MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

SSCP®: Malicious Code and Activity

Course Summary

Part 5 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security ad


  • +

    Course Syllabus

    ● Malicious Code
        ◦ Introduction
        ◦ Malware Infection Techniques
        ◦ Drive-bys
        ◦ Worms
        ◦ Viruses
        ◦ Media
        ◦ Types of Malware
        ◦ Adware
        ◦ Scareware
        ◦ Ransomware
        ◦ Rootkits and Bootkits
        ◦ Botnets
        ◦ Buying DDoS
    ● Malicious Code Countermeasures
        ◦ Training Users
        ◦ Be Nice!
        ◦ Operating System Architecture
        ◦ Application and Driver Whitelisting
        ◦ Operating System and App Hardening
        ◦ Least Privilege
        ◦ Walled Gardens
        ◦ Anti-malware
        ◦ Backup and Recovery
        ◦ Network Architecture
        ◦ Firewalls
        ◦ Honeypots
        ◦ Detecting Bots
    ● Malicious Activity
        ◦ Social Engineering
        ◦ Impersonation
        ◦ Tailgating/Piggybacking
        ◦ Dumpster Diving
        ◦ Shoulder Surfing
        ◦ Spam
        ◦ Phishing
        ◦ Denial-of-Service (DoS)
        ◦ Distributed Denial-of-Service (DDoS)
        ◦ Smurf
        ◦ Replay
        ◦ Pharming
        ◦ Modifying a HOSTS File
        ◦ Man-in-the-Middle
        ◦ Spoofing
        ◦ Spoofing Types
        ◦ Cross-site Scripting (XSS)
        ◦ Cross-site Request Forgery (CSRF)
        ◦ SQL Injection Attacks
        ◦ Social Network Attacks
        ◦ Advanced Persistent Threat (APT)
        ◦ Common APT Scenarios
        ◦ APT Process
    ● Malicious Activity Countermeasures
        ◦ Training
        ◦ Security Policies
        ◦ Honeypot
        ◦ Collusion
        ◦ Code Review
        ◦ Cloud Services
        ◦ Auditing
        ◦ Fear, Uncertainty, Doubt (FUD)
        ◦ Security Through Obscurity
    ● Getting Systems Security Certified Practitioner (SSCP) Endorsed
        ◦ Why Get SSCP Certified?
        ◦ Certification Requirements
        ◦ ISC2 Code of Ethics Canon
        ◦ Test Scoring
        ◦ Test Procedures
        ◦ Test Details
        ◦ Test Tips: Before the Test
        ◦ Test Tips: During the Test
    ● Maintaining the Certification and CPEs
        ◦ Continuing Professional Education (CPEs)
        ◦ Types of CPEs
        ◦ SSCP CPE Requirements
        ◦ Group A CPE Requirements (Sampling)
        ◦ Adding CPEs
        ◦ Annual Maintenance Fees (AMFs)

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top