SSCP Domain: Monitoring and Analysis Part 1

Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year’s professional experience in one of the seven SSCP CBK Domains is required for certification.

Please contact us for information about prerequisites.

Expected Duration
120 minutes

Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication, data integrity, transport formats and transmission methods. As an SSCP candidate, you are expected to show understanding of these aspects of secure communications in the digital age. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.


Security Policy and Auditing

  • recognize techniques for ensuring compliance to a security framework
  • match components of a security network to their descriptions
  • identify controls to help enforce a security policy
  • recognize how to monitor a secured system
  • identify the domains of security responsibility
  • describe common SNMP security issues and recommended security solutions
  • Security Concepts and Intrusion Concerns

  • identify the characteristics of active and passive monitoring systems
  • define the key terms used to discuss monitoring technologies
  • recognize when to implement network-based and host-based intrusion detection and prevention systems
  • identify the motivation behind a system attack
  • distinguish between intrusions and events in a security framework




    Multi-license discounts available for Annual and Monthly subscriptions.