À propos de ce cours

15,590 consultations récentes
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 23 heures pour terminer
Anglais

Enseignant

Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 23 heures pour terminer
Anglais

Offert par

Placeholder

(ISC)²

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1

Semaine 1

4 heures pour terminer

Understand the Risk Management Process

4 heures pour terminer
14 vidéos (Total 84 min), 14 lectures, 1 quiz
14 vidéos
Risk Management Process: Creating a Risk Register7 min
Risk Management Process: Risk Register Risk Management Steps8 min
Risk Management Process: Key Terms5 min
Risk Management Process: Key Terms6 min
Risk Management Process: Risk Assessment3 min
Risk Management Process: Preparation Steps7 min
Risk Management Process: Step 2b4 min
Risk Management Process: Quantitative Analysis8 min
Risk Management Process: Qualitative Analysis5 min
Risk Management Process: Step 33 min
Risk Management Process: Risk Treatment5 min
Risk Management Process: Risk Avoidance5 min
Risk Management Process: Type of Audits7 min
14 lectures
Risk Management Process: Risk Visibility and Reporting10 min
Risk Management Process: Creating a Risk Register10 min
Risk Management Process: Risk Register Risk Management Steps10 min
Risk Management Process: Key Terms10 min
Risk Management Process: Key Terms10 min
Risk Management Process: Risk Assessment10 min
Risk Management Process: Preparation Steps10 min
Risk Management Process: Step 2b10 min
Risk Management Process: Quantitative Analysis10 min
Risk Management Process: Qualitative Analysis10 min
Risk Management Process: Step 310 min
Risk Management Process: Risk Treatment10 min
Risk Management Process: Risk Avoidance10 min
Risk Management Process: Type of Audits10 min
1 exercice pour s'entraîner
Quiz 130 min
Semaine
2

Semaine 2

4 heures pour terminer

Perform Security Assessment Activities

4 heures pour terminer
11 vidéos (Total 73 min), 11 lectures, 1 quiz
11 vidéos
Security Assessment Activities: Potential Problems6 min
Assessment Activities: Security Gateway Types5 min
Security Assessment Activities: Potential Security Issues6 min
Security Assessment Activities: Penetration Testing6 min
Security Assessment Activities: White Box / Hat8 min
Security Assessment Activities: Reconnaissance4 min
Security Assessment Activities: DNS Zone Transfers7 min
Security Assessment Activities: Network Mapping Techniques9 min
Security Assessment Activities: Firewalking6 min
Security Assessment Activities: Active Penetration6 min
11 lectures
Security Assessment Activities: Participate in Security and Test Results10 min
Security Assessment Activities: Potential Problems10 min
Assessment Activities: Security Gateway Types10 min
Security Assessment Activities: Potential Security Issues10 min
Security Assessment Activities: Penetration Testing10 min
Security Assessment Activities: White Box / Hat10 min
Security Assessment Activities: Reconnaissance10 min
Security Assessment Activities: DNS Zone Transfers10 min
Security Assessment Activities: Network Mapping Techniques10 min
Security Assessment Activities: Firewalking10 min
Security Assessment Activities: Active Penetration10 min
1 exercice pour s'entraîner
Quiz 230 min
Semaine
3

Semaine 3

4 heures pour terminer

Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results

4 heures pour terminer
12 vidéos (Total 75 min), 12 lectures, 1 quiz
12 vidéos
Monitoring Systems: IDS/IPS5 min
Monitoring Systems: Implementation Issues for Monitoring6 min
Maintain Monitoring Systems: Sample Questions6 min
Maintain Monitoring Systems: Attacker Motivations7 min
Maintain Monitoring Systems: Logging5 min
Maintain Monitoring Systems: Log Anomalies5 min
Maintain Monitoring Systems: Log Retention6 min
Monitoring Systems: Compliance6 min
Monitoring Results: Security Baseline6 min
Monitoring Results: SSE-CMM6 min
Monitoring Results: Potential Uses of Server Log Data6 min
12 lectures
Monitoring Systems: Monitoring Terminology10 min
Monitoring Systems: IDS/IPS10 min
Monitoring Systems: Implementation Issues for Monitoring10 min
Maintain Monitoring Systems: Sample Questions10 min
Maintain Monitoring Systems: Attacker Motivations10 min
Maintain Monitoring Systems: Logging10 min
Maintain Monitoring Systems: Log Anomalies10 min
Maintain Monitoring Systems: Log Retention10 min
Monitoring Systems: Compliance10 min
Monitoring Results: Security Baseline10 min
Monitoring Results: SSE-CMM10 min
Monitoring Results: Potential Uses of Server Log Data10 min
1 exercice pour s'entraîner
Quiz 330 min
Semaine
4

Semaine 4

4 heures pour terminer

Incident Response and Recovery

4 heures pour terminer
13 vidéos (Total 77 min), 13 lectures, 1 quiz
13 vidéos
Incident Handling: Preparation6 min
Incident Handling: Training6 min
Incident Handling: Communication Planning7 min
Incident Handling: The Incident Response Team7 min
Incident Handling: IDS and IPS4 min
Incident Handling: Intrusion Detection Techniques7 min
Incident Handling: Anti-Malware Systems2 min
Incident Handling: Packet Sniffers6 min
Incident Handling: SSL Decryption Devices4 min
Incident Handling: Records6 min
Incident Handling: Delaying Containment6 min
Incident Handling: Containment, Eradication, and Recovery4 min
13 lectures
Incident Handling: Incident Response10 min
Incident Handling: Preparation10 min
Incident Handling: Training10 min
Incident Handling: Communication Planning10 min
Incident Handling: The Incident Response Team10 min
Incident Handling: IDS and IPS10 min
Incident Handling: Intrusion Detection Techniques10 min
Incident Handling: Anti-Malware Systems10 min
Incident Handling: Packet Sniffers10 min
Incident Handling: SSL Decryption Devices10 min
Incident Handling: Records10 min
Incident Handling: Delaying Containment10 min
Incident Handling: Containment, Eradication, and Recovery10 min
1 exercice pour s'entraîner
Quiz 430 min

Avis

Meilleurs avis pour IDENTIFYING, MONITORING, AND ANALYZING RISK AND INCIDENT RESPONSE AND RECOVERY

Voir tous les avis

À propos du (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

Foire Aux Questions

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.