Companies Home Search Profile

Systems Security Certified Practitioner (2022)

Focused View

27:06:14

21 View
  • 1. Course Overview.mp4
    06:53
  • 2. What is the SSCP Toolbox.mp4
    02:01
  • 3. Who are you.mp4
    10:13
  • 4. What does your study plan look like.mp4
    09:43
  • 5. What is your timeline.mp4
    12:09
  • 6. Comply with Codes of Ethics.mp4
    09:08
  • 7. Understand Security Concepts.mp4
    27:19
  • 8. Identify & Implement Security Controls.mp4
    21:38
  • 9. Functional Security Controls.mp4
    20:36
  • 10. The Asset Management Lifecycle - First Half.mp4
    23:49
  • 11. The Asset Management Lifecycle - Second Half.mp4
    26:23
  • 12. The Change Management Lifecycle.mp4
    24:47
  • 13. Implementing Security Awareness & Training.mp4
    13:04
  • 14. Collaborate with Physical Security Operations.mp4
    19:05
  • 15. Security Operations & Administration - Key Points.mp4
    25:03
  • 16. SingleMulti-factor Authentication (MFA).mp4
    23:17
  • 17. Single Sign-On (SSO).mp4
    25:19
  • 18. Spotlight on Kerberos.mp4
    24:00
  • 19. Device Authentication.mp4
    17:02
  • 20. Federated Access.mp4
    12:51
  • 21. Support Internetwork Trust Architectures.mp4
    22:17
  • 22. The Identity Management Lifecycle.mp4
    16:06
  • 23. Understand and Apply Access Controls.mp4
    25:03
  • 24. Understand Security Models.mp4
    26:09
  • 25. Access Controls - Key Points.mp4
    20:12
  • 26. Risk Management Concepts - Vocabulary.mp4
    19:56
  • 27. Spotlight on Business Impact Analysis (BIA).mp4
    27:25
  • 28. Risk Management Concepts - Impact Assessments.mp4
    26:49
  • 29. Risk Management Concepts - Threat Modeling.mp4
    14:09
  • 30. Risk Management Concepts - Threat Intelligence.mp4
    20:43
  • 31. Risk Tolerance & Treatment.mp4
    11:41
  • 32. Risk Management Frameworks.mp4
    15:31
  • 33. Spotlight on the Risk Management Framework (RMF).mp4
    18:07
  • 34. Risk Visibility & Reporting.mp4
    21:40
  • 35. Legal & Regulatory Concerns.mp4
    23:31
  • 36. Spotlight on the GDPR.mp4
    25:03
  • 37. Security Assessment & Vulnerability Management.mp4
    27:28
  • 38. Spotlight on Risk Review.mp4
    22:18
  • 39. Operate & Monitor Security Platforms.mp4
    24:01
  • 40. Analyze Monitoring Results.mp4
    15:33
  • 41. Risk Identification, Monitoring & Analysis - Key Points.mp4
    26:35
  • 42. Support the Incident Lifecycle.mp4
    12:59
  • 43. Forensic Investigations - Legal.mp4
    18:59
  • 44. Forensic Investigations - Evidence Handling.mp4
    20:41
  • 45. BCP & DRP - Planning.mp4
    17:45
  • 46. BCP & DRP - Backup & Redundancy.mp4
    24:34
  • 47. BCP & DRP - Alternate Strategies.mp4
    21:54
  • 48. BCP & DRP - Testing & Drills.mp4
    12:38
  • 49. Incident Response & Recovery - Key Points.mp4
    22:28
  • 50. Reasons & Requirements for Cryptography.mp4
    25:31
  • 51. Cryptography Concepts - Hashing & Salting.mp4
    26:48
  • 52. Cryptography Concepts - Encryption.mp4
    26:09
  • 53. Cryptography Concepts - Non-repudiation.mp4
    24:45
  • 54. Spotlight on Secure Protocols.mp4
    26:08
  • 55. Spotlight on IPsec.mp4
    19:50
  • 56. Public Key Infrastructure (PKI) Systems.mp4
    26:36
  • 57. Cryptography Concepts - Cryptographic Attacks.mp4
    21:07
  • 58. Cryptography - Key Points.mp4
    24:41
  • 59. Spotlight on the OSI Model.mp4
    25:41
  • 60. Spotlight on Internet Protocol (IP) networking.mp4
    26:03
  • 61. Topologies, Relationships & Transmission Types.mp4
    27:45
  • 62. Software-Defined Networking (SDN).mp4
    21:42
  • 63. Network Attacks.mp4
    25:10
  • 64. Manage Network Access Controls.mp4
    22:47
  • 65. Manage Network Security.mp4
    27:07
  • 66. Network-based Security Devices.mp4
    20:04
  • 67. Secure Wireless Communications.mp4
    25:00
  • 68. Network & Communications Security - Key Points.mp4
    25:33
  • 69. Malicious Code & Activity.mp4
    26:12
  • 70. Implement & Operate Endpoint Device Security.mp4
    18:39
  • 71. Administer Mobile Device Management (MDM).mp4
    17:26
  • 72. Cloud Security - Basics.mp4
    25:48
  • 73. Cloud Security - Legal & Regulatory Concerns.mp4
    22:54
  • 74. Cloud Security - Data.mp4
    26:21
  • 75. Cloud Security - Third party & outsourcing.mp4
    23:53
  • 76. Secure Virtual Environments.mp4
    20:15
  • 77. Systems and Application Security - Key Points.mp4
    19:44
  • New Text Document.txt
  • SSCP2022-Notes.zip
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    We created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
    • language english
    • Training sessions 77
    • duration 27:06:14
    • Release Date 2024/04/29