SSCP Domain : Security Operations and Administration Part 2

This course is included in our On-demand training solution.

Overview

Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course examines the secure storage of data as well as encryption, retention, sanitization and disposal of data. It teaches the learner the fundamentals of secure application development and demonstrates common web vulnerabilities. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.

Target Audience

Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year’s professional experience in one of the seven SSCP CBK Domains is required for certification.

Prerequisites

Expected Duration

90 min.

Course Objectives

Secure Storage

  • describe the key methods for maintaining confidential information security
  • Data Sanitization and Encryption Key Management

  • recognize appropriate techniques for restricting sensitive data access
  • identify key management policy considerations
  • Data Retention and Disposal

  • propose appropriate techniques for destroying magnetic media
  • identify key considerations for handling sensitive data
  • describe the functions of a data leakage prevention strategy
  • Secure Application Development

  • describe common methodologies for deploying software applications
  • Web Vulnerabilities

  • recognize the most commonly exploited vulnerabilities of web applications
  • describe how to implement guidelines for protecting against web vulnerabilities
  • Optimizing Application and Data Storage Security

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?