Systems Security Certified Practitioner (SSCP®) Certification Training Course
Systems Security Certified Practitioner (SSCP®) Certification Training Course
The Systems Security Certified Practitioner (SSCP®) is an instructor-led, hands-on certification training course. This course covers and enables the candidate to acquire the basic principles and knowledge to gain experience in successfully managing security administration and related operations. This course also includes preparation for the Systems Security Certified Practitioner (SSCP®) certification.
Obtaining a globally recognised, high-level security administration and operations certification such as the SSCP is an excellent way to develop your career and better protect your organisation’s critical assets.
The SSCP certification demonstrates that you have the advanced technical skills and knowledge to implement, monitor and administer an IT infrastructure using best security practices, policies and procedures defined by (ISC)² cyber security experts.
- Candidates must have at least one year of cumulative paid work experience in one or more of the seven SSCP CBK® (Common Body of Knowledge) areas.
- A candidate who does not have the necessary experience to become an SSCP may become an (ISC)² Associate by successfully passing the SSCP examination. The (ISC)² Associate will then have two years to gain the required one year of experience.
Candidates can achieve this certification by passing the following SSCP exam(s).
Systems Security Certified Practitioner (SSCP®)
The certification exam can be registered and attempted within 3 months of course/module completion at Logitrain training centre on weekdays during normal business hours (excludes public holidays)
Logitrain course material for Systems Security Certified Practitioner (SSCP®) provided
- Security Operations and Administration
- Access Controls
- Risk Identification, Monitoring and Analysis
- Incident Response and Recovery
- Cryptography
- Network and Communications Security
- Systems and Application Security
- Network Security Engineer
- Systems Administrator
- Security Analyst
- Systems Engineer
- Security Consultant/Specialist
- Security Administrator
- Systems/Network Analyst
- Database Administrator
- Comply with codes of ethics
- Understand security concepts
- Identify and implement security controls
- Document and maintain functional security controls
- Participate in asset management lifecycle (hardware, software and data)
- Participate in change management lifecycle
- Participate in implementing security awareness and training (e.g., social engineering/ phishing)
- Collaborate with physical security operations (e.g., data center assessment, badging)
- Implement and maintain authentication methods
- Support internetwork trust architectures
- Participate in the identity management lifecycle
- Understand and apply access controls
- Understand the risk management process
- Understand legal and regulatory concerns (e.g., jurisdiction, limitations, privacy)
- Participate in security assessment and vulnerability management activities
- Operate and monitor security platforms (e.g., continuous monitoring)
- Analyse monitoring results
- Support incident lifecycle (e.g., National Institute of Standards and Technology (NIST), International Organisation for Standardisation (ISO))
- Understand and support forensic investigations
- Understand and support business continuity plan (BCP) and disaster recovery plan (DRP) activities
- Understand reasons and requirements for cryptography
- Apply cryptography concepts
- Understand and implement secure protocols
- Understand and support public key infrastructure (PKI) systems
- Understand and apply fundamental concepts of networking
- Understand network attacks (e.g., distributed denial of service (DDoS), man-in-the-middle (MITM), Domain Name System (DNS) poisoning) and countermeasures (e.g., content delivery networks (CDN))
- Manage network access controls
- Manage network security
- Operate and configure network-based security devices
- Secure wireless communications
- Identify and analyse malicious code and activity
- Implement and operate endpoint device security
- Administer Mobile Device Management (MDM)
- Understand and configure cloud security
- Operate and maintain secure virtual environments
Take the certification exam within 3 months of course / module completion
Take the official certification exam at Logitrain, a local VUE test centre or online
Course material in digital format is included for flexibility and ease of use
Mock test is included in the full-time courses to assist with your preparation
Our trainers are highly skilled with expertise and extensive hands-on experience
Relax, we will beat competitor’s advertised price. Our course has no extra costs
Location | Type | Duration | Price | Dates | |
---|---|---|---|---|---|
Location | Type | Duration | Price | Dates |
The supply of this course/package/program is governed by our terms and conditions. Please read them carefully before enrolling, as enrolment is conditional on acceptance of these terms and conditions. Proposed course dates are given, course runs subject to availability and minimum registrations.
Find out why we are the leading choice to help boost your career in Australia
“The trainer explained everything very well. Logitrain was very helpful for me in getting a better overall understanding of CCNA. I previously had studied it 2 years earlier but required revision.”
– Felice Amenta, Senior Service Management Officer at Optus, Rating: 4.8/5
“I recently followed the ITIL Foundation course at Logitrain. The training, materials and facilities were excellent and I would not hesitate to train with Logitrain again.”
– Rob Stockey, Senior Engineer at APAC, Rating: 4.8/5
“Had a blast! Great course, will be back soon to do another.”
– Justin Blackford, Systems Administrator at Gloria Jean’s Coffee, Rating: 4.8/5
“The trainer was very patient and gave everybody the opportunity to participate.”
– Tim Symonds, Solutions Architect at MSC Mobility Solutions, Rating: 4.8/5
Over 1000 organisations have relied on Logitrain to be their trusted training partner.
Don’t Wait. Please fill the form now.