Companies Home Search Profile

(SSCP) Systems Security Certified Practitioner, 2nd Edition

Focused View

13:14:43

68 View
  • 001. Systems Security Certified Practitioner (SSCP) Introduction.mp4
    02:37
  • 001. Module introduction.mp4
    00:25
  • 001. Learning Object.mp4
    00:19
  • 002. 1.1 (ISC) Code of Ethics.mp4
    02:34
  • 003. 1.2 Understand Security Concepts.mp4
    12:06
  • 004. 1.3 Identify and Implement Security Controls.mp4
    08:49
  • 005. 1.4 Document and Maintain Functional Security Controls.mp4
    06:14
  • 001. Learning objectives.mp4
    00:18
  • 002. 2.2 Implementation and Operation Phases.mp4
    11:54
  • 003. 2.3 Archiving and Disposal Phases.mp4
    05:26
  • 004. 2.4 Change and Configuration Management.mp4
    13:11
  • 001. Learning objectives.mp4
    00:16
  • 002. 3.1 Security Training During Onboarding.mp4
    06:12
  • 003. 3.2 Continual Security Awareness.mp4
    13:23
  • 004. 3.3 Security Education for the Enterprise.mp4
    08:44
  • 001. Learning objectives.mp4
    00:23
  • 002. 4.1 Defense-in-Depth.mp4
    05:54
  • 003. 4.2 Campus Physical Security.mp4
    14:49
  • 004. 4.3 Facility Physical Security.mp4
    13:23
  • 005. 4.4 Operational Physical Security.mp4
    11:11
  • 001. Module introduction.mp4
    00:23
  • 001. Learning objectives.mp4
    00:17
  • 002. 5.1 The CIAN Model.mp4
    03:31
  • 003. 5.2 Data Sensitivity Cases.mp4
    07:19
  • 004. 5.3 Regulatory Use Cases.mp4
    07:15
  • 001. Learning objectives.mp4
    00:19
  • 002. 6.1 Cryptographic Hashing and HMACs.mp4
    12:36
  • 003. 6.2 Salt and Pepper.mp4
    05:51
  • 004. 6.3 Symmetric vs. Asymmetric Cryptosystems.mp4
    18:03
  • 005. 6.4 Digital Signatures.mp4
    08:43
  • 006. 6.5 Strength of Encryption Algorithms and Keys.mp4
    06:38
  • 007. 6.6 Cryptographic Attacks and Cryptanalysis.mp4
    05:49
  • 001. Learning objectives.mp4
    00:24
  • 002. 7.1 Web of Trust.mp4
    05:22
  • 003. 7.2 Digital Certificates.mp4
    11:21
  • 004. 7.3 Internet PKI.mp4
    08:19
  • 005. 7.4 Fundamental Key Management Concepts.mp4
    05:09
  • 001. Learning objectives.mp4
    00:22
  • 002. 8.1 Services and Protocols.mp4
    16:19
  • 003. 8.2 Common Use Cases.mp4
    02:45
  • 004. 8.3 Limitations and Vulnerabilities.mp4
    07:18
  • 001. Module introduction.mp4
    00:36
  • 001. Learning objectives.mp4
    00:24
  • 002. 9.1 SingleMulti-factor Authentication (MFA).mp4
    09:15
  • 003. 9.2 Single Sign-on (SSO) and Federated Access.mp4
    05:25
  • 004. 9.3 Device Authentication.mp4
    06:02
  • 001. Learning objectives.mp4
    00:20
  • 002. 10.1 Trust Relationships.mp4
    08:02
  • 003. 10.2 Internet, Intranet, and Extranet.mp4
    04:53
  • 004. 10.3 Third-party Connections.mp4
    07:58
  • 001. Learning objectives.mp4
    00:22
  • 002. 11.1 Authorization and Proofing.mp4
    05:33
  • 003. 11.2 Provisioning and De-Provisioning.mp4
    05:18
  • 004. 11.3 Maintenance and Entitlement.mp4
    04:10
  • 005. 11.4 Identity and Access Management (IAM) Systems.mp4
    05:17
  • 001. Learning objectives.mp4
    00:24
  • 002. 12.1 Mandatory Access Controls (MAC).mp4
    11:39
  • 003. 12.2 Discretionary Access Controls.mp4
    03:43
  • 004. 12.3 Role-Based Access Controls (RBAC).mp4
    02:55
  • 005. 12.4 Rule-Based Access Controls (ACLs).mp4
    03:29
  • 001. Module introduction.mp4
    00:22
  • 001. Learning objectives.mp4
    00:21
  • 002. 13.1 Risk Management Concepts and Terminology.mp4
    09:26
  • 003. 13.2 Risk Treatment and Tolerance.mp4
    09:14
  • 004. 13.3 Qualitative vs. Quantitative Risk Analysis.mp4
    09:36
  • 005. 13.4 Risk Management Frameworks.mp4
    04:30
  • 006. 13.5 Regulatory and Legal Concerns.mp4
    04:05
  • 001. Learning objectives.mp4
    00:21
  • 002. 14.1 Vulnerability Management Lifecycle.mp4
    06:37
  • 003. 14.2 Vulnerability Assessment Tools and Methods.mp4
    04:14
  • 004. 14.3 Security Testing and Risk Review.mp4
    11:30
  • 001. Learning objectives.mp4
    00:24
  • 002. 15.1 Source Systems.mp4
    06:57
  • 003. 15.2 Events of Interest.mp4
    04:21
  • 004. 15.3 Log Management.mp4
    06:07
  • 005. 15.4 Event Aggregation and Correlation.mp4
    05:15
  • 001. Learning objectives.mp4
    00:28
  • 002. 16.1 Security Baselines and Anomalies.mp4
    06:58
  • 003. 16.2 Visualizations, Metrics, and Trends.mp4
    07:49
  • 004. 16.3 Document and Communicate Findings.mp4
    03:38
  • 001. Module introduction.mp4
    00:16
  • 001. Learning objectives.mp4
    00:20
  • 002. 17.1 OSI and TCPIP Reference Models.mp4
    08:09
  • 003. 17.2 Network Topologies and Relationships.mp4
    05:06
  • 004. 17.3 Commonly Used Ports and Protocols.mp4
    06:52
  • 005. 17.4 Transmission Media Types.mp4
    04:47
  • 006. 17.5 Software-Defined Networking (SDN).mp4
    04:32
  • 001. Learning objectives.mp4
    00:18
  • 002. 18.1 Spoofing and Flooding.mp4
    05:48
  • 003. 18.2 Denial of Service and Botnets.mp4
    08:49
  • 004. 18.3 MitM and Poisoning.mp4
    07:42
  • 005. 18.4 Wireless Attacks.mp4
    06:55
  • 001. Learning objectives.mp4
    00:25
  • 002. 19.1 RADIUS and TACACS+.mp4
    04:22
  • 003. 19.2 IEEE 802.1x PNAC.mp4
    03:02
  • 004. 19.3 Remote Access Security.mp4
    04:20
  • 005. 19.4 IPsec v4 and v6.mp4
    05:04
  • 001. Learning objectives.mp4
    00:26
  • 002. 20.1 Security Device Placement.mp4
    05:47
  • 003. 20.2 Zoning and Segmentation.mp4
    05:21
  • 004. 20.3 Secure Routers.mp4
    06:09
  • 005. 20.4 Secure Switches.mp4
    05:22
  • 001. Learning objectives.mp4
    00:23
  • 002. 21.1 Firewalls and Proxies.mp4
    06:59
  • 003. 21.2 IDS and IPS.mp4
    06:49
  • 004. 21.3 Traffic Shaping.mp4
    06:09
  • 001. Learning objectives.mp4
    00:24
  • 002. 22.1 Survey of Wireless Technologies.mp4
    11:06
  • 003. 22.2 Authentication and Encryption Protocols.mp4
    05:56
  • 004. 22.3 Internet of Things (IoT).mp4
    04:42
  • 001. Module introduction.mp4
    00:16
  • 001. Learning objectives.mp4
    00:29
  • 002. 23.1 Survey of Malware.mp4
    08:20
  • 003. 23.2 Malware Countermeasures.mp4
    06:47
  • 004. 23.3 Survey of Malicious Exploits and Activity.mp4
    03:46
  • 005. 23.4 Malware Activity Countermeasures.mp4
    04:55
  • 006. 23.5 Social Engineering and Countermeasures.mp4
    05:22
  • 001. Learning objectives.mp4
    00:28
  • 002. 24.1 HIPS and Host-based Firewalls.mp4
    04:48
  • 003. 24.2 Endpoint Encryption and TPM.mp4
    07:55
  • 004. 24.3 Secure Browsers.mp4
    03:21
  • 005. 24.4 Endpoint Detection and Response (EDR).mp4
    04:42
  • 001. Learning objectives.mp4
    00:21
  • 002. 25.1 MDM vs. MAM.mp4
    04:22
  • 003. 25.2 Provisioning Techniques.mp4
    04:11
  • 004. 25.3 Containerization and Encryption.mp4
    03:30
  • 005. 25.4 Mobile Application Management (MAM).mp4
    04:09
  • 001. Learning objectives.mp4
    00:23
  • 002. 26.1 Service and Deployment Models.mp4
    09:17
  • 003. 26.2 Legal and Regulatory Concerns.mp4
    05:03
  • 004. 26.3 Data Storage, Processing, and Transmission.mp4
    04:05
  • 005. 26.4 Third-party and Outsourcing Requirements.mp4
    06:13
  • 001. Learning objectives.mp4
    00:21
  • 002. 27.1 Types of Hypervisors.mp4
    05:42
  • 003. 27.2 Containers.mp4
    03:22
  • 004. 27.3 Virtual Appliance Continuity and Resilience.mp4
    05:06
  • 005. 27.4 Attacks and Countermeasures.mp4
    04:33
  • 001. Module introduction.mp4
    00:24
  • 001. Learning objectives.mp4
    00:22
  • 002. 28.1 Preparation.mp4
    08:45
  • 003. 28.2 Detection, Analysis, and Escalation.mp4
    07:10
  • 004. 28.3 Containment and Eradication.mp4
    04:26
  • 005. 28.4 Recovery and Lessons Learned.mp4
    04:18
  • 001. Learning objectives.mp4
    00:21
  • 002. 29.1 Legal and Ethical Principles.mp4
    09:49
  • 003. 29.2 Evidence Handling.mp4
    08:17
  • 004. 29.3 Reporting of Analysis.mp4
    05:11
  • 001. Learning objectives.mp4
    00:37
  • 002. 30.1 Business Impact Analysis (BIA).mp4
    05:11
  • 003. 30.2 Backup, Redundancy, and Restoration.mp4
    10:54
  • 004. 30.3 Disaster Recovery Planning (DRP).mp4
    05:35
  • 005. 30.4 Testing and Drills.mp4
    08:01
  • 001. Systems Security Certified Practitioner (SSCP) Summary.mp4
    01:06
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 153
    • duration 13:14:43
    • Release Date 2023/03/28

    Courses related to SSCP

    Subtitle
    Systems and Application Security for SSCP®
    Subtitle
    SSCP Online Training
    CBT Nuggets Bob Salmans
    Bob Salmans
    SSCP Online Training
    14:56:22
    English subtitles
    06/05/2024