Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

EDUTAINMENT COURSE:

Systems Security Certified Practitioner (SSCP) (2019)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

The Systems Security Certified Practitioner (SSCP) certification is one of the leading certifications from (ISC)2.  This is a certification for hands on practitioners with the responsibility of making sure IT security concerns are addressed in an enterprise environment and is designed for IT security professionals with one or more years of field experience who are seeking to advance their career by validating their knowledge and experience.  If IT security is your preferred career path,  then the SSCP is a great starting point for you.

Objectives
  • Networks and Telecommunications
     
  • Analysis and Monitoring
     
  • Security Operations and Administration
     
  • Malicious Code/Malware
Prerequisites
Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows.
Target Audience
  • Students who are interested to clear the (ICS)2 Systems Security Certified Practitioner (SCCP) Test.
  • Students appearing for advanced certifications such as CISSP can also choose to check their exam preparation.
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you will watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. WATCH THIS FIRST
1
Start
Overview
2
Start
Just The Basics
  1. ACCESS CONTROLS
3
Start
Control Access To Assets
4
Start
Manage Identification And Authentication
5
Start
Manage Identification And Authentication Pt.2
6
Start
Manage Identification And Authentication Pt.3
7
Start
Integrate Identity As A Third Party Service
8
Start
Authorization Mechanisms
9
Start
Authorization Mechanisms Part 2
10
Start
Authorization Mechanisms Part 3
11
Start
Authorization Mechanisms Part 4
12
Start
The Identity And Access Provisioning Lifecycle
13
Start
Access Control Attacks
14
Start
Access Controls - Key Points
  1. SECURITY OPERATIONS & ADMINISTRATION
15
Start
The ISC2 Code of Professional Ethics
16
Start
Identify and Classify Assets
17
Start
Asset Ownership And Privacy Protection
18
Start
Establish Asset Handling Requirements
19
Start
Secure Provisioning And Resource Protection
20
Start
Databases And Data Warehouses
21
Start
Databases And Data Warehouses Part 2
22
Start
Foundational Security Operations Concepts
23
Start
Determine Data Security Controls
24
Start
Assessment, Test And Audit Strategies
25
Start
Control Selection And System Requirments
26
Start
Control Selection And System Requirements Part 2
27
Start
Participate In Change Management
28
Start
Implement Recovery Strategies
29
Start
Implement Recovery Strategies Part 2
30
Start
Implement Recovery Strategies Part 3
31
Start
Implement Physical Security
32
Start
Implement Physical Security Part 2
33
Start
Personnel Safety and Security Concerns
34
Start
Patch And Vulnerability Management
35
Start
Security In The SDLC
36
Start
Security In The SDLC Part 2
37
Start
Security Controls In Development Environments
38
Start
Security Operations, Administration - Key Points
  1. RISK IDENTIFICATION MONITORING AND ANALYSIS
39
Start
Review Of Confidentiality, Integrity, Availability
40
Start
Evaluate And Apply Security Governance Principles
41
Start
Determine Compliance Requirements
42
Start
Information Security In A Global Context
43
Start
Risk Management Concepts
44
Start
Risk Management Concepts Part 2
45
Start
Risk Management Concepts Part 3
46
Start
Threat Modeling Concepts
47
Start
Risk In The Supply Chain
48
Start
Assessment And Testing
49
Start
Assessment And Testing Part 2
50
Start
Assessment And Testing Part 3
51
Start
Logging And Monitoring
52
Start
Logging And Monitoring Part 2
53
Start
Risk Identification, Monitoring, Analysis Key Pnts
  1. INCIDENT RESPONSE AND RECOVERY
54
Start
Supporting Forensic Investigations
55
Start
Supporting Forensic Investigations Part 2
56
Start
Conduct Incident Management
57
Start
Business Continuity and Disaster Recovery
58
Start
Business Continuity And Disaster Recovery Pt.2
59
Start
Incident Response and Recovery - Key Points
  1. CRYPTOGRAPHY
60
Start
Cryptography... Just What Is It Anyway
61
Start
Applied Cryptography
62
Start
Applied Cryptography Part 2
63
Start
Applied Cryptography Part 3
64
Start
Applied Cryptography Part 4
65
Start
Applied Cryptography Part 5
66
Start
Applied Cryptography Part 6
67
Start
Applied Cryptography Part 7
68
Start
Applied Cryptography Part 8
69
Start
Applied Cryptography Part 9
70
Start
Cryptography - Key Points
  1. NETWORK AND COMMUNICATIONS SECURITY
71
Start
Design Principles In Network Architecture
72
Start
Design Principles in Network Architecture Part 2
73
Start
Design Principles in Network Architecture Part 3
74
Start
Design Principles In Network Architecture Part 4
75
Start
Design Principles In Network Architecture Part 5
76
Start
Design Principles In Network Architecture Part 6
77
Start
Design Principles In Network Architecture Part 7
78
Start
Design Principles In Network Architecture Part 8
79
Start
Design Principles in Network Architecture Part 9
80
Start
Secure Network Components
81
Start
Secure Network Components Part 2
82
Start
Secure Network Components Part 3
83
Start
Implement Secure Communication Channels
84
Start
Implement Secure Communication Channels Pt.2
85
Start
Implement Secure Communication Channels Pt.3
86
Start
Implement Secure Communication Channels Pt.4
87
Start
Implement Secure Communication Channels Pt.5
88
Start
Network And Communication Security - Key Points
  1. SYSTEMS AND APPLICATION SECURITY
89
Start
Identify And Analyze Malicious Code
90
Start
Identify And Analyze Malicious Code Part 2
91
Start
Identify And Analyze Malicious Code Part 3
92
Start
Endpoint Device Security
93
Start
Endpoint Device Security Part 2
94
Start
Cloud Computing
95
Start
Operate And Secure Virtual Environments
96
Start
Systems And Application Security - Key Points
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 21:21:00 Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top