top of page
Gradient Background

Secure IT Infrastructure with Hands-On Operational Expertise.

Systems Security Certified Practitioner (SSCP) Training

4800,-€ (excl. VAT)

Cost

5 Days

Duration

Participants will gain a thorough understanding of the operational aspects of IT security. You'll learn to implement and administer security measures effectively, identify and mitigate risks, respond to incidents, and ensure the integrity of network communications and systems. This course aims to prepare you for the SSCP certification, validating your skills and knowledge in the field.

Learning Objectives

  • At least one year of cumulative work experience in one or more of the seven domains of the ISC2 SSCP CBK.

  • A strong foundational knowledge of IT security principles and practices.


Prerequisites

This course is ideal for IT professionals like Network Security Engineers, Systems Administrators, and Security Analysts, among others, who are tasked with ensuring the operational security of their organization's critical assets. It's particularly beneficial for those seeking to validate their hands-on security skills and knowledge through the SSCP certification, aiming to elevate their career in the cybersecurity field.

Who Should Attend

NEOEDX's Systems Security Certified Practitioner (SSCP) training is an advanced course designed for IT administrators, managers, and network security professionals responsible for the hands-on operational security of their organization's critical assets. Over the course duration, you'll delve deep into the seven domains of the ISC2 SSCP Common Body of Knowledge (CBK), equipping you with the knowledge to implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures. This course is your pathway to becoming an SSCP, demonstrating your skills and elevating your career in the cybersecurity field.

Course Description

Security Operations and Administration: Understanding best practices, roles, and responsibilities.

Access Controls: Techniques for effective implementation and management.

Risk Identification, Monitoring, and Analysis: Identifying and mitigating potential threats.

Incident Response and Recovery: Strategies for effective response and recovery.

Cryptography: Understanding cryptographic methods and practices.

Network and Communications Security: Securing network architecture and protecting data in transit.

Systems and Application Security: Best practices for securing applications and systems.

Course Outline

Lets scale your business

Karl-Gruneklee Strasse 22,

37077, Gottingen

Germany

bottom of page