Warning: session_start(): Cannot start session when headers already sent in /home/busin148/public_html/includes/session.php on line 3

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 31

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 43

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 45

Warning: Cannot modify header information - headers already sent by (output started at /home/busin148/public_html/includes/session.php:1) in /home/busin148/public_html/includes/session.php on line 47
SSCP Certification Prep Course Online Classes- Business Computer Skills

SSCP Certification Prep Course - On-Demand Course

Learn SSCP at your own pace with our On-Demand training.

Course Details

The SSCP Certification Prep Course course is a 5-day course that is designed to validate student's ability to identify, evaluate, and prioritize potential threats, manage and mitigate threats through risk management concepts, assessment activities, and monitoring terminology, techniques and systems.

Gain skills to properly and promptly respond to a security incident or forensic investigation with incident handling processes and procedures such as Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP).

This?course?supports a certification that is a?DoD Approved 8570 Baseline Certification and meets?DoD 8140/8570 training requirements.

Business Computer Skills is independent of and not affiliated with (ISC)2.

Topics covered in the course include:

In-depth coverage of the seven domains required to pass the SSCP exam:

  1. Access Control
  2. Security Operations and Administration
  3. Risk Identification, Monitoring, and Analysis
  4. Incident Response and Recovery
  5. Cryptography
  6. Networks and Communications Security
  7. Systems and Application Security

Target Student:This course is designed for the following students:

  • Network security engineer
  • Security administrator
  • Security analyst
  • Systems engineer
  • Network administrator
  • Systems administrator
  • Security specialist
  • Systems/network analyst
  • Security consultant
  • Database administrator

Prerequisites: Students should possess the following experience before attending the course:

  • Systems administration experience
  • Familiarity with TCP/IP
  • An understanding of UNIX, Linux, and Windows
  • Intermediate-level knowledge of network security concepts

Course Outline

  • Section 1. Access Controls

    • Applying Logical Access Control in Terms of Subjects
    • Applying Logical Access Controls in Terms of Objects of Object Groups
    • Implementing Authentication Mechanisms
    • Operating Internetwork Trust Architectures
    • Administering Identify Management Life Cycle
    • Implementing Access Controls

    Section 2. Security Operations and Administration

    • Understanding and Comply with Code of Ethics
    • Understanding Security Concepts
    • Document and Operating Security Controls
    • Participating in Asset Management
    • Implementing and Assess Compliance with Controls
    • Participating in Change Management Duties
    • Participating in Security Awareness Training
    • Participating in Physical Security Operations

    Section 3. Risk Identification, Monitoring, and Analysis

    • Understanding the Risk Management Process
    • Performing Security Assessment Activities
    • Operating and Maintaining Monitoring Systems
    • Analyzing and Reporting Monitoring Results

    Section 4. Incident Response and Recovery

    • Participating in Incident Handling
    • Understanding and Supporting Forensics Investigations
    • Understanding and Supporting Business Continuity (BCP) and Disaster Recovery Plan (DRP)

    Section 5. Cryptography

    • Understanding and Applying Fundamental Concepts of Cryptography
    • Understanding Requirements for Cryptography
    • Operating and Implement Cryptographic Systems

    Section 6. Networks and Communications Security

    • Understanding Security Issues Related to Networks
    • Protecting Telecommunications Technologies
    • Controlling Network Access
    • Managing LAN-Based Security
    • Operating and Configuring Network-Based Security Devices
    • Implementing and Operating Wireless Technologies

    Section 7. Systems and Application Security

    • Identify and Analyzing Malicious Code and Activity
    • Implementing and Operating Endpoint Device Security
    • Operating and Configuring Cloud Security
    • Secure Big Data Systems
    • Operating and Securing Virtual Environments

 

  • Systems administration experience
  • Familiarity with TCP/IP
  • An understanding of UNIX, Linux, and Windows
  • Intermediate-level knowledge of network security concepts
" 1347,1460,,1769,Implementing Red Hat JBoss BRMS (JB465),0,0,RedHat,redhat-tb.png,,redhat,"

The Implementing Red Hat JBoss BRMS (JB465) course is a 5-day course that is designed to teach business analysts, rule developers, and Java enterprise application developers how to create, test, debug, and control business rules.

This course combines content from both Authoring Rules with Red Hat JBoss BRMS (JB461) and Developing Rules Applications with Red Hat JBoss BRMS (JB463).

Students will be provided detailed, hands-on exercises using Red Hat JBoss Developer Studio and Red Hat JBoss BRMS that are designed to let you create and manage business rules in a production environment. This course will also help prepare students for the Red Hat Certificate of Expertise in Business Rules Management Exam (EX465).

Note: Business Computer Skills and Red Hat do not guarantee that anyone who takes one or all of the courses in the Red Hat certification program will pass a Red Hat exam. On-the-job experience, in combination with high-quality training, is the best way to build skills and prepare for a Red Hat exam. The exam itself is a hands-on learning experience, and many of those who do not pass on the first try come away with knowledge of what they need to work on to pass the exam on a re-take.

Topics covered in the course include:

  • Authoring basic business rules in JBoss Developer Studio and Business Central
  • Integrating business rules with Java applications
  • Authoring advanced rules
  • Testing business rules
  • Authoring and testing rules in decision tables
  • Authoring rule templates and generating rules from decision tables
  • Authorin

     

-10%

SSCP Certification Prep Course

On-Demand Training Course

$ 795
180/day licence
  • 24/7 Access
  • Hands-On Practice Exercises
  • Free Repeats
  • Professional Instruction
Enroll Today