Companies Home Search Profile

SSCP Online Training

Focused View

Bob Salmans

14:56:22

406 View
  • 1.Introduction1C30C.mp4
    06:54
  • 2.Code of Ethics1C30C.mp4
    12:04
  • 3.The CIA Triad1C30C.mp4
    06:18
  • 4.Accountability Privacy and Non-repudiation1C30C.mp4
    11:15
  • 5.Least privilege & Segregation of Duties1C30C.mp4
    05:48
  • 6.Security Controls1C30C.mp4
    09:26
  • 7.Security Control Categories1C30C.mp4
    08:58
  • 8.Other Security Concepts1C30C.mp4
    02:31
  • 1.Introduction1C30C.mp4
    05:46
  • 2.Functions of Security Controls1C30C.mp4
    07:40
  • 3.Asset Management Lifecycle Pt11C30C.mp4
    06:09
  • 4.Asset Management Lifecycle Pt21C30C.mp4
    12:06
  • 5.Change Management Lifecycle1C30C.mp4
    07:31
  • 6.Implementing Security Awareness Training1C30C.mp4
    05:25
  • 7.Physical Security Operations1C30C.mp4
    02:50
  • 1.Introduction1C30C.mp4
    10:03
  • 2.Methods of Authentication1C30C.mp4
    04:12
  • 3.Biometric Factors1C30C.mp4
    06:30
  • 4.SSO and Device Authentication1C30C.mp4
    05:41
  • 5.Identity Federations1C30C.mp4
    02:30
  • 6.Trust Relationships1C30C.mp4
    05:27
  • 7.Zero Trust Architecture1C30C.mp4
    08:03
  • 8.Zero Trust In Action1C30C.mp4
    02:41
  • 1.Introduction1C30C.mp4
    06:48
  • 2.1C30C.mp4
    04:35
  • 3.Support Internetwork Trust Architectures1C30C.mp4
    09:29
  • 4.Third Party Connections1C30C.mp4
    06:26
  • 5.The Identity Management Lifecycle1C30C.mp4
    07:11
  • 6.Seeing the Identity Management Lifecycle in Action1C30C.mp4
    08:56
  • 1.Introduction1C30C.mp4
    09:54
  • 2.Risk Visibility and Reporting1C30C.mp4
    06:32
  • 3.Methods of Risk Analysis1C30C.mp4
    04:34
  • 4.Vulnerability Management and CVSS1C30C.mp4
    08:34
  • 5.Risk Management Concepts1C30C.mp4
    07:23
  • 6.Risk Management Frameworks1C30C.mp4
    06:49
  • 7.Risk Tolerance1C30C.mp4
    09:58
  • 8.Risk Treatment1C30C.mp4
    03:31
  • 1.Introduction1C30C.mp4
    10:39
  • 2.Legal and Regulatory Concerns1C30C.mp4
    05:25
  • 3.Security Assessment Activities 1C30C.mp4
    03:57
  • 4.Organizational Risk Reviews1C30C.mp4
    06:01
  • 5.Vulnerability Management Lifecycle1C30C.mp4
    07:50
  • 6.Source Systems and Events of Interest1C30C.mp4
    09:27
  • 7.Log Management and Event Analysis Systems1C30C.mp4
    05:41
  • 8.Analyze Monitoring Results1C30C.mp4
    03:35
  • 1.Introduction1C30C.mp4
    02:44
  • 2.The Incident Response Lifecycle1C30C.mp4
    01:32
  • 3.Security Event vs Security Incident1C30C.mp4
    06:59
  • 4.Phase 1 Preparation1C30C.mp4
    10:11
  • 5.Phase 2 Detection Analysis and Escalation 1C30C.mp4
    06:38
  • 6.Phase 3 Containment1C30C.mp4
    04:46
  • 7.Phase 3 Continued Eradication & Recovery1C30C.mp4
    03:33
  • 8.Phase 4 Lessons Learned1C30C.mp4
    08:02
  • 9.Validation1C30C.mp4
    04:16
  • 1.Introduction1C30C.mp4
    03:21
  • 2.Disaster Recovery and Business Continuity1C30C.mp4
    10:53
  • 3.BCDR Planning Process1C30C.mp4
    05:17
  • 4.Interim or Alternate Processing Strategies1C30C.mp4
    07:18
  • 5.Creating a Business Continuity Plan1C30C.mp4
    14:46
  • 6.Creating a Disaster Recovery Plan1C30C.mp4
    07:50
  • 7.Resiliency and Redundancy1C30C.mp4
    05:28
  • 8.Testing and Drills1C30C.mp4
    08:01
  • 1.Introduction1C30C.mp4
    04:40
  • 2.Legality and the Process1C30C.mp4
    03:31
  • 3.Ethical Principles1C30C.mp4
    07:47
  • 4.1C30C.mp4
    08:29
  • 5.Identifying Forensic Evidence 1C30C.mp4
    06:43
  • 6.Evidence Collection Part 11C30C.mp4
    04:10
  • 7.Evidence Collection Part 21C30C.mp4
    02:58
  • 8.Preserving Forensic Evidence1C30C.mp4
    03:00
  • 1.Introduction1C30C.mp4
    04:14
  • 2.What Does Cryptography Provide 1C30C.mp4
    05:36
  • 3.Data Sensitivity1C30C.mp4
    05:14
  • 4.1C30C.mp4
    05:31
  • 5.Regulatory and Industry Best Practice1C30C.mp4
    04:24
  • 6.Basics of Encryption1C30C.mp4
    06:55
  • 7.Encryption Cipher Types1C30C.mp4
    06:43
  • 8.Strength of Encryption Algorithms and Keys1C30C.mp4
    00:28
  • 1.Introduction1C30C.mp4
    06:47
  • 2.Symmetric and Asymmetric Encryption1C30C.mp4
    03:50
  • 3.Elliptic Curve Cryptography1C30C.mp4
    06:43
  • 4.Hashing and Salting1C30C.mp4
    09:41
  • 5.Non-Repudiation1C30C.mp4
    09:19
  • 6.Secure Protocols1C30C.mp4
    09:38
  • 7.1C30C.mp4
    02:39
  • 1.Introduction1C30C.mp4
    04:00
  • 2.The Open System Interconnection (OSI) Model1C30C.mp4
    08:03
  • 3.The TCP IP Model1C30C.mp4
    07:33
  • 4.Network Topologies and Relationships1C30C.mp4
    09:56
  • 5.Transmission Media Types1C30C.mp4
    07:20
  • 6.1C30C.mp4
    08:54
  • 7.Software Defined Networking (SDN)1C30C.mp4
    07:11
  • 8.1C30C.mp4
    03:36
  • 1.Introduction1C30C.mp4
    09:13
  • 2.Types of Network Attacks1C30C.mp4
    14:32
  • 3.Managing Network Access1C30C.mp4
    05:00
  • 4.Virtual Private Networks (VPNs)1C30C.mp4
    07:05
  • 5.Network Device Placement1C30C.mp4
    12:28
  • 6.Network Segmentation1C30C.mp4
    06:04
  • 7.Secure Device Management1C30C.mp4
    07:51
  • 1.Introduction1C30C.mp4
    10:57
  • 2.Firewalls1C30C.mp4
    02:26
  • 3.Web Application Firewall (WAF)1C30C.mp4
    11:52
  • 4.Intrusion Detection Prevention Systems 1C30C.mp4
    02:45
  • 5.LANs Routers and Switches1C30C.mp4
    04:41
  • 6.Traffic Shaping1C30C.mp4
    11:31
  • 7.Wireless Technologies1C30C.mp4
    02:27
  • 8.Internet of Things (IoT)1C30C.mp4
    05:54
  • 1.Introduction 1C30C.mp4
    06:49
  • 2.Malware and Countermeasures Part 11C30C.mp4
    08:04
  • 3.Malware and Countermeasures Part 21C30C.mp4
    09:21
  • 4.Malicious activities and Countermeasures Part 11C30C.mp4
    08:09
  • 5.Malicious activities and Countermeasures Part 21C30C.mp4
    06:39
  • 6.Endpoint Device Security Part 11C30C.mp4
    05:08
  • 7.Endpoint Device Security Part 21C30C.mp4
    07:30
  • 8.Endpoint Device Security In Action1C30C.mp4
    02:58
  • 1.Introduction1C30C.mp4
    13:11
  • 2.Cloud Deployment Models1C30C.mp4
    02:44
  • 3.Cloud Service Models1C30C.mp4
    13:53
  • 4.Virtualization1C30C.mp4
    02:16
  • 5.Containerization1C30C.mp4
    11:24
  • 6.Legal and Regulatory Concerns1C30C.mp4
    05:16
  • 7.Data Storage Processing and Transmission1C30C.mp4
    06:19
  • 8.Third Party Outsourcing Requirements1C30C.mp4
    04:55
  • 9.Shared Responsibility Model1C30C.mp4
    07:48
  • 1.Introduction1C30C.mp4
    04:50
  • 2.Mobile Device Management1C30C.mp4
    06:45
  • 3.MDM Models1C30C.mp4
    04:36
  • 4.MDM Containerization and MAM1C30C.mp4
    09:51
  • 5.Securing Virtualized Systems1C30C.mp4
    12:10
  • 6.Virtualization Components1C30C.mp4
    05:27
  • 7.Virtualization Vulnerabilities1C30C.mp4
    04:37
  • 8.Hypervisor Tour1C30C.mp4
    04:45
  • More details


    This intermediate (ISC)² SSCP training prepares learners to take the SSCP exam, which is the one required exam to earn the (ISC)² Systems Security Certified Practitioner (SSCP) certification.

    SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets. Marketed as the premier systems administrator security certification, the SSCP demonstrates your control of advanced technical skills and knowledge. It shows you know what’s needed to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)². Note that candidates must have a minimum of one year cumulative paid work experience in one or more of the seven domains of the SSCP CBK in order to earn professional certification, or two years for the associate badge.

    (ISC)² Systems Security Certified Practitioner (SSCP) was designed by (ISC)² to validate the intermediate skills expected of a security professional at least 1 year of experience, and prepare you for advancement in the healthcare industry.

    For anyone with security professionals on their team, this SSCP training can be used for SSCP exam prep, on-boarding new security professionals, or as part of a team training plan.

    SSCP: What You Need to Know

    This (ISC)² Systems Security Certified Practitioner (SSCP) training maps to the SSCP exam the SSCP CBK exam objectives, and covers topics such as:

    • Access controls
    • Security operations and administration
    • Risk identification, monitoring and analysis
    • Incident response and recovery
    • Cryptography
    • Network and communications security
    • Systems and application security

    Who Should Take SSCP Training?

    This SSCP training is considered practitioner-level (ISC)² training, which means it was designed for security professionals. This SSCP CBK skills course is designed for security professionals with three to five years of experience with security.

    New or aspiring security professionals. The SSCP’s prerequisites are probably out of reach for most security professionals just starting their career. But this training is open to anyone who wants to steer the trajectory of their career toward mastery of cryptography, access controls, systems and application security. With this security training, you can point your career in any direction you’d like and eventually earn your SSCP.

    Experienced security professionals. If you’ve been working as a security professional for a few years already, you’re familiar with the relationship that systems and application security concepts have to ensuring low redundancy and high scalability of security services. With this training, you’ll validate everything you’ve encountered in your years of experience, and learn anything you’ve missed out on your way to earning your SSCP.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 133
    • duration 14:56:22
    • English subtitles has
    • Release Date 2024/06/25