Systems Security Certified Practitioner (SSCP) (online) | Cleveland State University Professional Development Center in Cleveland

Courses

Systems Security Certified Practitioner (SSCP) (online)

Course Description

Systems Security Certified Practitioner (SSCP) is a premier security certification offered by ISC(2), ideal for those wanting to begin or advance a career in computer networking or security. This program will prepare you for industry recognized certification and career in the information technology sector as a network administrator or security administrator.

You’ll learn the dynamics of data communications, including network security, telecommunications, remote access, firewalls, proxy servers, and wireless and cellular technologies. You’ll learn how to identify and mitigate malicious codes such as viruses, Trojans, logic bombs, social engineering, insider threats, data theft, DDoS, spoofing, Phishing, Pharming, and spam.

You'll also explore authentication and access control methods. You'll learn about AAA and trusts, and you'll become familiar with identity management and cloud computing concepts.

As you move through the program, you will learn skills that will prepare you for Risk Management. This includes risk assessment, incident handling, business continuity, and disaster recovery plans, and you’ll examine dynamic cryptography concepts like PKI, certificates, and secure protocols.

This program will teach you ethical responsibilities of a network administrator or a security administrator, as well as the vast range of administrative duties involved with the career track. You’ll learn about change management, security evaluation, topics of awareness, device security, data management policies, and analysis and system monitoring.

Course Objectives

  • Authentication, identity management, and network trusts
  • Cloud computing security concepts, as well as network data security
  • Wireless security and cellular technologies
  • Malware identification and mitigation
  • Risk management, security assessment, and incident handling
  • Cryptography, encryption, PKI, and certificates
  • Security auditing and systems monitoring and analysis

Course Content

I.    Access Controls
            A.    Implement Authentication Mechanisms
            B.    Operate Internetwork Trust Architectures
            C.    Participate in Identity – Management Lifecycle
            D.    Implement Access Controls
II.    Security Operations and Administration
            A.    Understand and Comply with Code of Ethics
            B.    Understand Security Concepts
            C.    Document and Operate Security Controls
            D.    Participate in Asset Management
            E.    Implement and Assess Compliance with Controls
            F.    Participate in Change Management
            G.    Participate in Security Awareness and Training
            H.    Participate in Physical Security Operations
III.    Risk Identification, Monitoring, and Analysis
            A.    Understand The Risk Management Process
            B.    Perform Security Assessment Activities
            C.    Operate and Maintain Monitoring Systems
            D.    Analyze Monitoring Results
IV.    Incident Response and Recovery
            A.    Participate in Incident Handling
            B.    Understand and Support Forensic Investigations
            C.    Understand and Support Business Continuity Plan (BCP) And Disaster Recovery Plan (DRP)
V.    Cryptography  
     
            A.    Understand and Apply Fundamental Concepts and Cryptography
            B.    Understand Requirements for Cryptography
            C.    Understand and Support Secure Protocols
            D.    Operate and Implements Cryptographic Systems
VI.    Networks and Communication Security        
            A.    Understanding Security Issues Related to Networks
            B.    Protect Telecommunications Technologies
            C.    Control Network Access
            D.    Manage LAN-Based Security
            E.    Operate Configure Network-Based Security Devices
            F.    Implement and Operate Wireless Technologies
VII.    Systems and Application Security        
            A.    Identify and Analyze Malicious Code Activity
            B.    Implement and Operate in Point Device Security
            C.    Operate Configure Cloud Security
            D.    Secure Big Data Systems
            E.    Operating Secure Virtual Environments

Schedule

Online

When you register, you'll receive six (6) months to complete this program.

CEUs: 15.0

Fee: $1,595

Click here if you are interested in the course including the cost of the exam.