This class, Systems Security Certified Practitioner (SSCP®) credential offers information security tacticians, with implementation orientations, the opportunity to demonstrate their level of competence with the seven domains of the compendium of best practices for information security, the (ISC)² SSCP CBK®.
|Contact Hours:||48 hr Lecture 14 hr labs|
|Prerequisites:||Understanding of TCP/IP Protocols|
|Credits:||72 CPE / 3 CEU|
|Method of Delivery:||Residential (100% face-to-face) or Hybrid|
|Instructor:||Testing located at Pearson Vue Testing Center|
|Method of Evaluation:||95 % attendance 2. 100 % completion of Lab|
|Grading:||Pass = Attendance+ labs & quizzes Fail > 95% Attendance|
Sample Job Titles:
Chief Information Security Officer (CISO)
Common Control Provider
Cybersecurity Officer/Enterprise Security Officer
Facility Security Officer
Information Systems Security Manager (ISSM)
Information Technology (IT) Director
Principal Security Architect /Risk Executive
Security Domain Specialist
Senior Agency Information Security (SAIS) Officer
This 72 hour accelerated class is taught using face to face modality or hybrid modality. Class includes 72 hours of contact studies, labs, reading assignments and final exam - passing the final exam is a requirement for graduation.
The SSCP credential is ideal for those working toward or who have already attained positions as Senior Network Security Engineers, Senior Security Systems Analysts or Senior Security Administrators.
- Students will be able to describe the DoD system certification and accreditation processes.
- Students will be able to define certification and accreditation.
The curriculum for the SSCP seminar is under continuous review, ensuring current information relevant to the seven CBK domains below. For additional details on the CBK, download a copy of the free SSCP Study Guide. Security Program Management - Oversees and manages information security program implementation within the organization or other area of responsibility. Manages strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources.
58 hrs lecture/ 14 hrs labs
Lesson Plan 1 4 hrs Lecture 2 hr Labs Access Control - Policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system.
Lesson Plan 2 4 hrs Lecture 2 hr Labs Administration - Identification of information assets and documentation of policies, standards, procedures and guidelines that ensure confidentiality, integrity and availability.
Lesson Plan 2 4 hrs Lecture 2 hr Labs Audit and Monitoring - Determining system implementation and access in accordance with defined IT criteria. Collecting information for identification of and response to security breaches or events.
Lesson Plan 3 4 hrs Lecture 2 hr Labs Risk, Response and Recovery - The review, analysis and implementation processes essential to the identification, measurement and control of loss associated with uncertain events.
4 hrs Lecture 2 hr Labs Cryptography - The protection of information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form.
Lesson Plan 4 4 hrs Lecture 1 hr Labs Data Communications - The network structure, transmission methods and techniques, transport formats and security measures used to operate both private and public communication networks.
Lesson Plan 5 4 hrs Lecture 1 hr Labs Malicious Code - Countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code. 3 hour exam
Grades -All students must ordinarily take all quizzes, labs, final exam and submit the class practical in order to be eligible for a Q/ISP, Q/IAP, Q/SSE, or Q/WP credential unless granted an exception in writing by the President. Know that Q/ISP classes draws quite the spectrum of students, including "those less comfortable," "those more comfortable," and those somewhere in between. However, what ultimately matters in this course is not so much where you end up relative to your classmates but where you end up relative to yourself in on Friday of class. The course is graded as a pass or fail solely on your attendance and participation. Those less comfortable and somewhere in between are not at a disadvantage vis-à-vis those more comfortable. Escalating labs help you prepare for real world scenarios. Each labs escalates upon itself, increasing in intensity, rising to the next level, while you’re mitigating the threat step by step.
Books - No books are required for this course. However, you may want to supplement your preparation for or review of some lectures with self-assigned readings relevant to those lectures' content from either of the books below.