Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
SSCP (Systems Security Certified Practitioner)
Introduction
SSCP (Systems Security Certified Practitioner): Introduction (3:40)
Module 1: Security Operations and Administration
Module Introduction (0:55)
Lesson 1: Overview of SSCP and the (ISC)2 Code of Ethics
Learning objectives (0:29)
1.1 Who Is (ISC)2? (1:51)
1.2 The Systems Security Certified Practitioner (SSCP) Certification (4:03)
1.3 SSCP Exam Overview (0:53)
1.4 (ISC)2 Code of Ethics (1:36)
Summary (0:22)
Lesson 2: Security Terminology and Policy
Learning objectives (0:32)
2.1 The Threat Landscape (2:58)
2.2 Risks and Vulnerabilities (10:28)
2.3 Threats and Threat Agents (3:11)
2.4 Motivations and Means (4:41)
2.5 Indicators of Compromise (IOCs) (3:15)
2.6 Countermeasures and Mitigation (4:28)
2.7 The Security Triad (4:16)
2.8 The Written Security Policy (5:36)
Summary (0:26)
Lesson 3: Security Administration
Learning objectives (0:27)
3.1 Asset Management (3:33)
3.2 Change Management (6:14)
3.3 Configuration Management (2:55)
3.4 Security Impact Assessment (5:01)
3.5 Security Awareness and Training (5:17)
3.6 Physical Security Operations (12:02)
3.7 AUP Policy Enforcement (5:41)
Summary (0:23)
Module 2: Risk Identification, Monitoring and Analysis
Module Introduction (0:51)
Lesson 4: Risk Management and Assessment
Learning objectives (0:27)
4.1 Risk Management Concepts (8:37)
4.2 Handling Risk (3:34)
4.3 Qualitative Risk Assessment (6:07)
4.4 Quantitative Risk Assessment (9:41)
4.5 Risk Visibility and Reporting (8:33)
4.6 Auditing Findings for Continual Improvement (1:54)
Summary (0:23)
Lesson 5: Security Operations
Learning objectives (0:27)
5.1 Importance of Continuous Monitoring (1:30)
5.2 Syslog (14:54)
5.3 SNMPv3 (4:42)
5.4 NetFlow (3:07)
5.5 Security Analytics, Metrics and Trends (1:38)
5.6 Visualization (12:00)
5.7 Event Data Analysis (2:01)
5.8 Communicating Findings (0:45)
Summary (0:25)
Module 3: Access Controls
Module Introduction (0:55)
Lesson 6: Access Controls (Part 1)
Learning objectives (0:36)
6.1 AAA Defined (4:52)
6.2 Authentication Factors (4:48)
6.3 Internetwork Trust Architectures (6:09)
6.4 Trust Relationships (6:52)
6.5 Subject-based versus Object-based (1:41)
6.6 MAC versus DAC (3:45)
6.7 Role-based and Attribute-based (11:32)
6.8 Identity Management Lifecycle (3:02)
Summary (0:31)
Lesson 7: Access Controls (Part 2)
Learning objectives (0:30)
7.1 IEEE 802.1X (8:29)
7.2 802.1AE MAC Security (4:34)
7.3 RADIUS (9:43)
7.4 TACACS+ (6:07)
7.5 Network Admission Control (2:14)
7.6 Remote-Access Teleworkers (12:06)
7.7 IPSec VPN (8:03)
7.8 SSL/TLS VPN (4:44)
Summary (0:26)
Module 4: Network and Communications Security
Module Introduction (1:48)
Lesson 8: Types of Attacks
Learning objectives (0:37)
8.1 Social Engineering (7:03)
8.2 Spoofing (4:43)
8.3 Denial-of-Service and DDoS (11:15)
8.4 Botnets (4:21)
8.5 ZeroDay Attacks and APTs (3:08)
8.6 Buffer Overflow and Injection (1:59)
8.7 Reflection and Amplification (3:09)
8.8 Poisoning (4:53)
8.9 Phishing, Pharming, and Spam (16:05)
8.10 Hijacking (2:47)
Summary (0:30)
Lesson 9: Network Protocols and Services
Learning objectives (0:34)
9.1 The OSI Model (6:37)
9.2 The TCP/IP Model (3:08)
9.3 Physical Topologies (8:44)
9.4 Logical Topologies (8:52)
9.5 Common Protocols and Services (8:37)
9.6 Physical Security (5:59)
9.7 Securing Layers 2-4 (8:28)
9.8 Securing Layers 5-7 (9:05)
Summary (0:29)
Lesson 10: Infrastructure Device Protection
Learning objectives (0:31)
10.1 Overview of Network Infrastructure Protection (1:43)
10.2 Hardening the Device Planes (23:12)
10.3 Types of Security Controls (3:48)
10.4 Categories of Security Controls (4:17)
10.5 Segmentation and Zoning (7:04)
10.6 Secure Device Management (11:18)
10.7 Device Protection Best Practices (1:30)
Summary (0:27)
Lesson 11: Overview of Security Devices
Learning objectives (0:30)
11.1 Security Router (2:21)
11.2 Security Switches (6:18)
11.3 Firewalls (8:47)
11.4 Proxies (2:05)
11.5 NIDS and NIPS (18:24)
11.6 VPN Gateways (10:38)
11.7 Content Security Appliances (12:05)
11.8 Traffic-shaping Devices (1:52)
Summary (0:24)
Lesson 12: Wireless Technology and Security
Learning objectives (0:29)
12.1 Overview of Wireless Technology (21:56)
12.2 Transmission Security (5:55)
12.3 Common Wireless Attacks (7:27)
12.4 Basic Countermeasures (6:03)
12.5 Wireless Infrastructure Devices (9:45)
12.6 Protecting Wireless Endpoints (1:35)
Summary (0:25)
Module 5: Cryptography
Module Introduction (0:49)
Lesson 13: Cryptography (Part 1)
Learning objectives (0:25)
13.1 Introduction to Cryptology (2:02)
13.2 Ciphers (4:35)
13.3 Block versus Stream Ciphers (3:28)
13.4 Encryption (6:27)
13.5 Symmetric Key Systems (2:11)
13.6 Asymmetric Key Systems (3:02)
13.7 Hashing and Integrity (9:18)
Summary (0:22)
Lesson 14: Cryptography (Part 2)
Learning objectives (0:32)
14.1 Key Management (3:01)
14.2 Digital Signatures (4:30)
14.3 Web of Trust (2:14)
14.4 Public Key Infrastructure (7:20)
14.5 X.509v3 Certificates (6:30)
14.6 CA Trusts and Certificate Chaining (3:43)
14.7 Expiration, Revocation and Suspension (4:05)
14.8 Implementation of Secure Protocols (1:22)
Summary (0:30)
Module 6: Systems and Application Security
Module Introduction (1:41)
Lesson 15: Malware Threats
Learning objectives (0:30)
15.1 Viruses (4:30)
15.2 Worms (3:09)
15.3 Trojan Horse (RATs) (5:01)
15.4 Ransomware and Cryptoware (2:10)
15.5 Backdoors (3:56)
15.6 Logic Bombs (2:35)
15.7 Keyloggers (1:37)
15.8 Spyware (1:19)
15.9 Stegomalware (1:37)
Summary (0:25)
Lesson 16: Identifying Malware and IoCs
Learning objectives (0:25)
16.1 Identifying Malicious Code (8:46)
16.2 Indications of Compromise (IoCs) (4:09)
16.3 Survey of Attack Tools and Kits (2:43)
16.4 Malicious Code Countermeasures (4:30)
16.5 Malicious Activity Countermeasures (1:04)
Summary (0:20)
Lesson 17: Endpoint Security
Learning objectives (0:31)
17.1 Host-based IDS (HIDS) (2:11)
17.2 Personal Security Suites (4:43)
17.3 Endpoint Encryption (8:00)
17.4 Advanced Endpoint Systems (5:58)
17.5 Virtualization and Thin Clients (5:01)
17.6 Protecting Detached Storage (2:24)
17.7 Secure Browsing (14:00)
17.8 Mobile Device Security Management (4:54)
Summary (0:27)
Lesson 18: Systems and Application Security
Learning objectives (0:45)
18.1 Application Security (8:41)
18.2 Mitigating Architecture and Design Vulnerabilities (5:30)
18.3 Service Models (4:39)
18.4 Data Storage and Transmission (7:47)
18.5 Third-party and Outsourcing (3:28)
18.6 Virtualization Security Overview (4:35)
18.7 Cloud Computing Models (10:31)
18.8 Operate and Secure Virtual Environments (10:08)
18.9 Securing Big Data Systems (5:14)
18.10 Legal and Privacy Concerns (2:30)
Summary (0:43)
Module 7: Incident Response and Recovery
Module Introduction (0:42)
Lesson 19: Incident Response and Recovery
Learning objectives (0:33)
19.1 Participating in Incident Handling (2:13)
19.2 Incident Handling Lifecycle (19:39)
19.3 Supporting Forensic Investigations (14:30)
19.4 Understanding BCPs and DRPs (9:10)
19.5 Emergency Response (1:36)
19.6 Restoration Planning (7:57)
19.7 Implementing Backups and Redundancy (4:40)
19.8 Testing and Drills (1:55)
Summary (0:30)
Summary
SSCP (Systems Security Certified Practitioner): Summary (0:58)
18.6 Virtualization Security Overview
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock