À propos de ce cours

12,950 consultations récentes
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 16 heures pour terminer
Anglais
Sous-titres : Anglais
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau débutant
Approx. 16 heures pour terminer
Anglais
Sous-titres : Anglais

Enseignant

Offert par

Logo (ISC)²

(ISC)²

Programme du cours : ce que vous apprendrez dans ce cours

Semaine
1

Semaine 1

5 heures pour terminer

Identify and Analyze Malicious Code and Activity

5 heures pour terminer
18 vidéos (Total 109 min), 18 lectures, 1 quiz
18 vidéos
Malicious Code and Activity: Key Concepts6 min
Malicious Code and Activity: Malicious Code Countermeasures4 min
Malicious Code and Activity: Software Exploitation Methods6 min
Malicious Code and Activity: Software Exploitation Methods5 min
Malicious Code and Activity: Code Signing5 min
Malicious Code and Activity: Social Engineering6 min
Malicious Code and Activity: Security Awareness Training6 min
Malicious Code and Activity: Long File Extensions5 min
Malicious Code and Activity: E-mail7 min
Malicious Code and Activity: Countermeasures5 min
Malicious Code and Activity: Examples of Spoofing5 min
Malicious Code and Activity: Techniques5 min
Malicious Code and Activity: Botnet-Led Exploits6 min
Malicious Code and Activity: Malicious Web Activity6 min
Malicious Code and Activity: Zero-Day Exploits4 min
Malicious Code and Activity: Infected Factory Builds and Media4 min
Malicious Code and Activity: Inspection of Processes7 min
18 lectures
Systems and Application Security10 min
Malicious Code and Activity: Key Concepts10 min
Malicious Code and Activity: Malicious Code Countermeasures10 min
Malicious Code and Activity: Software Exploitation Methods10 min
Malicious Code and Activity: Software Exploitation Methods10 min
Malicious Code and Activity: Code Signing10 min
Malicious Code and Activity: Social Engineering10 min
Malicious Code and Activity: Security Awareness Training10 min
Malicious Code and Activity: Long File Extensions10 min
Malicious Code and Activity: E-mail10 min
Malicious Code and Activity: Countermeasures10 min
Malicious Code and Activity: Examples of Spoofing10 min
Malicious Code and Activity: Techniques10 min
Malicious Code and Activity: Botnet-Led Exploits10 min
Malicious Code and Activity: Malicious Web Activity10 min
Malicious Code and Activity: Zero-Day Exploits10 min
Malicious Code and Activity: Infected Factory Builds and Media10 min
Malicious Code and Activity: Inspection of Processes10 min
1 exercice pour s'entraîner
Quiz 120 min
Semaine
2

Semaine 2

1 heure pour terminer

Implement and Operate Endpoint Device Security

1 heure pour terminer
3 vidéos (Total 15 min), 3 lectures, 1 quiz
3 vidéos
Endpoint Device Security: Trusted Platform Module (TPM)6 min
Endpoint Device Security: BYOD Policy Considerations2 min
3 lectures
Endpoint Device Security: HIDS10 min
Endpoint Device Security: Trusted Platform Module (TPM)10 min
Endpoint Device Security: BYOD Policy Considerations10 min
1 exercice pour s'entraîner
Quiz 210 min
Semaine
3

Semaine 3

5 heures pour terminer

Operate and Configure Cloud Security

5 heures pour terminer
16 vidéos (Total 105 min), 16 lectures, 1 quiz
16 vidéos
Cloud Security: Hybrid5 min
Cloud Security: Virtualization7 min
Cloud Security: Hypervisor4 min
Cloud Security: Country-Specific Legal Considerations6 min
Cloud Security: P&DP Laws6 min
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8 min
Cloud Security: Data Dispersion5 min
Cloud Security: Threat to Storage Types9 min
Cloud Security: Technologies to Address Threats4 min
Cloud Security: DLP Architecture7 min
Cloud Security: Review Activity6 min
Cloud Security: Key Storage in the Cloud4 min
Cloud Security: Common Approaches for Data Masking4 min
Cloud Security: Data Retention Policies7 min
Cloud Security: Disposal Options8 min
16 lectures
Cloud Security: Five Essential Characteristics of Clouds10 min
Cloud Security: Hybrid10 min
Cloud Security: Virtualization10 min
Cloud Security: Hypervisor10 min
Cloud Security: Country-Specific Legal Considerations10 min
Cloud Security: P&DP Laws10 min
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10 min
Cloud Security: Data Dispersion10 min
Cloud Security: Threat to Storage Types10 min
Cloud Security: Technologies to Address Threats10 min
Cloud Security: DLP Architecture10 min
Cloud Security: Review Activity10 min
Cloud Security: Key Storage in the Cloud10 min
Cloud Security: Common Approaches for Data Masking10 min
Cloud Security: Data Retention Policies10 min
Cloud Security: Disposal Options10 min
1 exercice pour s'entraîner
Quiz 320 min
Semaine
4

Semaine 4

3 heures pour terminer

Secure Big Data Systems & Operate and Secure Virtual Environments

3 heures pour terminer
9 vidéos (Total 70 min), 9 lectures, 1 quiz
9 vidéos
Secure Big Data Systems: Interpreting Big Data4 min
Secure Big data Systems: Key Challenges5 min
Operate and Secure Virtual Environments: SDN5 min
Operate and Secure Virtual Environments: Virtual Appliances8 min
Operate and Secure Virtual Environments: DRS10 min
Operate and Secure Virtual Environments: Common Attacks6 min
Operate and Secure Virtual Environments: Network Security5 min
Operate and Secure Virtual Environments: Virtual Machine Security16 min
9 lectures
Secure Big Data Systems: Big Data10 min
Secure Big Data Systems: Interpreting Big Data10 min
Secure Big data Systems: Key Challenges10 min
Operate and Secure Virtual Environments: SDN10 min
Operate and Secure Virtual Environments: Virtual Appliances10 min
Operate and Secure Virtual Environments: DRS10 min
Operate and Secure Virtual Environments: Common Attacks10 min
Operate and Secure Virtual Environments: Network Security10 min
Operate and Secure Virtual Environments: Virtual Machine Security10 min
1 exercice pour s'entraîner
Quiz 412 min

Avis

Meilleurs avis pour SYSTEMS AND APPLICATION SECURITY

Voir tous les avis

À propos du (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

Foire Aux Questions

  • Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.

  • If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.

  • Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.

  • If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.

  • This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.

  • You are eligible for a refund until 14 days after your payment date, or until 14 days after the course or Certificate launches, whichever is later. You are not eligible for a refund after earning a Course Certificate, even if you complete a course within the 14-day period. See our full refund policy.

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.