SSCP: System Security Certified Practitioner (SSCP) Certification Video Training Course

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Preparing for (ISC) Certification Course
Lectures | Duration |
---|---|
1. Course Introduction | 2m |
2. (ISC)? Exam Overview | 2m |
3. Virtual Machine | 4m |
4. Lab Setup | 5m |
1. Course Introduction
2m
2. (ISC)? Exam Overview
2m
3. Virtual Machine
4m
4. Lab Setup
5m
Access Controls: Part 1
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. AAA and Authentication Factors | 2m |
3. Trust Relations and Architecture | 2m |
4. Subject-Based versus Object-Based | 2m |
5. MAC versus DAC | 2m |
6. Role–Based and Attribute–Based | 2m |
7. Management Lifecycle | 3m |
1. Section Objectives
1m
2. AAA and Authentication Factors
2m
3. Trust Relations and Architecture
2m
4. Subject-Based versus Object-Based
2m
5. MAC versus DAC
2m
6. Role–Based and Attribute–Based
2m
7. Management Lifecycle
3m
Access Controls: Part 2
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. IEEE 802.1X and Mac Security | 3m |
3. RADIUS and TACACS+ | 2m |
4. NAC and RAT | 2m |
5. IPSec and SSL/TLS VPN | 2m |
1. Section Objectives
1m
2. IEEE 802.1X and Mac Security
3m
3. RADIUS and TACACS+
2m
4. NAC and RAT
2m
5. IPSec and SSL/TLS VPN
2m
Security Operations and Administration
Lectures | Duration |
---|---|
1. Section Objective | 1m |
2. Asset Management and Change Management | 3m |
3. Configuration Management and Impact Management | 3m |
4. Security Training and Physical Security Operations | 3m |
5. AUP Policy Enforcement | 4m |
1. Section Objective
1m
2. Asset Management and Change Management
3m
3. Configuration Management and Impact Management
3m
4. Security Training and Physical Security Operations
3m
5. AUP Policy Enforcement
4m
Security Policy and Terminologies
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Threat, Risk, and Vulnerability | 17m |
3. Compromise Indicators | 3m |
4. Security Triad | 2m |
5. Written Security Policy | 3m |
6. Countermeasure and Mitigation | 3m |
1. Section Objectives
1m
2. Threat, Risk, and Vulnerability
17m
3. Compromise Indicators
3m
4. Security Triad
2m
5. Written Security Policy
3m
6. Countermeasure and Mitigation
3m
Risk Identification, Monitoring, and Analysis: Part 1
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Risk Management and Assessment | 7m |
3. Qualitative Risk Management | 2m |
4. Quantitative Risk Management | 2m |
5. Risk Visibility | 2m |
6. Reporting | 3m |
7. Auditing | 3m |
1. Section Objectives
1m
2. Risk Management and Assessment
7m
3. Qualitative Risk Management
2m
4. Quantitative Risk Management
2m
5. Risk Visibility
2m
6. Reporting
3m
7. Auditing
3m
Risk Identification, Monitoring, and Analysis: Part 2
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Regular Monitoring Importance | 4m |
3. Syslog | 2m |
4. SNMP and NetFlow | 2m |
5. Security Analytics, Metrices, and Trends | 2m |
6. Visualization | 2m |
7. Data Analysis | 2m |
8. Communicating Findings | 3m |
1. Section Objectives
1m
2. Regular Monitoring Importance
4m
3. Syslog
2m
4. SNMP and NetFlow
2m
5. Security Analytics, Metrices, and Trends
2m
6. Visualization
2m
7. Data Analysis
2m
8. Communicating Findings
3m
Incident Response and Recovery
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Incident Handling Lifecycle | 3m |
3. Forensics Investigations | 5m |
4. BCP and DRP | 2m |
5. Emergency Response | 1m |
6. Restoration | 2m |
7. Testing and Drills | 3m |
1. Section Objectives
1m
2. Incident Handling Lifecycle
3m
3. Forensics Investigations
5m
4. BCP and DRP
2m
5. Emergency Response
1m
6. Restoration
2m
7. Testing and Drills
3m
Overview of Cryptography
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Cryptography Basics | 5m |
3. Cipher and Types | 6m |
4. Identify Algorithm | 4m |
5. Encryption and Types | 7m |
6. Hashing | 6m |
1. Section Objectives
1m
2. Cryptography Basics
5m
3. Cipher and Types
6m
4. Identify Algorithm
4m
5. Encryption and Types
7m
6. Hashing
6m
Beyond the Basics of Cryptography
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Key Management | 5m |
3. Digital Signatures | 2m |
4. PKI and Components | 3m |
5. Expiration and Suspension | 2m |
6. Cryptography Attacks | 7m |
7. Mitigation | 3m |
1. Section Objectives
1m
2. Key Management
5m
3. Digital Signatures
2m
4. PKI and Components
3m
5. Expiration and Suspension
2m
6. Cryptography Attacks
7m
7. Mitigation
3m
Networks and Communications Security: Protocols and Services
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. OSI and TCP/IP Model | 1m |
3. Physical and Logical Topologies | 3m |
4. Layer 2-4 | 2m |
5. Layer 5-7 | 3m |
1. Section Objectives
1m
2. OSI and TCP/IP Model
1m
3. Physical and Logical Topologies
3m
4. Layer 2-4
2m
5. Layer 5-7
3m
Networks and Communications Security: Security Devices
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Routers | 2m |
3. Switches | 2m |
4. Firewall | 6m |
5. Proxies | 6m |
6. IDS and IPS | 4m |
7. VPNs | 7m |
1. Section Objectives
1m
2. Routers
2m
3. Switches
2m
4. Firewall
6m
5. Proxies
6m
6. IDS and IPS
4m
7. VPNs
7m
Networks and Communications Security: Device Protection
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Device Hardening | 9m |
3. Security Controls and Types | 2m |
4. Segmentation and Zoning | 2m |
5. Device Protection Best Practices | 3m |
1. Section Objectives
1m
2. Device Hardening
9m
3. Security Controls and Types
2m
4. Segmentation and Zoning
2m
5. Device Protection Best Practices
3m
System and Application Security: Identify Malware Threats
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Virus, Worm, and Trojan | 10m |
3. Ransomwares and Crypters | 3m |
4. Spyware, Backdoor, and Logic Bombs | 4m |
5. Identify Malicious Systems | 7m |
6. Attack Tools and Kits | 5m |
7. Malware Attack Countermeasure | 6m |
1. Section Objectives
1m
2. Virus, Worm, and Trojan
10m
3. Ransomwares and Crypters
3m
4. Spyware, Backdoor, and Logic Bombs
4m
5. Identify Malicious Systems
7m
6. Attack Tools and Kits
5m
7. Malware Attack Countermeasure
6m
System and Application Security: Secure Practices
Lectures | Duration |
---|---|
1. Section Objectives | 1m |
2. Application Security Basics | 16m |
3. Data Storage Security | 13m |
4. Third Party Outsourcing | 2m |
5. Virtualization Security | 1m |
6. Cloud Computing Security | 2m |
7. Big Data Security | 2m |
8. Legal Concerns | 2m |
1. Section Objectives
1m
2. Application Security Basics
16m
3. Data Storage Security
13m
4. Third Party Outsourcing
2m
5. Virtualization Security
1m
6. Cloud Computing Security
2m
7. Big Data Security
2m
8. Legal Concerns
2m