* All fees are exclusive of vat ** PREMIUM - Customize your learning experience
Pursue better IT security job opportunities and prove knowledge with confidence. Create an opportunity to advance in your career. This course provides the most relevant content. The SSCP Professional Training Course shows employers you have the IT security foundation to defend against cyber attacks.
What Do Participants Learn?
Enhance Security with Geolocation
Enhance Security with Network and Context Information
Authentication and Role Based Access Control
Authorization and Attribute Based Access Control
Who Should Attend?
This course is recommended for those who are willing to pursue their career in IT security, cyber-security, software security development. Participants will get opportunities to improve their skills by learning different security models.
What Will the Learning Experience Include?
Comprehensive pre-program activities include:
Web-based information forms & surveys completed by attendee.
Direct consultation with the attendee about the expectations.
During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
Participants learn from expert trainers who have both academic and business experiences.
Highly applicable training content & instructive activities for adding depth to training topics.
**A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Explore & Practice
Apply & sustain the learning experience by using this ongoing support:
To ensure participant has new skills or behavior progress.
Optional, fee-based mentoring & coaching with the trainer.
Training materials & additional documents (e-books, pdf files, presentations and articles)
Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
Section One: Security and Risk Management
Understand and apply concepts of confidentiality, integrity and availability
Apply security governance principles
Understand legal and regulatory issues that pertain to information security in a global context
Understand professional ethics
Develop and implement documented security policy, standards, procedures, and guidelines
Understand business continuity requirements
Contribute to personnel security policies
Understand and apply risk management concepts
Understand and apply threat modelling
Integrate security risk considerations into acquisition strategy and practice
Establish and manage information security education, training, and awareness
Section Two: Asset Security
Classify information and supporting assets
Determine and maintain ownership
Ensure appropriate retention
Determine data security controls
Establish handling requirements
Section Three: Security Engineering
Implement and manage engineering processes using secure design principles
Understand the fundamental concepts of security models
Select controls and countermeasures based upon systems security evaluation models
Understand security capabilities of information systems
Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
Assess and mitigate the vulnerabilities in web-based systems
Assess and mitigate vulnerabilities in mobile systems
Assess and mitigate vulnerabilities in embedded devices and cyber-physical systems
Apply secure principles to site and facility design
Design and implement physical security
Section Four: Communication & Network Security
Apply secure design principles to network architecture
Secure network components
Design and establish secure communication channels