Vi ste ovdje
Overview/Description
SkillSoft Mentors are available to help students with their studies for the Systems Security Certified Practitioner (SSCP) exam. You can reach them by entering a Mentored Chat Room or by using the E-mail My Mentor service.
Target Audience
Individuals who are studying the associated SkillSoft content in preparation for, or to become familiar with, the skills and competencies being measured by the actual certification exam.
Prerequisites
Familiarity with the exam objectives listed below and skills and competencies being measured in the associated certification exam....
Overview/Description
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers various aspects of secure digital communications including authentication, data integrity, transport formats and transmission methods. This course teaches the learner about network topology schemes and application and transport layer security protocols such as S/MIME and SSL. It shows how to optimize network level security to protect against DoS attacks using IP addressing techniques and SMTP, ICMP and...
Overview/Description
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data integrity with a focus on wireless communications and new messaging and exchange technologies. This course teaches the learner how to optimize security standards, policies and procedures for LAN, WAN and WLAN enterprise environment IT infrastructures. The course explains network vulnerabilities, VPNs, the IEEE 802 security standards, IDS solutions and best practices for...
Overview/Description
With more and more business success relying on secure and guaranteed access to data, having plans and policies in place to manage risks and recover from disasters is pivotal. This course provides the learner with the knowledge to provide data redundancy and handling incidents and risks. This course teaches the learner how to identify the threats and vulnerabilities that can put information systems at risk and how to optimize a risk assessment and management system to protect resources. It covers risk limitation and mitigation and the security incident handling process....
Overview/Description
Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course teaches the learner about the importance of Confidentiality, Integrity and Availability (The C-I-A Triad) and how to...
Overview/Description
Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course examines the secure storage of data as well as encryption, retention, sanitization and disposal of data. It teaches the...
Overview/Description
With the increasing growth of the Internet and networks in general being used for business, security is an important issue. A key aspect of business security is controlling which users have access to what resources, and which operations they can perform. The mechanism for controlling these aspects is Access Control. This courses examines how to determine appropriate access controls, architecture models, authentication techniques and access methods. It explains access control systems, their differences and implementations and how they protect services and data. This course...
Overview/Description
In modern business and IT, keeping information secure and/or proving from where it originated can be key aspects of success. Cryptography provides the tools necessary to guarantee confidentiality and authenticity in the digital age. This course provides the learner with an understanding of the applications of symmetric and public key cryptography and when they are required as well as concepts such as key management and secure ciphers and protocols. The course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems...
Overview/Description
In the modern world of computing, malicious code is becoming commonplace. Organizations and individuals must protect themselves from these attacks. This course provides a history of malicious code and details of how to recognize and analyze the effects of malcodes and infection vectors on a computing system using VMware testing and file capturing techniques. It also explains how to determine appropriate malcode evaluation and mitigation techniques to protect an enterprise environment. This course guides you through the Common Body of Knowledge (CBK) recommended by the...
Overview/Description
Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication, data integrity, transport formats and transmission methods. As an...
- 1 od 2
- ››