System Security Certified Practitioner (SSCP 2018): Security Concepts

Intermediate
  • 14 videos | 56m 21s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 67 users Rating 4.2 of 67 users (67)
Learners can explore the ISC squared (International Information System Security Certification Consortium) and its Code of Ethics when performing security work in this course, which prepares for the Systems Security Certified Practitioner (SSCP) certification exam. In its 14 videos, you will examine the four canons of Ethics: 1) to protect society and infrastructure; 2) to act honorably, honestly, justly, responsibly, and legally; 3) to provide diligent and competent service to principals; and 4) to advance and protect the profession. Examine the CIA (confidentiality, integrity, and availability) triad for security controls; then examine restricting access or protecting data through encryption. You will learn how to provide data assurances, and how to use MS Windows Power Shell and Linux to generate file hashes, and digital signatures. Learners will explore availability, and the importance to assuring business processes can run uninterrupted. Next, explore how accountability and data access can be used to track users, devices, or software. Finally, you will learn how to enable file system auditing.

WHAT YOU WILL LEARN

  • Apply the isc² code of ethics to it security work
    Apply organization-specific ethics to it security work
    Describe the elements of the cia triad
    Describe how confidentiality enhances security to protect pi, phi and ip
    Encrypt windows files using the encrypting file system (efs)
    Describe how integrity enhances security
    Use powershell to generate file system hashes
  • Generate md5 file system hashes in linux
    Describe how availability enhances security
    Implement data availability with backups
    Describe how accountability enhances security
    Implement it system accountability through auditing
    Recommend cia solutions for security risks

IN THIS COURSE

  • 1m 36s
  • 3m 12s
    Learn how to apply the ISC Code of Ethics to IT security work. FREE ACCESS
  • Locked
    3.  The Law and Organizational Ethics
    4m 31s
    Find out how to apply organization-specific ethics to IT security work. FREE ACCESS
  • Locked
    4.  The CIA Triad
    3m 18s
    Upon completion of this video, you will be able to describe the elements of the CIA triad. FREE ACCESS
  • Locked
    5.  Confidentiality
    7m 29s
    After completing this video, you will be able to describe how confidentiality enhances security to protect personally identifiable information, protected health information, and intellectual property. FREE ACCESS
  • Locked
    6.  Encrypt Data at Rest for Confidentiality
    2m 46s
    In this video, find out how to encrypt Windows files using the Encrypting File System. FREE ACCESS
  • Locked
    7.  Integrity
    3m 17s
    Upon completion of this video, you will be able to describe how integrity enhances security. FREE ACCESS
  • Locked
    8.  Generate File Hashes for Integrity on Windows
    3m 54s
    In this video, you will use PowerShell to generate hashes of files in a file system. FREE ACCESS
  • Locked
    9.  Generate File Hashes for Integrity on Linux
    2m 1s
    Learn how to generate MD5 hashes of files in a Linux file system. FREE ACCESS
  • Locked
    10.  Availability
    5m 50s
    After completing this video, you will be able to describe how availability enhances security. FREE ACCESS
  • Locked
    11.  Configure Windows Server 2016 Backup
    4m 9s
    In this video, find out how to ensure data availability with backups. FREE ACCESS
  • Locked
    12.  Accountability
    4m 41s
    After completing this video, you will be able to describe how accountability enhances security. FREE ACCESS
  • Locked
    13.  Enable File System Auditing on Windows Server 2016
    5m 42s
    In this video, find out how to implement system accountability through auditing. FREE ACCESS
  • Locked
    14.  Exercise: Explain and Implement CIA
    3m 57s
    In this video, learn how to recommend solutions for security risks from the CIA. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 12 users Rating 4.3 of 12 users (12)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.4 of 41 users Rating 4.4 of 41 users (41)