MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

SSCP®: Security Operations and Administration

Course Summary

Part 2 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security ad


  • +

    Course Syllabus

    ● Cloud Computing
        ◦ Cloud Computing Types
        ◦ Public Cloud Computing
        ◦ Public Cloud Computing Security Concerns
        ◦ Private Cloud Computing
        ◦ Amazon S3
        ◦ Google Apps for Businesses
    ● Code of Ethics
        ◦ ISC2 Code of Ethics
        ◦ 10 Commandments of Computer Ethics
        ◦ Integrity
        ◦ Objectivity
        ◦ Professional Competence and Due Care
        ◦ Confidentiality
        ◦ White Hat Activities
        ◦ Grey Hat Activities
        ◦ Black Hat Activities
        ◦ Moral Conundrums
    ● Security Administration
        ◦ Introduction
        ◦ Data Classification
        ◦ Data Classification Criteria
        ◦ Data Classification Uses
        ◦ Data Classification Examples
        ◦ Asset Management
        ◦ Security Control Documentation
        ◦ Acceptable Use Policy
        ◦ Privacy Policy
        ◦ Data Loss Policy
        ◦ Other Policies
        ◦ Auditing
    ● Change Management
        ◦ Change Management Overview
        ◦ Change Management Components
        ◦ Change Management Goals
        ◦ Configuration Management
        ◦ Update Management
        ◦ Systems Development Life Cycle (SDLC)
    ● Security Evaluation and Assistance
        ◦ Product Evaluation
        ◦ Evaluation Structure
        ◦ Orange and Red Books
        ◦ Information Security Evaluation Criteria (ITSEC)
        ◦ ISO Common Criteria (CC)
        ◦ CC Protection Profiles (PPs) Examples
        ◦ CC Evaluation Assurance Levels (EALs)
        ◦ Security Camera Features and Terms
        ◦ International Protection Standards (Security Cams)
        ◦ Data Flow
        ◦ Accessing Data Flow Confidentiality
        ◦ Assessing Data Flow Integrity
        ◦ Assessing Data Flow Vulnerabilities
        ◦ Assessing Code Vulnerabilities
        ◦ SQL Injection Attacks
        ◦ Cross-site Scripting (XSS) Attacks
    ● Security Awareness
        ◦ Security Policy Training and Procedures
        ◦ Threat Awareness
        ◦ Physical Security
        ◦ Regulatory Compliance
        ◦ Personally Identifiable Information (PII)
        ◦ Social Networking
        ◦ Peer-to-Peer (P2P) File Sharing
        ◦ User Habits
    ● Information Communication Technology Infrastructure
        ◦ Typical Network Diagrams
        ◦ Routers
        ◦ Switches
        ◦ Firewalls
        ◦ Load Balancers
        ◦ VPN Gateway
        ◦ Intrusion Detection System (IDS)
        ◦ Security Discovery
        ◦ Port Scanners
        ◦ Port Scanning with ZenMap
        ◦ Protocol Analyzers/Sniffers
        ◦ Sniffing with Network Monitor
    ● Endpoint Device Security
        ◦ Introduction
        ◦ USB Flash Drives
        ◦ Smartphones and Tablets
        ◦ Bring Your Own Device (BYOD)
        ◦ Hardcopies
        ◦ Virtualization
        ◦ Thick Clients
        ◦ Thin Clients
    ● Data Management Policies
        ◦ What is DRM?
        ◦ DRM App Restrictions
        ◦ DRM Process
        ◦ DRM Pros and Cons
        ◦ DRM Examples
    ● Security Concepts
        ◦ Introduction
        ◦ Confidentiality
        ◦ Integrity
        ◦ Availability


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top