Systems Security Certified Practitioner (2022)
Focused View
27:06:14
21 View
1. Course Overview.mp4
06:53
2. What is the SSCP Toolbox.mp4
02:01
3. Who are you.mp4
10:13
4. What does your study plan look like.mp4
09:43
5. What is your timeline.mp4
12:09
6. Comply with Codes of Ethics.mp4
09:08
7. Understand Security Concepts.mp4
27:19
8. Identify & Implement Security Controls.mp4
21:38
9. Functional Security Controls.mp4
20:36
10. The Asset Management Lifecycle - First Half.mp4
23:49
11. The Asset Management Lifecycle - Second Half.mp4
26:23
12. The Change Management Lifecycle.mp4
24:47
13. Implementing Security Awareness & Training.mp4
13:04
14. Collaborate with Physical Security Operations.mp4
19:05
15. Security Operations & Administration - Key Points.mp4
25:03
16. SingleMulti-factor Authentication (MFA).mp4
23:17
17. Single Sign-On (SSO).mp4
25:19
18. Spotlight on Kerberos.mp4
24:00
19. Device Authentication.mp4
17:02
20. Federated Access.mp4
12:51
21. Support Internetwork Trust Architectures.mp4
22:17
22. The Identity Management Lifecycle.mp4
16:06
23. Understand and Apply Access Controls.mp4
25:03
24. Understand Security Models.mp4
26:09
25. Access Controls - Key Points.mp4
20:12
26. Risk Management Concepts - Vocabulary.mp4
19:56
27. Spotlight on Business Impact Analysis (BIA).mp4
27:25
28. Risk Management Concepts - Impact Assessments.mp4
26:49
29. Risk Management Concepts - Threat Modeling.mp4
14:09
30. Risk Management Concepts - Threat Intelligence.mp4
20:43
31. Risk Tolerance & Treatment.mp4
11:41
32. Risk Management Frameworks.mp4
15:31
33. Spotlight on the Risk Management Framework (RMF).mp4
18:07
34. Risk Visibility & Reporting.mp4
21:40
35. Legal & Regulatory Concerns.mp4
23:31
36. Spotlight on the GDPR.mp4
25:03
37. Security Assessment & Vulnerability Management.mp4
27:28
38. Spotlight on Risk Review.mp4
22:18
39. Operate & Monitor Security Platforms.mp4
24:01
40. Analyze Monitoring Results.mp4
15:33
41. Risk Identification, Monitoring & Analysis - Key Points.mp4
26:35
42. Support the Incident Lifecycle.mp4
12:59
43. Forensic Investigations - Legal.mp4
18:59
44. Forensic Investigations - Evidence Handling.mp4
20:41
45. BCP & DRP - Planning.mp4
17:45
46. BCP & DRP - Backup & Redundancy.mp4
24:34
47. BCP & DRP - Alternate Strategies.mp4
21:54
48. BCP & DRP - Testing & Drills.mp4
12:38
49. Incident Response & Recovery - Key Points.mp4
22:28
50. Reasons & Requirements for Cryptography.mp4
25:31
51. Cryptography Concepts - Hashing & Salting.mp4
26:48
52. Cryptography Concepts - Encryption.mp4
26:09
53. Cryptography Concepts - Non-repudiation.mp4
24:45
54. Spotlight on Secure Protocols.mp4
26:08
55. Spotlight on IPsec.mp4
19:50
56. Public Key Infrastructure (PKI) Systems.mp4
26:36
57. Cryptography Concepts - Cryptographic Attacks.mp4
21:07
58. Cryptography - Key Points.mp4
24:41
59. Spotlight on the OSI Model.mp4
25:41
60. Spotlight on Internet Protocol (IP) networking.mp4
26:03
61. Topologies, Relationships & Transmission Types.mp4
27:45
62. Software-Defined Networking (SDN).mp4
21:42
63. Network Attacks.mp4
25:10
64. Manage Network Access Controls.mp4
22:47
65. Manage Network Security.mp4
27:07
66. Network-based Security Devices.mp4
20:04
67. Secure Wireless Communications.mp4
25:00
68. Network & Communications Security - Key Points.mp4
25:33
69. Malicious Code & Activity.mp4
26:12
70. Implement & Operate Endpoint Device Security.mp4
18:39
71. Administer Mobile Device Management (MDM).mp4
17:26
72. Cloud Security - Basics.mp4
25:48
73. Cloud Security - Legal & Regulatory Concerns.mp4
22:54
74. Cloud Security - Data.mp4
26:21
75. Cloud Security - Third party & outsourcing.mp4
23:53
76. Secure Virtual Environments.mp4
20:15
77. Systems and Application Security - Key Points.mp4
19:44
More details
User Reviews
Rating
average 0
Focused display
Category

ITProTV
View courses ITProTVWe created ITProTV [ITPro] because it is the IT training we wanted to have ourselves — engaging, conversational, affordable, and convenient.
- language english
- Training sessions 77
- duration 27:06:14
- Release Date 2024/04/29