System Security Certified Practitioner (SSCP 2018): Security Concepts

Intermediate
  • 14 Videos | 1h 2m 21s
  • Includes Assessment
  • Earns a Badge
Likes 52 Likes 52
Learners can explore the ISC squared (International Information System Security Certification Consortium) and its Code of Ethics when performing security work in this course, which prepares for the Systems Security Certified Practitioner (SSCP) certification exam. In its 14 videos, you will examine the four canons of Ethics: 1) to protect society and infrastructure; 2) to act honorably, honestly, justly, responsibly, and legally; 3) to provide diligent and competent service to principals; and 4) to advance and protect the profession. Examine the CIA (confidentiality, integrity, and availability) triad for security controls; then examine restricting access or protecting data through encryption. You will learn how to provide data assurances, and how to use MS Windows Power Shell and Linux to generate file hashes, and digital signatures. Learners will explore availability, and the importance to assuring business processes can run uninterrupted. Next, explore how accountability and data access can be used to track users, devices, or software. Finally, you will learn how to enable file system auditing.

WHAT YOU WILL LEARN

  • apply the ISC² Code of Ethics to IT security work
    apply organization-specific ethics to IT security work
    describe the elements of the CIA triad
    describe how confidentiality enhances security to protect PI, PHI and IP
    encrypt Windows files using the Encrypting File System (EFS)
    describe how integrity enhances security
    use PowerShell to generate file system hashes
  • generate MD5 file system hashes in Linux
    describe how availability enhances security
    implement data availability with backups
    describe how accountability enhances security
    implement IT system accountability through auditing
    recommend CIA solutions for security risks

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 36s
    UP NEXT
  • Playable
    2. 
    ISC² Code of Ethics
    3m 12s
  • Locked
    3. 
    The Law and Organizational Ethics
    4m 31s
  • Locked
    4. 
    The CIA Triad
    3m 18s
  • Locked
    5. 
    Confidentiality
    7m 29s
  • Locked
    6. 
    Encrypt Data at Rest for Confidentiality
    2m 46s
  • Locked
    7. 
    Integrity
    3m 17s
  • Locked
    8. 
    Generate File Hashes for Integrity on Windows
    3m 54s
  • Locked
    9. 
    Generate File Hashes for Integrity on Linux
    2m 1s
  • Locked
    10. 
    Availability
    5m 50s
  • Locked
    11. 
    Configure Windows Server 2016 Backup
    4m 9s
  • Locked
    12. 
    Accountability
    4m 41s
  • Locked
    13. 
    Enable File System Auditing on Windows Server 2016
    5m 42s
  • Locked
    14. 
    Exercise: Explain and Implement CIA
    3m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE