About this Course

15,808 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 23 hours to complete
English
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 23 hours to complete
English

Offered by

Placeholder

(ISC)²

Syllabus - What you will learn from this course

Week
1

Week 1

4 hours to complete

Understand the Risk Management Process

4 hours to complete
14 videos (Total 84 min), 14 readings, 1 quiz
14 videos
Risk Management Process: Creating a Risk Register7m
Risk Management Process: Risk Register Risk Management Steps8m
Risk Management Process: Key Terms5m
Risk Management Process: Key Terms6m
Risk Management Process: Risk Assessment3m
Risk Management Process: Preparation Steps7m
Risk Management Process: Step 2b4m
Risk Management Process: Quantitative Analysis8m
Risk Management Process: Qualitative Analysis5m
Risk Management Process: Step 33m
Risk Management Process: Risk Treatment5m
Risk Management Process: Risk Avoidance5m
Risk Management Process: Type of Audits7m
14 readings
Risk Management Process: Risk Visibility and Reporting10m
Risk Management Process: Creating a Risk Register10m
Risk Management Process: Risk Register Risk Management Steps10m
Risk Management Process: Key Terms10m
Risk Management Process: Key Terms10m
Risk Management Process: Risk Assessment10m
Risk Management Process: Preparation Steps10m
Risk Management Process: Step 2b10m
Risk Management Process: Quantitative Analysis10m
Risk Management Process: Qualitative Analysis10m
Risk Management Process: Step 310m
Risk Management Process: Risk Treatment10m
Risk Management Process: Risk Avoidance10m
Risk Management Process: Type of Audits10m
1 practice exercise
Quiz 130m
Week
2

Week 2

4 hours to complete

Perform Security Assessment Activities

4 hours to complete
11 videos (Total 73 min), 11 readings, 1 quiz
11 videos
Security Assessment Activities: Potential Problems6m
Assessment Activities: Security Gateway Types5m
Security Assessment Activities: Potential Security Issues6m
Security Assessment Activities: Penetration Testing6m
Security Assessment Activities: White Box / Hat8m
Security Assessment Activities: Reconnaissance4m
Security Assessment Activities: DNS Zone Transfers7m
Security Assessment Activities: Network Mapping Techniques9m
Security Assessment Activities: Firewalking6m
Security Assessment Activities: Active Penetration6m
11 readings
Security Assessment Activities: Participate in Security and Test Results10m
Security Assessment Activities: Potential Problems10m
Assessment Activities: Security Gateway Types10m
Security Assessment Activities: Potential Security Issues10m
Security Assessment Activities: Penetration Testing10m
Security Assessment Activities: White Box / Hat10m
Security Assessment Activities: Reconnaissance10m
Security Assessment Activities: DNS Zone Transfers10m
Security Assessment Activities: Network Mapping Techniques10m
Security Assessment Activities: Firewalking10m
Security Assessment Activities: Active Penetration10m
1 practice exercise
Quiz 230m
Week
3

Week 3

4 hours to complete

Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results

4 hours to complete
12 videos (Total 75 min), 12 readings, 1 quiz
12 videos
Monitoring Systems: IDS/IPS5m
Monitoring Systems: Implementation Issues for Monitoring6m
Maintain Monitoring Systems: Sample Questions6m
Maintain Monitoring Systems: Attacker Motivations7m
Maintain Monitoring Systems: Logging5m
Maintain Monitoring Systems: Log Anomalies5m
Maintain Monitoring Systems: Log Retention6m
Monitoring Systems: Compliance6m
Monitoring Results: Security Baseline6m
Monitoring Results: SSE-CMM6m
Monitoring Results: Potential Uses of Server Log Data6m
12 readings
Monitoring Systems: Monitoring Terminology10m
Monitoring Systems: IDS/IPS10m
Monitoring Systems: Implementation Issues for Monitoring10m
Maintain Monitoring Systems: Sample Questions10m
Maintain Monitoring Systems: Attacker Motivations10m
Maintain Monitoring Systems: Logging10m
Maintain Monitoring Systems: Log Anomalies10m
Maintain Monitoring Systems: Log Retention10m
Monitoring Systems: Compliance10m
Monitoring Results: Security Baseline10m
Monitoring Results: SSE-CMM10m
Monitoring Results: Potential Uses of Server Log Data10m
1 practice exercise
Quiz 330m
Week
4

Week 4

4 hours to complete

Incident Response and Recovery

4 hours to complete
13 videos (Total 77 min), 13 readings, 1 quiz
13 videos
Incident Handling: Preparation6m
Incident Handling: Training6m
Incident Handling: Communication Planning7m
Incident Handling: The Incident Response Team7m
Incident Handling: IDS and IPS4m
Incident Handling: Intrusion Detection Techniques7m
Incident Handling: Anti-Malware Systems2m
Incident Handling: Packet Sniffers6m
Incident Handling: SSL Decryption Devices4m
Incident Handling: Records6m
Incident Handling: Delaying Containment6m
Incident Handling: Containment, Eradication, and Recovery4m
13 readings
Incident Handling: Incident Response10m
Incident Handling: Preparation10m
Incident Handling: Training10m
Incident Handling: Communication Planning10m
Incident Handling: The Incident Response Team10m
Incident Handling: IDS and IPS10m
Incident Handling: Intrusion Detection Techniques10m
Incident Handling: Anti-Malware Systems10m
Incident Handling: Packet Sniffers10m
Incident Handling: SSL Decryption Devices10m
Incident Handling: Records10m
Incident Handling: Delaying Containment10m
Incident Handling: Containment, Eradication, and Recovery10m
1 practice exercise
Quiz 430m

Reviews

TOP REVIEWS FROM IDENTIFYING, MONITORING, AND ANALYZING RISK AND INCIDENT RESPONSE AND RECOVERY

View all reviews

About the (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Frequently Asked Questions

More questions? Visit the Learner Help Center.