Об этом курсе
4.6
Оценки: 8
Рецензии: 2
Специализация
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень

Начальный уровень

Часов на завершение

Прибл. 17 часа на выполнение

Предполагаемая нагрузка: 5 hours/week...
Доступные языки

Английский

Субтитры: Английский
Специализация
100% онлайн

100% онлайн

Начните сейчас и учитесь по собственному графику.
Гибкие сроки

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Начальный уровень

Начальный уровень

Часов на завершение

Прибл. 17 часа на выполнение

Предполагаемая нагрузка: 5 hours/week...
Доступные языки

Английский

Субтитры: Английский

Программа курса: что вы изучите

Неделя
1
Часов на завершение
3 ч. на завершение

Understand and Comply with Code of Ethics and Security Concepts

Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization. ...
Reading
10 видео ((всего 67 мин.)), 10 материалов для самостоятельного изучения, 1 тест
Video10 видео
Security Concepts: Confidentiality7мин
Security Concepts: Ensuring Confidentiality4мин
Security Concepts: Consequences of Integrity Failures6мин
Security Concepts: Core Guidelines5мин
Security Concepts: Least Privilege7мин
Security Concepts: Additional Controls6мин
Security Concepts: Risk Assessment Data5мин
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls5мин
Security Controls: Timeline of a Security Incident6мин
Reading10 материала для самостоятельного изучения
Understand and Comply with Code of Ethics10мин
Security Concepts: Confidentiality10мин
Security Concepts: Ensuring Confidentiality10мин
Security Concepts: Consequences of Integrity Failures10мин
Security Concepts: Core Guidelines10мин
Security Concepts: Least Privilege10мин
Security Concepts: Additional Controls10мин
Security Concepts: Risk Assessment Data10мин
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls10мин
Security Controls: Timeline of a Security Incident10мин
Quiz1 практическое упражнение
Quiz 120мин
Неделя
2
Часов на завершение
4 ч. на завершение

Participate in Asset Management

Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention....
Reading
14 видео ((всего 84 мин.)), 14 материалов для самостоятельного изучения, 1 тест
Video14 видео
Asset Management: The Waterfall Model10мин
Asset Management: Benefits and Drawbacks5мин
Asset Management: Deployment of System4мин
Asset Management: OWASP Top Ten5мин
Asset Management: Guidelines for Developers5мин
Asset Management: IT Asset Management (ITAM)5мин
Asset Management: Impact and Result4мин
Asset Management: Encryption Vulnerabilities6мин
Asset Management: Data Scrubbing6мин
Asset Management: Considerations6мин
Asset Management: Secure Output6мин
Asset Management: Destruction of Magnetic Media4мин
Asset Management: Disclosure Controls4мин
Reading14 материала для самостоятельного изучения
Asset Management: Life Cycle10мин
Asset Management: The Waterfall Model10мин
Asset Management: Benefits and Drawbacks10мин
Asset Management: Deployment of System10мин
Asset Management: OWASP Top Ten10мин
Asset Management: Guidelines for Developers10мин
Asset Management: IT Asset Management (ITAM)10мин
Asset Management: Impact and Result10мин
Asset Management: Encryption Vulnerabilities10мин
Asset Management: Data Scrubbing10мин
Asset Management: Considerations10мин
Asset Management: Secure Output10мин
Asset Management: Destruction of Magnetic Media10мин
Asset Management: Disclosure Controls10мин
Quiz1 практическое упражнение
Quiz 220мин
Неделя
3
Часов на завершение
3 ч. на завершение

Implement and Assess Compliance with Controls & Participate in Change Management Duties

Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures. Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process....
Reading
9 видео ((всего 58 мин.)), 9 материалов для самостоятельного изучения, 1 тест
Video9 видео
Compliance with Controls: Managerial Controls6мин
Compliance with Controls: Policy Life Cycle7мин
Change Management Duties: Implementation and Configuration Management Plan7мин
Change Management Duties: Systems Assurance and Controls Validation5мин
Change Management Duties: CM Process5мин
Change Management Duties: Configuration Management for Operating Systems6мин
Change Management Duties: Control8мин
Change Management Duties: Testing Patches, Fixes, and Updates6мин
Reading9 материала для самостоятельного изучения
Compliance with Controls: Technical Controls10мин
Compliance with Controls: Managerial Controls10мин
Compliance with Controls: Policy Life Cycle10мин
Change Management Duties: Implementation and Configuration Management Plan10мин
Change Management Duties: Systems Assurance and Controls10мин
Change Management Duties: CM Process10мин
Change Management Duties: Configuration Management for Operating Systems10мин
Change Management Duties: Control10мин
Change Management Duties: Testing Patches, Fixes, and Updates10мин
Quiz1 практическое упражнение
Week 3 Quiz20мин
Неделя
4
Часов на завершение
3 ч. на завершение

Participate in Physical Security Operations & Security Awareness Training

Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems. ...
Reading
11 видео ((всего 65 мин.)), 11 материалов для самостоятельного изучения, 1 тест
Video11 видео
Physical Security Operations: Doors4мин
Physical Security Operations: Door Locks4мин
Physical Security Operations: Turnstiles6мин
Physical Security Operations: Securing the Area6мин
Physical Security Operations: Rack Security5мин
Physical Security Operations: HVAC6мин
Security Operations: Sprinkler Systems5мин
Security Operations: Gas Suppression Systems5мин
Security Awareness Training: Critical Success Factors7мин
Security Awareness Training: Training6мин
Reading11 материала для самостоятельного изучения
Physical Security Operations: Physical Security10мин
Physical Security Operations: Doors10мин
Physical Security Operations: Door Locks10мин
Physical Security Operations: Turnstiles10мин
Physical Security Operations: Securing the Area10мин
Physical Security Operations: Rack Security10мин
Physical Security Operations: HVAC10мин
Security Operations: Sprinkler Systems10мин
Security Operations: Gas Suppression Systems10мин
Security Awareness Training: Critical Success Factors10мин
Security Awareness Training: Training10мин
Quiz1 практическое упражнение
Week 4 Quiz20мин
4.6
Рецензии: 2Chevron Right

Лучшие рецензии

автор: GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

Преподаватель

Avatar

(ISC)² Education & Training

Education & Training

О (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

О специализации ''(ISC)² Systems Security Certified Practitioner (SSCP) '

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Часто задаваемые вопросы

  • Да, до регистрации можно просмотреть первое видео и программу курса. Чтобы получить полный доступ к материалам курса, необходимо оплатить его.

  • Регистрируясь на курс до начала сессии, вы получаете доступ ко всем видеолекциям и материалам для самостоятельного изучения. Задания можно отправлять после начала сессии.

  • После регистрации на курс и начала сессии вы получаете доступ ко всем видео и другим ресурсам курса, включая материалы для самостоятельного изучения и форумы обсуждений. Вы сможете выполнять тренировочные, а также сдавать обязательные оцениваемые задания и получить сертификат о прохождении курса.

  • Если вы успешного пройдете курс, на странице ваших достижений появится электронный сертификат, который можно распечатать или прикрепить к профилю LinkedIn.

  • Это один из немногих курсов на Coursera, которые предоставляются только на платной основе. Если вы хотите пройти этот курс, но не можете его оплатить, подайте заявление на получение финансовой помощи.

  • The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

Остались вопросы? Посетите Центр поддержки учащихся.