4 Recovery and Lessons Learned.mp4
04:18
001. Learning objectives.mp4
00:21
002. 29.1 Legal and Ethical Principles.mp4
09:49
003. 29.2 Evidence Handling.mp4
08:17
004. 29.3 Reporting of Analysis.mp4
05:11
001. Learning objectives.mp4
00:37
002. 30.1 Business Impact Analysis (BIA).mp4
05:11
003. 30.2 Backup, Redundancy, and Restoration.mp4
10:54
004. 30.3 Disaster Recovery Planning (DRP).mp4
05:35
005. 30.4 Testing and Drills.mp4
08:01
001. Systems Security Certified Practitioner (SSCP) Summary.mp4
01:06
More details
User Reviews
Rating
average 0
Focused display
Category

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 153
- duration 13:14:43
- Release Date 2023/03/28