Companies Home Search Profile

SSCP Cert Prep: 7 Systems and Application Security

Focused View

Mike Chapple

4:07:23

90 View
  • 001. Securing systems and applications.mp4
    01:29
  • 002. What you need to know.mp4
    00:37
  • 003. Study resources.mp4
    01:45
  • 004. Comparing viruses, worms, and trojans.mp4
    05:07
  • 005. Malware payloads.mp4
    06:24
  • 006. Understanding backdoors and logic bombs.mp4
    04:04
  • 007. Looking at advanced malware.mp4
    03:01
  • 008. Understanding botnets.mp4
    02:55
  • 009. Code signing.mp4
    02:07
  • 010. Cybersecurity adversaries.mp4
    05:06
  • 011. Preventing insider threats.mp4
    02:45
  • 012. Attack vectors.mp4
    04:06
  • 013. Zero-days and the Advanced Persistent Threat.mp4
    03:25
  • 014. Social engineering.mp4
    05:36
  • 015. Impersonation attacks.mp4
    05:24
  • 016. Identity fraud and pretexting.mp4
    03:00
  • 017. Watering hole attacks.mp4
    02:56
  • 018. Physical social engineering.mp4
    02:33
  • 019. OWASP Top Ten.mp4
    05:37
  • 020. Application security.mp4
    04:18
  • 021. Preventing SQL injection.mp4
    04:22
  • 022. Understanding cross-site scripting.mp4
    03:14
  • 023. Request forgery.mp4
    04:06
  • 024. Defending against directory traversal.mp4
    03:21
  • 025. Overflow attacks.mp4
    03:20
  • 026. Explaining cookies and attachments.mp4
    04:23
  • 027. Session hijacking.mp4
    04:48
  • 028. Code execution attacks.mp4
    02:44
  • 029. Operating system security.mp4
    08:53
  • 030. Malware prevention.mp4
    04:15
  • 031. Application management.mp4
    05:59
  • 032. Host-based network security controls.mp4
    07:48
  • 033. File integrity monitoring.mp4
    04:53
  • 034. Data loss prevention.mp4
    06:08
  • 035. Endpoint monitoring.mp4
    02:54
  • 036. Data encryption.mp4
    05:29
  • 037. Hardware and firmware security.mp4
    04:37
  • 038. Peripheral security.mp4
    02:58
  • 039. Mobile connection methods.mp4
    04:09
  • 040. Mobile device security.mp4
    03:07
  • 041. Mobile device management.mp4
    07:16
  • 042. Mobile device tracking.mp4
    03:11
  • 043. Mobile application management.mp4
    03:58
  • 044. Mobile security enforcement.mp4
    03:56
  • 045. Bring Your Own Device (BYOD).mp4
    04:40
  • 046. Mobile deployment models.mp4
    02:59
  • 047. Industrial control systems.mp4
    05:09
  • 048. Internet of Things.mp4
    03:06
  • 049. Securing smart devices.mp4
    03:12
  • 050. Secure networking for smart devices.mp4
    02:23
  • 051. What is the cloud.mp4
    03:52
  • 052. Cloud activities and the Cloud Reference Architecture.mp4
    02:50
  • 053. Cloud deployment models.mp4
    02:42
  • 054. Cloud service categories.mp4
    06:06
  • 055. Virtualization.mp4
    04:44
  • 056. Cloud compute resources.mp4
    07:43
  • 057. Cloud storage.mp4
    02:59
  • 058. Containers.mp4
    01:54
  • 059. Security and privacy concerns in the cloud.mp4
    02:49
  • 060. Data sovereignty.mp4
    02:34
  • 061. Operational concerns in the cloud.mp4
    04:16
  • 062. Continuing your studies.mp4
    01:21
  • Description


    The Systems Security Certified Practitioner (SSCP) certification is an excellent entry point to a career in IT security. To help you prepare for the SSCP exam, instructor Mike Chapple has designed a series of courses covering each domain. In this installment, Mike covers the objectives of the seventh and final domain, Systems and Application Security. Join Mike to learn about malicious code and cyberattacks, as well as the endpoint device security controls used to protect against them. He also covers topics like the controls you can use to secure mobile devices, cloud computing environments, and virtualized environments.

    To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 62
    • duration 4:07:23
    • Release Date 2023/01/21

    Courses related to SSCP

    Subtitle
    Exam Review and Tips for for SSCP®
    Subtitle
    Exam Review and Tips for SSCP®