SSCP Domain: Monitoring and Analysis Part 2

Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year’s professional experience in one of the seven SSCP CBK Domains is required for certification.

Please contact us for information about prerequisites.

Expected Duration
120 minutes

Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. The course examines how to determine appropriate methods to protect hosts and networks within a business environment, how to test them for vulnerability and how to determine appropriate methods for carrying out a security penetration test. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.


Host and Network Testing

  • describe features of vulnerability testing software
  • select appropriate methods for protecting hosts
  • recognize how to implement advanced firewall testing
  • identify qualities of Internet perimeter systems
  • describe traffic types and conditions that a monitoring system in an IDS environment should cover
  • recognize the implications of war driving for network security
  • Penetration Testing

  • identify important considerations for planning a penetration test
  • describe reconnaissance information gathering techniques
  • describe common network mapping based information gathering techniques
  • describe how to exploit systems during a penetration test
  • describe how to perform a penetration test




    Multi-license discounts available for Annual and Monthly subscriptions.