System Security Certified Practitioner (SSCP 2018): Security Concepts
Intermediate
- 14 videos | 56m 21s
- Includes Assessment
- Earns a Badge
Learners can explore the ISC squared (International Information System Security Certification Consortium) and its Code of Ethics when performing security work in this course, which prepares for the Systems Security Certified Practitioner (SSCP) certification exam. In its 14 videos, you will examine the four canons of Ethics: 1) to protect society and infrastructure; 2) to act honorably, honestly, justly, responsibly, and legally; 3) to provide diligent and competent service to principals; and 4) to advance and protect the profession. Examine the CIA (confidentiality, integrity, and availability) triad for security controls; then examine restricting access or protecting data through encryption. You will learn how to provide data assurances, and how to use MS Windows Power Shell and Linux to generate file hashes, and digital signatures. Learners will explore availability, and the importance to assuring business processes can run uninterrupted. Next, explore how accountability and data access can be used to track users, devices, or software. Finally, you will learn how to enable file system auditing.
WHAT YOU WILL LEARN
-
Apply the isc² code of ethics to it security workApply organization-specific ethics to it security workDescribe the elements of the cia triadDescribe how confidentiality enhances security to protect pi, phi and ipEncrypt windows files using the encrypting file system (efs)Describe how integrity enhances securityUse powershell to generate file system hashes
-
Generate md5 file system hashes in linuxDescribe how availability enhances securityImplement data availability with backupsDescribe how accountability enhances securityImplement it system accountability through auditingRecommend cia solutions for security risks
IN THIS COURSE
-
1m 36s
-
3m 12sLearn how to apply the ISC Code of Ethics to IT security work. FREE ACCESS
-
4m 31sFind out how to apply organization-specific ethics to IT security work. FREE ACCESS
-
3m 18sUpon completion of this video, you will be able to describe the elements of the CIA triad. FREE ACCESS
-
7m 29sAfter completing this video, you will be able to describe how confidentiality enhances security to protect personally identifiable information, protected health information, and intellectual property. FREE ACCESS
-
2m 46sIn this video, find out how to encrypt Windows files using the Encrypting File System. FREE ACCESS
-
3m 17sUpon completion of this video, you will be able to describe how integrity enhances security. FREE ACCESS
-
3m 54sIn this video, you will use PowerShell to generate hashes of files in a file system. FREE ACCESS
-
2m 1sLearn how to generate MD5 hashes of files in a Linux file system. FREE ACCESS
-
5m 50sAfter completing this video, you will be able to describe how availability enhances security. FREE ACCESS
-
4m 9sIn this video, find out how to ensure data availability with backups. FREE ACCESS
-
4m 41sAfter completing this video, you will be able to describe how accountability enhances security. FREE ACCESS
-
5m 42sIn this video, find out how to implement system accountability through auditing. FREE ACCESS
-
3m 57sIn this video, learn how to recommend solutions for security risks from the CIA. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.