TOIT Training
(909) 252-7584
[email protected]
Search
Log in
Menu
Home
Library
IT Library
Developer Courses
User Cuorses
Plans & Pricing
Features
About Us
Contact Sales
Roadmap
Home
Courses
ISC2
Systems Security Certified Practitioner (SSCP)
Curriculum
6 Sections
6 Lessons
16 Hours
Expand all sections
Collapse all sections
01. Security Operations and Administration
1
1.1
01. Exam Overview & Professional Ethics
Exam Logistics: 3-hour duration, 125 questions
Understanding the (ISC)² Code of Ethics
Core Security Principles: Confidentiality, Integrity, and Availability (CIA)
02. Access Control & Security Basics
Implementing Least Privilege and Segregation of Duties
Technical Controls: Password requirements and lockout policies
Security Foundations: Authentication, Authorization, and Accounting
03. Physical & Administrative Security Controls
Physical Controls: Locks, Bollards, Fencing, Cameras, and Mantraps
Identification Systems: Badges and biometric access
Administrative Controls: Writing and enforcing Policies and Procedures
Human Security: Effective Employee Training and awareness programs
04. Control Categories & Compliance
Types of Security Controls: Deterrent, Corrective, and Preventative
Assessing Compliance: Periodic audits and policy reviews
Regulatory Alignment: Mapping controls to legal and industry standards
05. Asset & Change Management
Asset Management: Full lifecycle inventory and data retention requirements
Licensing Models: Managing software compliance and usage
The Change Management Lifecycle: Request, Review, Approval, and Implementation
Risk Mitigation: Managing updates and patches without service interruption
02. Access Controls
1
2.1
01. Authentication & Identity Methods
Types of Authentication: Something you know, have, are, or do
Multi-Factor Authentication (MFA): Implementation and security benefits
Single Sign-On (SSO): Streamlining user access across the enterprise
Biometrics and Hardware Tokens: Advanced authentication mechanisms
02. Access Control Models & Privileges
Defining Access: Granting and Revoking permissions (Allow vs. Deny)
Resource Permissions: Read, Write, and Execute (RWX) operations
Role-Based Access Control (RBAC): Mapping permissions to job functions
Rule-Based Access Control: Implementing dynamic, logic-driven access
03. Advanced Authorization Architectures
Mandatory Access Control (MAC): Sensitivity labels and Lattice-based security
Discretionary Access Control (DAC): Owner-defined resource permissions
Identity and Access Management (IAM) Systems: Centralizing user lifecycles
Authorization: Ensuring correct privilege levels after successful authentication
04. Trust Relationships & Flow
Flow of Trust: Understanding how identity is verified across domains
One-Way and Two-Way Trusts: Controlling directional resource access
Transitive vs. Non-Transitive Trusts: Managing inheritance in complex forests
Zero-Trust Architecture: The principle of “Never Trust, Always Verify”
05. Identity Management & Provisioning
User Provisioning: Creating accounts and assigning initial privileges
Deprovisioning: Securely revoking access during offboarding or role changes
Directory Services: Managing identity metadata and group memberships
Privileged Access Management (PAM): Securing administrative credentials
03. Risk Identification
1
3.1
01. Foundations of Risk Management
Core Definitions: Differentiating Risk, Risk Management, and Vulnerability
Calculating Risk Levels: Probability x Loss formulas
Asset Valuation: Determining the quantitative and qualitative value of assets
Key Risk Indicators (KRI): Monitoring metrics that signal potential threats
02. Risk Response & Enterprise Frameworks
Strategic Responses: Avoidance, Transference, Acceptance, and Mitigation
Enterprise Risk Management Frameworks (RMF): NIST 800-171, CMMC, and COBIT
Vulnerability Management Planning: Tool selection and assessment strategies
03. Identifying Vulnerabilities & Security Testing
Scanning & Discovery: Utilizing Vulnerability Scanners and identifying Network flaws
Security Assessment: Internal vs. External Penetration Testing
Hardening Standards: Implementing Security Technical Implementation Guides (STIGs)
Baseline Management: Establishing “Normal” to identify system anomalies
04. Incident Detection & Intrusion Analysis
Continuous Monitoring: Role of IDS/IPS in real-time threat detection
Indicators of Intrusion: Identifying missing files, changed permissions, and system crashes
Network Anomalies: Repeated login failures and unusual geographic activity
Metrics and Data Analysis: Leveraging logs and event triggers for forensics
05. Remediation, Reporting & Legal Constraints
Remediation Lifecycle: Planning, making changes, and deploying countermeasures
Post-Incident Activity: After-Action Reporting (AAR) and continuous improvement
Compliance & Privacy: Understanding laws and regulations governing data security
Legal Restraints: Navigating privacy laws during monitoring and investigations
04. Incident Response
1
4.1
01. & 02. Response Planning & First Steps
First Responder Roles: Immediate actions and point-of-contact lists
Documenting the Response Plan: Who to call and how to engage
Initial Assessment: Making contact and securing the perimeter
Evidence Preservation: Recording changes and maintaining Chain of Custody
Damage Containment: Disconnecting drives and isolating affected systems
03. Investigation & Recovery Operations
Severity Level Determination: Assessing the impact and scope of the breach
Forensic Investigation: Analyzing Logs, Network Diagnostics, and Host AV
Threat Elimination: Eradicating malware and neutralizing active threats
Data Restoration: Pulling verified data from secure backups
Documentation: Recording every action taken during the recovery phase
[Image of the Incident Response Lifecycle: Preparation, Detection, Containment, Eradication, and Recovery]
04. Post-Incident Activity & Training
After-Action Reporting (AAR): Calculating damage costs and timelines
Future Prevention: Documenting specific plans to mitigate repeat scenarios
Personnel Training: Providing targeted education to avoid future incidents
Continuous Improvement: Updating policies based on investigation findings
05. Backup Strategies & Methodology
How Backups Work: Understanding Archive Flags and data change tracking
Backup Types: Comparing Full, Incremental, and Differential methods
Scheduling Logic: Managing Daily, Weekly, and Monthly rotations
Storage Locations: Pros and cons of Cloud vs. Tape vs. Offsite storage
06. Business Continuity & Disaster Recovery
Site Redundancy: Implementing Hot, Cold, and Warm backup sites
High Availability (HA): Design patterns for resilient server architectures
Testing Frameworks: Conducting Recovery Drills and Emergency Response tests
BCP & DRP: Implementation, design, and continuous validation of plans
05. Cryptography
1
5.1
01. Compliance, Laws & Regulations
Protecting Sensitive Data: PII, PHI, and Intellectual Property
Healthcare & Finance: Navigating HIPAA and PCI-DSS requirements
International Standards: Implementing ISO security frameworks
Legal Obligations: Understanding data privacy and protection laws
02. Cryptography Fundamentals
How Encryption Works: Transforming plaintext into ciphertext
Symmetric vs. Asymmetric: Comparing shared keys and key pairs
Encryption States: Protecting data At Rest and In Transit
Encryption Strength: Understanding bit depth (128-bit vs. 256-bit)
Common Algorithms: RSA, AES, and their specific use cases
03. Public Key Infrastructure (PKI)
Core Components: Public keys, Private keys, and Certificate Authorities (CA)
Lifecycle Management: Key creation, storage, and secure destruction
Real-world Applications: What uses PKI for identity and trust
Secure Email & Files: Understanding PGP and GPG implementation
Blockchain Technology: Decentralized ledgers and cryptographic integrity
04. Data Integrity & Non-Repudiation
Hashing: Ensuring data integrity with MD5, SHA-256, and Salting
Digital Signatures: Verifying origin and ensuring Non-Repudiation
HMAC: Hash-based Message Authentication Codes for secure signaling
Digital Signature Encryption: How hashing and asymmetric keys work together
05. Security Protocols & Secure Communication
Network Security: IPsec for encrypted tunnel communications
Web & Session Security: The evolution from SSL to TLS protocols
Email Security: Implementing S/MIME and DKIM for message integrity
Protocol Implementation: Configuring secure gateways and service endpoints
06. Network and Communication Security
1
6.1
01. Network Components & Architecture
Core Infrastructure: Hosts, Servers, Routers, Switches, and Firewalls
Security Devices: Detailed functions of IDS and IPS
The OSI Model: 7 layers of communication and their specific functions
The TCP/IP Model: Comparing and contrasting with the OSI reference
Traffic Flow: Visualizing how data passes through the stack end-to-end
02. Protocols, Topologies & Routing
IP Stack Protocols: TCP, UDP, HTTP, DNS, and FTP
Email Standards: SMTP, IMAP, and POP3 security
Network Topologies: Mesh, Star, Bus, Ring, and Hybrid designs
Switching: VLANs, Trunking, and Switchport security
Routing & Access: Routing protocols, Load Balancing, and ACLs
AAA Services: Implementing RADIUS and TACACS+ for central management
03. VPN Technologies & Remote Access
VPN Benefits: Encapsulation, Tunneling, and secure remote work
Tunneling Protocols: L2TP, SSH, and PPTP
VPN Deployment: IPsec, SSL VPN, Site-to-Site, and Client-based software
The Connection Process: AAA, MFA, and secure tunnel establishment
04. Firewall Technologies & Network Defense
Firewall Policies: Rulesets, Whitelisting, and the “Implicit Deny” principle
Core Technologies: NAT, Packet Filtering, and Stateful Inspection
Network Segmentation: Designing and selecting appropriate DMZ architectures
Best Practices: Logging, Change Management, and Patching
Intrusion Detection/Prevention (IDPS): Signature matching and NIDS sensors
Deception & Proxy: Using Honeypots and Proxy Servers effectively
05. Wireless & Mobile Communication Security
Wireless Standards: APs, Repeaters, and IBSS (Ad Hoc) vs. BSS topologies
Encryption Protocols: Comparing WEP, WPA, WPA2, and EAP
Wireless Threats: Evil Twins, MAC Spoofing, and War Driving prevention
Radio Frequency Management: AP placement, signal strength, and interference
Short-Range Tech: Bluetooth and NFC security considerations
06. Systems & Application Hardening
Network Attacks: Mitigating DDoS, Malware, Rootkits, and Social Engineering
System Hardening: Baseline configurations, Imaging, and STIG compliance
Host Security: Windows/Linux best practices, Patch Management, and BIOS passwords
Endpoint Protection: Types of Anti-Virus, Host-based IDS, and Firewalls
Mobile Management: BYOD vs. COPE policies, Containerization, and DLP
07. Virtualization & Cloud Infrastructure
Virtualization Components: Hypervisors, VMs, Virtual Switches, and Shared Storage
Cloud Deployment Models: Public, Private, Hybrid, and Community
Cloud Service Models: IaaS, PaaS, and SaaS responsibilities
Cloud Governance: Data ownership, SLAs, and Data Portability
Security in the Cloud: Data transmission encryption and outsourcing destruction
This content is protected, please
login
and
enroll
in the course to view this content!