De Meest Voordelige Opleider van Nederland
Award winning E-Learning & Gecertificeerde Trainers
Upgrade uw cv met een certificaat van deelname van OEM
SpringestMicrosoft PartnerEC-CouncilOfferte Aanvragen
0

Tip: we verzorgen onze trainingen tegenwoordig ook VirtueelTip: we verzorgen onze trainingen tegenwoordig ook VirtueelKlik hier voor meer informatie

Tip: we verzorgen onze trainingen tegenwoordig ook VirtueelTip: we verzorgen onze trainingen tegenwoordig ook VirtueelKlik hier voor meer informatie

(ISC)² Systems Security Certified Practitioner SSCP OEM Certkit

14% sale
Product description
Systems Security Certified Practitioner SSCP E-Learning OEM Certkit This CertKit provides a comprehensive review of information security concepts and industry best practices, covering the 7 domains of the SSCP certification. This training course will help candidates review and refresh their information security knowledge and help identify areas th...

Systems Security Certified Practitioner SSCP E-Learning OEM Certkit

This CertKit provides a comprehensive review of information security concepts and industry best practices, covering the 7 domains of the SSCP certification. This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the SSCP exam
Prepare for the SSCP certification by acquiring the knowledge to implement, monitor, and administer
secure IT infrastructures.

Course content

System Security Certified Practitioner (SSCP 2018): Network Fundamentals

Course: 58 Minutes

Course Overview
Packet Switching Networks
The OSI Model
The TCP/IP Model
Network Topologies
Peer-to-Peer and Server-Based Networks
Network Infrastructure Devices
Network Transmission Media
Configure a Wireless Router
Network Load Balancing
Configure a Cloud-Based Load Balancer
Network Traffic Shaping
Capture and Examine Network Traffic
Exercise: Implement Network Solutions

System Security Certified Practitioner (SSCP 2018): Security Concepts

Course: 57 Minutes

Course Overview
ISC² Code of Ethics
The Law and Organizational Ethics
The CIA Triad
Confidentiality
Encrypt Data at Rest for Confidentiality
Integrity
Generate File Hashes for Integrity on Windows
Generate File Hashes for Integrity on Linux
Availability
Configure Windows Server 2016 Backup
Accountability
Enable File System Auditing on Windows Server 2016
Exercise: Explain and Implement CIA

System Security Certified Practitioner (SSCP 2018): Risk Management

Course: 41 Minutes

Course Overview
Risk Management Overview
Identifying and Prioritizing Risks
Threat Modeling
Business Impact Analysis
Managing Risks through Common Frameworks
Risk Acceptance
Risk Transfer and Recasting
Risk Mitigation
Risk Avoidance
Risk and Downtime Calculations
Exercise: Plan a Risk Management Strategy

System Security Certified Practitioner (SSCP 2018): Cryptography Primer

Course: 45 Minutes

Course Overview
Cryptography Overview
Hashing
Calculate a Hash for a File
Salting and Key Strength
Symmetric Encryption
Asymmetric Encryption
Elliptic Curve Cryptography
Cryptanalysis and Attacks
Digital Signatures
Secure Protocols
Implement IPSec Between Two Windows Hosts
Compare Telnet and SSH Packet Captures
Exercise: Apply Cryptographic for Protection

System Security Certified Practitioner (SSCP 2018): Public Key Infrastructure

Course: 57 Minutes

Course Overview
PKI Uses
PKI Hierarchy
Create a PKI Certificate Authority Using Windows
Create a PKI Certificate Authority Using Linux
Web of Trust
PKI Certificates
Customize a Certificate Template in Windows
Issue a PKI Certificate Using Windows
Issue a PKI Certificate Using Linux
Revoke a PKI Certificate Using Windows
Revoke a PKI Certificate Using Linux
Exercise: Implement PKI Security

System Security Certified Practitioner (SSCP 2018): Identity Management

Course: 56 Minutes

Course Overview
Identity and Access Management Overview
IAM Lifecycle
IAM Systems
Create a Microsoft Active Directory User and Group
Create a Cloud-Based IAM User and Group
Authentication Overview
Authentication Factors
Enable Multi-Factor Authentication
Test Multi-Factor Authentication
Enable CLI Authentication to the Cloud
Identify Federation
Single Sign-on
Exercise: Implement IAM

System Security Certified Practitioner (SSCP 2018): Security Controls

Course: 1 Hour, 3 Minutes

Course Overview
Security Control Overview
Deterrent Controls
Preventative Controls
Detective Controls
Corrective Controls
Compensating Controls
Technical Controls
Microsoft Network Policy Server
Physical Controls
Disable SSLv
Administrative Controls
Configure Microsoft Group Policy Security Settings
Exercise: Implement Security Controls

System Security Certified Practitioner (SSCP 2018): Controlling Resource Access

Course: 1 Hour, 1 Minute

Course Overview
Access Control Overview
Discretionary Access Control
Configure a Windows File System DACL
Mandatory Access Control
Linux umask Permissions
Role-Based Access Control
Assign Permissions to a Windows Group
Assign Permissions to a Linux Group
Attribute-Based Access Control
Configure Attribute-based Access Control in Windows
Object-Level Access Control
Control Network Access
Exercise: Implement Access Control Mechanisms

System Security Certified Practitioner (SSCP 2018): Asset & Change Management

Course: 1 Hour, 9 Minutes

Course Overview
Asset Lifecycle
Hardware Inventory
Software Inventory
Configure Hardware Inventory
Classify and Protect Data at Rest
Configure Data Classification
Trusted Platform Module
Mobile Device Management
Manage Mobile Devices
Change Management Overview
Centrally Deploy Software to Managed Devices
Centrally Deploy Updates to Managed Devices
Exercise: Centralizing Asset and Change Management

System Security Certified Practitioner (SSCP 2018): Network Security

Course: 1 Hour, 3 Minutes

Course Overview
Physical Network Design
Logical Network Design
Managing Devices Securely
Enable HTTPS For a Network Printer
Firewalls
Configure a Windows Firewall Rule
Configure a Linux Firewall Rule
Configure Cloud-Based Firewall Rules
Proxy Servers
Intrusion Detection and Prevention
Wireless Security
Configure Wi-Fi Security
Exercise: Implement Network Security Solutions

System Security Certified Practitioner (SSCP 2018): Malware & Endpoint Security

Course: 58 Minutes

Course Overview
Baselines and Suspicious Activity
Spyware and Adware
RootKits
Ransomware
Worms and Viruses
Social Engineering
Malware Scanning
Malware Policies
Whitelisting
Configure Windows Application Blacklists
Larger Scale Attacks
Lock Down USB Removable Media
Exercise: Configure Endpoint Security Settings

System Security Certified Practitioner (SSCP 2018): Securing Environments

Course: 59 Minutes

Course Overview
Virtualization Overview
Hypervisors
Install the Microsoft Hyper-V Hypervisor
Hypervisor and Virtual Machine Security
Configure a Hyper-V Virtual Machine
Lock Down iSCSI Network Storage with CHAP
Cloud Types
Cloud Service Models
Securing Data at Rest in the Cloud
Laws, Regulations, and the Cloud
Exercise: Protect Virtualized and Cloud Environments

System Security Certified Practitioner (SSCP 2018): Security Assessments

Course: 1 Hour, 2 Minutes

Course Overview
Security Assessment Overview
Vulnerability Assessments
Conduct a Network Scan Using Windows
Conduct a Network Scan Using Linux
Penetration Testing
Monitoring and Analysis Overview
Using Windows Performance Monitor
Monitoring Resource Usage in Linux
Logging
Windows Log Filtering
Linux Log Forwarding
SCADA and ICS
SIEM
Exercise: Configure and Use Monitoring Solutions2

System Security Certified Practitioner (SSCP 2018): Digital Forensics

Course: 48 Minutes

Course Overview
Digital Forensics Overview
Evidence Gathering
Chain of Custody
Data Recovery
Web Browser Data
Hard Drive Scrubbing
VPNs and Proxy Anonymizers
IP Address Tracking
View Hidden Data
Memory Forensics
Create a Raw Image of a Hard Disk Drive
Exercise: Gather Digital Evidence3 MinutesNot Started

System Security Certified Practitioner (SSCP 2018): Business Continuity

Course: 53 Minutes

Course Overview
Planning for Failure
Business Continuity Plan
Alternate Sites
System and Data Backup
System and Data Restore
Create a Bare Metal Windows Server Backup
Redundancy
Configure Software RAID 1 in Windows
Configure Software RAID 5 in Windows
Configure Hardware RAID 
Incident Response Lifecycle
Containment
Exercise: Implement Business Continuity Measures

Product specifications

Delivery time
Within 1 working day
Online access
365 days
Lesson duration
14:10 hours
Study load
Variable because of practical assignments.

Reviews

0 / 5Based on 0 reviews

There are no reviews written yet about this product..

Create your own review

Eerder bekeken door jou

(ISC)² Systems Security Certified Practitioner SSCP OEM Certkit
(ISC)²Systems Security Certified Practitioner SSCP OEM Certkit

Systems Security Certified Practitioner SSCP E-Learning Certified Teachers Quizzes Online Mentor MeasureUp Test Exam Live Labs Tips Tricks Certificate.

€349,00€299,00 Excl. tax
Please accept cookies to help us improve this website Is this OK? YesNoMore on cookies »