About this Course

6,597 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 17 hours to complete
English

Instructor

Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Beginner Level
Approx. 17 hours to complete
English

Offered by

Placeholder

(ISC)²

Syllabus - What you will learn from this course

Week
1

Week 1

5 hours to complete

Identify and Analyze Malicious Code and Activity

5 hours to complete
18 videos (Total 109 min), 18 readings, 1 quiz
18 videos
Malicious Code and Activity: Key Concepts6m
Malicious Code and Activity: Malicious Code Countermeasures4m
Malicious Code and Activity: Software Exploitation Methods6m
Malicious Code and Activity: Software Exploitation Methods5m
Malicious Code and Activity: Code Signing5m
Malicious Code and Activity: Social Engineering6m
Malicious Code and Activity: Security Awareness Training6m
Malicious Code and Activity: Long File Extensions5m
Malicious Code and Activity: E-mail7m
Malicious Code and Activity: Countermeasures5m
Malicious Code and Activity: Examples of Spoofing5m
Malicious Code and Activity: Techniques5m
Malicious Code and Activity: Botnet-Led Exploits6m
Malicious Code and Activity: Malicious Web Activity6m
Malicious Code and Activity: Zero-Day Exploits4m
Malicious Code and Activity: Infected Factory Builds and Media4m
Malicious Code and Activity: Inspection of Processes7m
18 readings
Systems and Application Security10m
Malicious Code and Activity: Key Concepts10m
Malicious Code and Activity: Malicious Code Countermeasures10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Software Exploitation Methods10m
Malicious Code and Activity: Code Signing10m
Malicious Code and Activity: Social Engineering10m
Malicious Code and Activity: Security Awareness Training10m
Malicious Code and Activity: Long File Extensions10m
Malicious Code and Activity: E-mail10m
Malicious Code and Activity: Countermeasures10m
Malicious Code and Activity: Examples of Spoofing10m
Malicious Code and Activity: Techniques10m
Malicious Code and Activity: Botnet-Led Exploits10m
Malicious Code and Activity: Malicious Web Activity10m
Malicious Code and Activity: Zero-Day Exploits10m
Malicious Code and Activity: Infected Factory Builds and Media10m
Malicious Code and Activity: Inspection of Processes10m
1 practice exercise
Quiz 130m
Week
2

Week 2

1 hour to complete

Implement and Operate Endpoint Device Security

1 hour to complete
3 videos (Total 15 min), 3 readings, 1 quiz
3 videos
Endpoint Device Security: Trusted Platform Module (TPM)6m
Endpoint Device Security: BYOD Policy Considerations2m
3 readings
Endpoint Device Security: HIDS10m
Endpoint Device Security: Trusted Platform Module (TPM)10m
Endpoint Device Security: BYOD Policy Considerations10m
1 practice exercise
Quiz 230m
Week
3

Week 3

5 hours to complete

Operate and Configure Cloud Security

5 hours to complete
16 videos (Total 105 min), 16 readings, 1 quiz
16 videos
Cloud Security: Hybrid5m
Cloud Security: Virtualization7m
Cloud Security: Hypervisor4m
Cloud Security: Country-Specific Legal Considerations6m
Cloud Security: P&DP Laws6m
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8m
Cloud Security: Data Dispersion5m
Cloud Security: Threat to Storage Types9m
Cloud Security: Technologies to Address Threats4m
Cloud Security: DLP Architecture7m
Cloud Security: Review Activity6m
Cloud Security: Key Storage in the Cloud4m
Cloud Security: Common Approaches for Data Masking4m
Cloud Security: Data Retention Policies7m
Cloud Security: Disposal Options8m
16 readings
Cloud Security: Five Essential Characteristics of Clouds10m
Cloud Security: Hybrid10m
Cloud Security: Virtualization10m
Cloud Security: Hypervisor10m
Cloud Security: Country-Specific Legal Considerations10m
Cloud Security: P&DP Laws10m
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10m
Cloud Security: Data Dispersion10m
Cloud Security: Threat to Storage Types10m
Cloud Security: Technologies to Address Threats10m
Cloud Security: DLP Architecture10m
Cloud Security: Review Activity10m
Cloud Security: Key Storage in the Cloud10m
Cloud Security: Common Approaches for Data Masking10m
Cloud Security: Data Retention Policies10m
Cloud Security: Disposal Options10m
1 practice exercise
Quiz 330m
Week
4

Week 4

3 hours to complete

Secure Big Data Systems & Operate and Secure Virtual Environments

3 hours to complete
9 videos (Total 70 min), 9 readings, 1 quiz
9 videos
Secure Big Data Systems: Interpreting Big Data4m
Secure Big data Systems: Key Challenges5m
Operate and Secure Virtual Environments: SDN5m
Operate and Secure Virtual Environments: Virtual Appliances8m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks6m
Operate and Secure Virtual Environments: Network Security5m
Operate and Secure Virtual Environments: Virtual Machine Security16m
9 readings
Secure Big Data Systems: Big Data10m
Secure Big Data Systems: Interpreting Big Data10m
Secure Big data Systems: Key Challenges10m
Operate and Secure Virtual Environments: SDN10m
Operate and Secure Virtual Environments: Virtual Appliances10m
Operate and Secure Virtual Environments: DRS10m
Operate and Secure Virtual Environments: Common Attacks10m
Operate and Secure Virtual Environments: Network Security10m
Operate and Secure Virtual Environments: Virtual Machine Security10m
1 practice exercise
Quiz 430m

Reviews

TOP REVIEWS FROM SYSTEMS AND APPLICATION SECURITY

View all reviews

About the (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Frequently Asked Questions

More questions? Visit the Learner Help Center.