À propos de ce cours
4.6
8 notes
2 avis
100 % en ligne

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant

Niveau débutant

Heures pour terminer

Approx. 17 heures pour terminer

Recommandé : 5 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais
100 % en ligne

100 % en ligne

Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles

Dates limites flexibles

Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant

Niveau débutant

Heures pour terminer

Approx. 17 heures pour terminer

Recommandé : 5 hours/week...
Langues disponibles

Anglais

Sous-titres : Anglais

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1
Heures pour terminer
3 heures pour terminer

Understand and Comply with Code of Ethics and Security Concepts

Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization. ...
Reading
10 vidéos (Total 67 min), 10 lectures, 1 quiz
Video10 vidéos
Security Concepts: Confidentiality7 min
Security Concepts: Ensuring Confidentiality4 min
Security Concepts: Consequences of Integrity Failures6 min
Security Concepts: Core Guidelines5 min
Security Concepts: Least Privilege7 min
Security Concepts: Additional Controls6 min
Security Concepts: Risk Assessment Data5 min
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls5 min
Security Controls: Timeline of a Security Incident6 min
Reading10 lectures
Understand and Comply with Code of Ethics10 min
Security Concepts: Confidentiality10 min
Security Concepts: Ensuring Confidentiality10 min
Security Concepts: Consequences of Integrity Failures10 min
Security Concepts: Core Guidelines10 min
Security Concepts: Least Privilege10 min
Security Concepts: Additional Controls10 min
Security Concepts: Risk Assessment Data10 min
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls10 min
Security Controls: Timeline of a Security Incident10 min
Quiz1 exercice pour s'entraîner
Quiz 120 min
Semaine
2
Heures pour terminer
4 heures pour terminer

Participate in Asset Management

Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention....
Reading
14 vidéos (Total 84 min), 14 lectures, 1 quiz
Video14 vidéos
Asset Management: The Waterfall Model10 min
Asset Management: Benefits and Drawbacks5 min
Asset Management: Deployment of System4 min
Asset Management: OWASP Top Ten5 min
Asset Management: Guidelines for Developers5 min
Asset Management: IT Asset Management (ITAM)5 min
Asset Management: Impact and Result4 min
Asset Management: Encryption Vulnerabilities6 min
Asset Management: Data Scrubbing6 min
Asset Management: Considerations6 min
Asset Management: Secure Output6 min
Asset Management: Destruction of Magnetic Media4 min
Asset Management: Disclosure Controls4 min
Reading14 lectures
Asset Management: Life Cycle10 min
Asset Management: The Waterfall Model10 min
Asset Management: Benefits and Drawbacks10 min
Asset Management: Deployment of System10 min
Asset Management: OWASP Top Ten10 min
Asset Management: Guidelines for Developers10 min
Asset Management: IT Asset Management (ITAM)10 min
Asset Management: Impact and Result10 min
Asset Management: Encryption Vulnerabilities10 min
Asset Management: Data Scrubbing10 min
Asset Management: Considerations10 min
Asset Management: Secure Output10 min
Asset Management: Destruction of Magnetic Media10 min
Asset Management: Disclosure Controls10 min
Quiz1 exercice pour s'entraîner
Quiz 220 min
Semaine
3
Heures pour terminer
3 heures pour terminer

Implement and Assess Compliance with Controls & Participate in Change Management Duties

Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures. Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process....
Reading
9 vidéos (Total 58 min), 9 lectures, 1 quiz
Video9 vidéos
Compliance with Controls: Managerial Controls6 min
Compliance with Controls: Policy Life Cycle7 min
Change Management Duties: Implementation and Configuration Management Plan7 min
Change Management Duties: Systems Assurance and Controls Validation5 min
Change Management Duties: CM Process5 min
Change Management Duties: Configuration Management for Operating Systems6 min
Change Management Duties: Control8 min
Change Management Duties: Testing Patches, Fixes, and Updates6 min
Reading9 lectures
Compliance with Controls: Technical Controls10 min
Compliance with Controls: Managerial Controls10 min
Compliance with Controls: Policy Life Cycle10 min
Change Management Duties: Implementation and Configuration Management Plan10 min
Change Management Duties: Systems Assurance and Controls10 min
Change Management Duties: CM Process10 min
Change Management Duties: Configuration Management for Operating Systems10 min
Change Management Duties: Control10 min
Change Management Duties: Testing Patches, Fixes, and Updates10 min
Quiz1 exercice pour s'entraîner
Week 3 Quiz20 min
Semaine
4
Heures pour terminer
3 heures pour terminer

Participate in Physical Security Operations & Security Awareness Training

Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems. ...
Reading
11 vidéos (Total 65 min), 11 lectures, 1 quiz
Video11 vidéos
Physical Security Operations: Doors4 min
Physical Security Operations: Door Locks4 min
Physical Security Operations: Turnstiles6 min
Physical Security Operations: Securing the Area6 min
Physical Security Operations: Rack Security5 min
Physical Security Operations: HVAC6 min
Security Operations: Sprinkler Systems5 min
Security Operations: Gas Suppression Systems5 min
Security Awareness Training: Critical Success Factors7 min
Security Awareness Training: Training6 min
Reading11 lectures
Physical Security Operations: Physical Security10 min
Physical Security Operations: Doors10 min
Physical Security Operations: Door Locks10 min
Physical Security Operations: Turnstiles10 min
Physical Security Operations: Securing the Area10 min
Physical Security Operations: Rack Security10 min
Physical Security Operations: HVAC10 min
Security Operations: Sprinkler Systems10 min
Security Operations: Gas Suppression Systems10 min
Security Awareness Training: Critical Success Factors10 min
Security Awareness Training: Training10 min
Quiz1 exercice pour s'entraîner
Week 4 Quiz20 min
4.6
2 avisChevron Right

Meilleurs avis

par GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

Enseignant

Avatar

(ISC)² Education & Training

Education & Training

À propos de (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

À propos de la Spécialisation (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Foire Aux Questions

  • Oui, vous pouvez prévisualiser la première vidéo et consulter le programme du cours avant de vous inscrire. Vous devez acheter le cours pour accéder au contenu non inclus dans la prévisualisation.

  • Si vous décidez de vous inscrire au cours avant la date de début de session, vous aurez accès à toutes les vidéos et lectures du cours. Vous pourrez soumettre des devoirs à partir du début de la session.

  • Une fois que vous êtes inscrit(e) et que votre session commence, vous avez accès à toutes les vidéos et aux autres ressources, y compris les éléments à lire et le forum de discussion du cours. Vous pouvez afficher et soumettre des devoirs pour vous exercer, et terminer les devoirs notés requis pour obtenir une note et un Certificat de Cours.

  • Si vous réussissez le cours, votre Certificat de Cours électronique sera ajouté à votre page Accomplissements. À partir de cette page, vous pouvez imprimer votre Certificat de Cours ou l'ajouter à votre profil LinkedIn.

  • Ce cours fait partie du nombre restreint de cours proposés par Coursera actuellement disponibles uniquement aux étudiants ayant payé les frais du cours ou bénéficié de l'Aide Financière. Si vous souhaitez suivre ce cours alors que vous n'avez pas les moyens d'en acquitter les frais, nous vous recommandons de soumettre une demande d'Aide Financière.

  • The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.