Or follow us:
Join now to receive our Course Deals  

Buy Any Course or Bundle This Month & Get The Personal Success Training Program FREE

Certificate in Systems Security Certified Practitioner (SSCP) Training Online Course

Prepare for a career as a network administrator or security administrator


The Systems Security Certified Practitioner Training program is an ideal course for individuals interested in advancing their knowledge of information and systems security

This program will prepare you for a career as a network administrator or security administrator. You’ll learn the dynamics of data communications, including network security, telecommunications, remote access, firewalls, proxy servers, and wireless and cellular technologies. You’ll learn how to identify and mitigate malicious codes such as viruses, Trojans, logic bombs, social engineering, insider threats, data theft, DDoS, spoofing, Phishing, Pharming, and spam. 

You'll also explore authentication and access control methods. You'll learn about AAA and trusts, and you'll become familiar with identity management and cloud computing concepts.

As you move through the program, you will learn skills that will prepare you for Risk Management. This includes risk assessment, incident handling, business continuity, and disaster recovery plans, and you’ll examine dynamic cryptography concepts like PKI, certificates, and secure protocols.

This program will teach you ethical responsibilities of a network administrator or a security administrator, as well as the vast range of administrative duties involved with the career track. You’ll learn about change management, security evaluation, topics of awareness, device security, data management policies, and analysis and system monitoring.

When you register, you'll receive six (6) months to complete this program.

Competency Checklist

  • Authentication, identity management, and network trusts
  • Cloud computing security concepts, as well as network data security
  • Wireless security and cellular technologies
  • Malware identification and mitigation
  • Risk management, security assessment, and incident handling
  • Cryptography, encryption, PKI, and certificates
  • Security auditing and systems monitoring and analysis

Course Fast Facts:

  • This course is delivered 100% on-line and is accessible 24/7 from any computer or smartphone
  • Instructors lead each course and you will be able to interact with them and ask questions
  • You can study from home or at work at your own pace in your own time
  • You will be awarded a certificate at completion of this course

Course Delivery

Upon enrolment, an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. New courses start every month to ensure that we have the correct ratio of students to tutors available, please ensure you select a starting date when you go through our shopping cart, at checkout. The course is easy to follow and understand.

Recognition & Accreditation

All students who complete the course receive a certificate of completion with a passing score (for the online assessment) and will be issued a certificate via email.

I.    Access Controls
            A.    Implement Authentication Mechanisms
            B.    Operate Internetwork Trust Architectures
            C.    Participate in Identity – Management Lifecycle
            D.    Implement Access Controls
II.    Security Operations and Administration
            A.    Understand and Comply with Code of Ethics
            B.    Understand Security Concepts
            C.    Document and Operate Security Controls
            D.    Participate in Asset Management
            E.    Implement and Assess Compliance with Controls
            F.    Participate in Change Management
            G.    Participate in Security Awareness and Training
            H.    Participate in Physical Security Operations
III.    Risk Identification, Monitoring and Analysis
            A.    Understand The Risk Management Process
            B.    Perform Security Assessment Activities
            C.    Operate and Maintain Monitoring Systems
            D.    Analyze Monitoring Results
IV.    Incident Response and Recovery
            A.    Participate in Incident Handling
            B.    Understand and Support Forensic Investigations
            C.    Understand and Support Business Continuity Plan (BCP) And Disaster Recovery Plan (DRP)
V.    Cryptography  
      
            A.    Understand and Apply Fundamental Concepts and Cryptography
            B.    Understand Requirements for Cryptography
            C.    Understand and Support Secure Protocols
            D.    Operate and Implements Cryptographic Systems
VI.    Networks and Communication Security        
            A.    Understanding Security Issues Related to Networks
            B.    Protect Telecommunications Technologies
            C.    Control Network Access
            D.    Manage LAN-Based Security
            E.    Operate Configure Network-Based Security Devices
            F.    Implement and Operate Wireless Technologies
VII.    Systems and Application Security        
            A.    Identify and Analyze Malicious Code Activity
            B.    Implement and Operate in Point Device Security
            C.    Operate Configure Cloud Security
            D.    Secure Big Data Systems
            E.    Operating Secure Virtual Environments

This program is compatible with the Windows 7 and later operating systems and all current Internet browsers.

This program can be taken on either a PC or Mac device. Mac users are encouraged to have access to a Windows environment on their device. You'll need to have email capabilities.

Adobe Flash Player and Adobe Acrobat Reader are required for this course.

Click here to download the Acrobat Reader.
Click here to download the Flash Player.

This is an advanced level program. Students should have a base knowledge about computer hardware, networking, and security knowledge. It is recommended that students should either first take CompTIA A+ and Network+ or have the equivalent of two years of experience working with computers.

1. Can I register for programs if I am an international student?
Yes, because These programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.

2. How long does it take to complete a program?
All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. Upon registering, you’re given six (6) months to complete this program. 

3.   What if I don't have enough time to complete my program within the time frame provided? 
The time allotted to complete your program has been calculated based on the number of hours for each program, so don't worry too much about not completing in time. If, after a concerted effort, you are still unable to complete, your Student Advisor will help you work out a suitable completion date. Please note that a fee may be charged for an extension.

4. Do I have to buy additional materials?
All the materials you’ll need are included, and their cost will be covered by your tuition.

5. Can I get financial assistance?
These courses are non-credit courses, so they do not qualify for federal aid. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses.

6. What happens when I complete the program?
Upon successful completion of the program, you will be awarded a certificate of completion.

7. Am I guaranteed a job?
These programs will provide you with the skills you need to obtain an entry-level position in most cases. We don’t provide direct job placement services, but our facilitators and career counselors will help you build your resume and are available to give advice on finding your first job. Facilitators will also be available to use as a professional reference upon completion of the program. Potential students should always do research on the job market in their area before registering.

8. Who will be my instructor?
Each student is paired with a facilitator for one-on-one interaction. The facilitator will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our facilitators are successful working professionals in the fields in which they teach.

9. What software or hardware do I need in order to take online programs and what are the system requirements?
In order to take our online programs, you must have access to a computer and the Internet. You can access the program contents from any Web-enabled computer. You don’t have to use the same computer to log-in to the program every time. We recommend that you have a word-processing program (Microsoft Word is best) and the latest version of Internet Explorer.

10. Can I use a Mac?
Yes, you can use a Mac for this program.

11. When can I start the program?
Our programs are all open enrollment. You can register and start the program as soon as you are ready.

Please note: Once the program curriculum is accessed online or through submission of a material shipment confirmation, refunds cannot be issued.

12. What are the requirements to take the SSCP exam?

Valid experience includes information systems security-related work performed or work that requires information security knowledge and involves direct application of that knowledge. For the SSCP certification, one year of cumulative work experience in one or more of the seven domains of the SSCP CBK is required. If you do not have the required experience, you may still sit for the exam and become an Associate of (ISC)² until you have gained the required experience.
To take the exam, you have to schedule it at an authorized testing center scheduled through VUE. A score of 700 out of 1000 is required to pass.

13. Is the SSCP exam included in the cost of the program?
The exam is separate from the course. It is not included in your tuition.

14. Where can I schedule the SSCP exam?
Create an account at Pearson Vue, and schedule your exam.
Complete the Examination Agreement, attesting to the truth of your assertions regarding professional experience, and legally committing to the adherence of the (ISC)² Code of Ethics. 
Review the Candidate Background Questions.
Submit the examination fee. The examination fee is not included in your tuition.
Yes, because These programs are online you never have to actually travel to the school. Most schools offer telephone or online registration.

 

This program is supported by a team of highly experienced industry professionals and educators. This team is ready to answer questions, to provide insight and guidance, and to help ensure all students have a successful and engaging learning experience.

The team includes:

David Grimes. David brings over 10 years experience in IT, education, instruction, curriculum design, combined with extensive management and leadership experience in the private and non-profit sectors. His passion for technology and education has led David to work as an academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist and blogger.

David holds a Master of Education and a Bachelor of Science, both in Technology Education, from Ohio State University in Columbus, Ohio. In addition, he has earned IT industry certifications and has been published in a book on gamification in the classroom.

 

Chintan Thakkar. Chintan has 10+ years of teaching and instructional designer experience in Information Technology. His areas of expertise include networking, and server and storage systems management. He has also developed complex software using various programming languages. From an instructional design and teaching perspective, Chintan is focused on (Cisco) CCNA, Networking, Server, and Cloud Computing courses.

Chintan holds a Master of Science in Computer Science from Southern Methodist University, in Dallas, Texas, and earned his Bachelor of Engineering Degree in Computer Engineering from South Gujarat University in Surat, India.

 

Aaron Appleby. Aaron brings over 10 years experience in technology and technology-related instructional design, teaching and tutoring. His experience includes instructional design and curriculum development for Loyola University Medical Center, DeVry University, as well as corporate training clients.

Aaron holds a Master of Science Education in Learning Design and Technology, from Purdue University, in West Lafayette, Indiana; and a Bachelor of Science in Integrative Biology from the University of Illinois/Urbana Champaign, in Champaign, Illinois.

Now Only £1749 Save £400 (19%)
OFF RRP £2149
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value £300)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 007GES322
Delivery Mode: Online
Course Access: 6 months to complete this program
Tutor Support: Yes
Time required: 80 Hours