PDFs and exam guides are not so efficient, right? Prepare for your ISC examination with our training course. The SSCP course contains a complete batch of videos that will provide you with profound and thorough knowledge related to ISC certification exam. Pass the ISC SSCP test with flying colors.
Curriculum for SSCP Video Course
Name of Video | Time |
---|---|
![]() 1. Course Introduction |
2:00 |
![]() 2. (ISC)? Exam Overview |
2:00 |
![]() 3. Virtual Machine |
4:00 |
![]() 4. Lab Setup |
5:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. AAA and Authentication Factors |
2:00 |
![]() 3. Trust Relations and Architecture |
2:00 |
![]() 4. Subject-Based versus Object-Based |
2:00 |
![]() 5. MAC versus DAC |
2:00 |
![]() 6. Role–Based and Attribute–Based |
2:00 |
![]() 7. Management Lifecycle |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. IEEE 802.1X and Mac Security |
3:00 |
![]() 3. RADIUS and TACACS+ |
2:00 |
![]() 4. NAC and RAT |
2:00 |
![]() 5. IPSec and SSL/TLS VPN |
2:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objective |
1:00 |
![]() 2. Asset Management and Change Management |
3:00 |
![]() 3. Configuration Management and Impact Management |
3:00 |
![]() 4. Security Training and Physical Security Operations |
3:00 |
![]() 5. AUP Policy Enforcement |
4:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Threat, Risk, and Vulnerability |
17:00 |
![]() 3. Compromise Indicators |
3:00 |
![]() 4. Security Triad |
2:00 |
![]() 5. Written Security Policy |
3:00 |
![]() 6. Countermeasure and Mitigation |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Risk Management and Assessment |
7:00 |
![]() 3. Qualitative Risk Management |
2:00 |
![]() 4. Quantitative Risk Management |
2:00 |
![]() 5. Risk Visibility |
2:00 |
![]() 6. Reporting |
3:00 |
![]() 7. Auditing |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Regular Monitoring Importance |
4:00 |
![]() 3. Syslog |
2:00 |
![]() 4. SNMP and NetFlow |
2:00 |
![]() 5. Security Analytics, Metrices, and Trends |
2:00 |
![]() 6. Visualization |
2:00 |
![]() 7. Data Analysis |
2:00 |
![]() 8. Communicating Findings |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Incident Handling Lifecycle |
3:00 |
![]() 3. Forensics Investigations |
5:00 |
![]() 4. BCP and DRP |
2:00 |
![]() 5. Emergency Response |
1:00 |
![]() 6. Restoration |
2:00 |
![]() 7. Testing and Drills |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Cryptography Basics |
5:00 |
![]() 3. Cipher and Types |
6:00 |
![]() 4. Identify Algorithm |
4:00 |
![]() 5. Encryption and Types |
7:00 |
![]() 6. Hashing |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Key Management |
5:00 |
![]() 3. Digital Signatures |
2:00 |
![]() 4. PKI and Components |
3:00 |
![]() 5. Expiration and Suspension |
2:00 |
![]() 6. Cryptography Attacks |
7:00 |
![]() 7. Mitigation |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. OSI and TCP/IP Model |
1:00 |
![]() 3. Physical and Logical Topologies |
3:00 |
![]() 4. Layer 2-4 |
2:00 |
![]() 5. Layer 5-7 |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Routers |
2:00 |
![]() 3. Switches |
2:00 |
![]() 4. Firewall |
6:00 |
![]() 5. Proxies |
6:00 |
![]() 6. IDS and IPS |
4:00 |
![]() 7. VPNs |
7:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Device Hardening |
9:00 |
![]() 3. Security Controls and Types |
2:00 |
![]() 4. Segmentation and Zoning |
2:00 |
![]() 5. Device Protection Best Practices |
3:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Virus, Worm, and Trojan |
10:00 |
![]() 3. Ransomwares and Crypters |
3:00 |
![]() 4. Spyware, Backdoor, and Logic Bombs |
4:00 |
![]() 5. Identify Malicious Systems |
7:00 |
![]() 6. Attack Tools and Kits |
5:00 |
![]() 7. Malware Attack Countermeasure |
6:00 |
Name of Video | Time |
---|---|
![]() 1. Section Objectives |
1:00 |
![]() 2. Application Security Basics |
16:00 |
![]() 3. Data Storage Security |
13:00 |
![]() 4. Third Party Outsourcing |
2:00 |
![]() 5. Virtualization Security |
1:00 |
![]() 6. Cloud Computing Security |
2:00 |
![]() 7. Big Data Security |
2:00 |
![]() 8. Legal Concerns |
2:00 |
Get 100% Real Exam Questions, Accurate & Verified Answers As Seen in the Real Exam!
30 Days Free Updates, Instant Download!
SSCP Premium Bundle
Comments (0)
Please post your comments about SSCP Exams. Don't share your email address asking for SSCP braindumps or SSCP exam pdf files.
Purchase Individually
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
LIMITED OFFER: GET 30% Discount
This is ONE TIME OFFER
A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.
Download Free Demo of VCE Exam Simulator
Experience Avanset VCE Exam Simulator for yourself.
Simply submit your e-mail address below to get started with our interactive software demo of your free trial.