Systems Security Certified Practitioner (SSCP)

Watch Systems Security Certified Practitioner (SSCP)

  • 2015
  • 1 Season

The Systems Security Certified Practitioner (SSCP) certification is one of the leading certifications from (ISC)2. It is designed for IT security professionals with one or more years of field experience who are seeking to advance their career by validating their knowledge and experience. If IT security is your preferred career path, then the SSCP is a great starting point for you.

Filter by Source
No sources available
Seasons
Malicious Code
15. Malicious Code
 
In this episode Adam and Don list and describe the many categories of malicious software. They also take a look at social engineering and wrap up the episode discussing the five steps in the hacking process.
Networking Part 3
14. Networking Part 3
 
In this episode Adam and Mike discuss several protocols and port numbers. They break down several network protocols, routing protocols and security protocols. They also cover wireless standards and wireless best practices.
Networking Part 2
13. Networking Part 2
 
In this episode Adam and Don examine wide area network technologies. They break down the most common technologies most commonly seen in the field and examine the differences between them. They wrap up the episode discussing security appliances like firewalls and NAC.
Networking
12. Networking
 
In this episode Adam and Mike take a look at basic network components. They discuss different network topologies such as LAN and WAN topologies. They discuss how we can implement these components and topologies in a secure fashion.
Cryptography Part 3
11. Cryptography Part 3
 
In this episode Adam and Mike cover the various components of a Public Key Infrastructure (PKI). They discuss several types of attacks against cryptography such as brute force attacks and attacks against symmetric block ciphers.
Cryptography Part 2
10. Cryptography Part 2
 
In this episode Adam and Don explain the difference between symmetric, asymmetric and hybrid encryption systems. They also describe and demonstrate the function of hashing algorithms.
Cryptography
9. Cryptography
 
In this episode Adam and Mike cover the basics of cryptography. They define some of the terminology necessary to understand cryptography.
Risk Response and Recovery Part 2
8. Risk Response and Recovery Part 2
 
In this episode Adam and Mike continue risk management by covering policies, incident handling, forensic and recovery alternatives. They conclude with a rundown of disaster recovery planning.
Risk Response and Recovery
7. Risk Response and Recovery
 
In this episode Adam and Mike discuss risk response and recovery. They define some of the basic concepts involved in risk management as well as cover controls, countermeasures and the basic risk management process.
Monitoring and Analysis Part 2
6. Monitoring and Analysis Part 2
 
In this episode Adam and Mike cover patch management, firewall generations. They also discuss goals of security testing as well as the five phases of penetration testing.
Monitoring and Analysis
5. Monitoring and Analysis
 
In this episode Adam and Don describe the various components of a security audit and highlight the target areas that a security professional should focus on while monitoring for security.
Security Ops and Administration Part 2
4. Security Ops and Administration Part 2
 
In this episode Adam and Don examine project management techniques that can be used to assist implementing security standards. They also take a look at the common criteria specification and some of the history behind modern security infrastructure.
Security Ops and Administration
3. Security Ops and Administration
 
In this episode Adam and Don take a look at the bureaucratic side of IT security. They discuss the differences policies, procedures, guidelines and baselines as well as recommend several third parties vendors that provide templates.
Access Controls
2. Access Controls
 
In this episode Adam and Don examine the various access controls that can be implemented by security professionals to increase confidentiality in a modern network.
Overview of SSCP
1. Overview of SSCP
 
In this episode Adam and Don introduce the viewers to the (ISC)2 SSCP certification. They discuss the requirements to becoming SSCP certified as well as the general topic areas covered by the certification.
Description
  • Premiere Date
    January 1, 2015