Systems Security Certified Practitioner (SSCP) (CS8521)

The (ISC)² Systems Security Certified Practitioner (SSCP) five-day course covers seven domains which they describe as 'the compendium of topics pertaining to an Information Systems Security Practitioner', the CBK (Common Body of Knowledge). The seven domains maps directly to the seven modules of this course listed below, it is referred to as a taxonomy or collection of past, present and future topics around Information Security.

The SSCP is aimed at security go-to-people, on the front line of a business dealing with technologies employed to protect Information. If you are responsible for implementing and maintaining countermeasures such as Firewalls, Intrusion Detection or Prevention, Anti-Virus solutions or Public Key Infrastructures and you want a certification to attest to your skills and professionalism within Information Security, this is it.

Attend our Cybersecurity courses at our training center in Belgrade, live online (virtual classroom) or on-site (private training).
Special pricing can be applied upon registration (multiple participants from your company, government sector, nonprofit organizations, etc.) – contact us to learn more.

Public class

Belgrade
Collecting enrollmentsCollecting enrollments
To be determined 
1150€
 
Serbian
Novi Sad
Collecting enrollmentsCollecting enrollments
To be determined 
1150€
 
Serbian
Virtual classroom
Collecting enrollmentsCollecting enrollments
To be determined 
1150€
 
Serbian
1150€
Training duration: 
5 days / 35 hours

Private class

On-site / Online
Minimum no. of participants: 3
5 days / 35 hours
Price on request
Serbian or English
Training plan: 

Access Controls

  • Access Control Concepts
  • Architecture Models
  • Identification, Authentication, Authorization, and Accountability
  • Remote Access Methods
  • Other Access Control Areas

Cryptography

  • The Basics
  • Symmetric Cryptography
  • General Cryptography
  • Specific Hashes
  • Specific Protocols
  • X.509

Malicious Code

  • Introduction to Windows Malcode Security Management
  • Malcode Naming Conventions and Types
  • Brief History of Malcode
  • Vectors of Infection
  • Payloads
  • Identifying Infections
  • Behavioral Analysis of Malcode
  • Malcode Mitigation

Monitoring and Analysis

  • Policy, Controls, and Enforcement
  • Audit
  • Monitoring

Networks and Telecommunications

  • Introduction to Networks and Telecommunications
  • Network Protocols and Security Characteristics
  • Data Communications and Network Infrastructure Components and Security Characteristics
  • Wireless Local Area Networking

Security Operations and Administration

  • Security Program Objectives: The C-I-A Triad
  • Code of Ethics
  • Security Best Practices
  • Designing a Security Architecture
  • Security Program Frameworks
  • Aligning Business, IT, and Security
  • Security Architecture and Models
  • Access Control Models
  • Identity and Access Management
  • Managing Privileged User Accounts
  • Outsourcing Security and Managed Security Service Providers
  • Business Partner Security Controls
  • Security Policies, Standards, Guidelines, and Procedures
  • Considerations for Safeguarding Confidentiality
  • Privacy and Monitoring
  • Information Life Cycle
  • Protecting Confidentiality and Information Classification
  • Information Handling Policy
  • Information Collection
  • Secure Information Storage
  • Secure Output
  • Record Retention and Disposal
  • Disclosure Controls: Data Leakage Prevention
  • Secure Application Development
  • Web Application Vulnerabilities and Secure Development Practices
  • Implementation and Release Management
  • Systems Assurance and Controls Validation
  • Certification and Accreditation
  • Security Assurance Rating: Common Criteria
  • Change Control
  • Configuration Management
  • Patch Management
  • Monitoring System Integrity
  • Endpoint Protection
  • Thin Client Implementations
  • Metrics
  • Security Awareness and Training

Risk, Response, and Recovery

  • Introduction to Risk Management
  • Incident Response
  • Forensics
  • Recovery
Exclusives: 
  • One year access to the class recording
  • Course material accessible in electronic format
  • Certificate of attendance