SSCP®: Security Operations and Administration (2012 Objectives)

Part 2 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification.
Course info
Rating
(54)
Level
Intermediate
Updated
Nov 18, 2015
Duration
5h 47m
Table of contents
Cloud Computing
Code of Ethics
Security Administration
Change Management
Security Evaluation and Assistance
Security Awareness
Information Communication Technology Infrastructure
Endpoint Device Security
Data Management Policies
Security Concepts
Description
Course info
Rating
(54)
Level
Intermediate
Updated
Nov 18, 2015
Duration
5h 47m
Description

Part 2 of 5 in the Systems Security Certified Practitioner (SSCP®) series. This series will prepare you for the Systems Security Certified Practitioner (SSCP®) certification. Learn about cool topics like access controls, security operations, security administration, monitoring, analysis, risks, responses, recovery, cryptography, networks, communication, malicious code, and malicious activity. This training course is the perfect entry-level course for someone looking to launch their career in security or advance their current security position.

About the author
About the author

Award-winning author and video instructor Tony Northrup (MCITP, MCPD, MCSE, MCTS, CISSP) has published more than 30 books covering Windows, networking, and Microsoft certification.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Security Administration
Hi this is Tony Northrup for TrainSignal and in this video lesson I'm going to cover the concepts of Security Administration for the SSCP certification exam. Up first, let's talk about data classification. This is basically figuring out which of your data is the most important, you know, which needs to be restored first and backed up most often. Which is super confidential and needs to be highly protected and encrypted and which isn't that important and you shouldn't spend so much time and storage and money on keeping it safe.

Change Management
Hi this is Tony Northrup for TRAINSIGNAL and in this video lesson I'm going to teach you about Change Management, specifically for the SSCP certification exam. So what is change management? Well change management is the process that organizations follow when they make just about any change at all. It is a real pain. It really is and I'll be honest, it's one of the least fun parts of security unless you are the type who really enjoys order and procedure, but it is critical for keeping systems stable. And you'll find that things will simply break less often. Systems will be more reliable, you'll have more nines of availability, everything will work smoother when you have the proper change management process in place. If you have regulatory issues to deal with it also helps improve your compliance. And when things go wrong, change management allows you to rebuild it exactly as it was, because that change management system also records every setting and change that you make to your systems.

Endpoint Device Security
Hi this is Tony Northrup for TrainSignal and in this video lesson I'm going to discuss Endpoint Device Security for the SSCP certification exam. What are endpoint devices? Well they're all the little things that are attached to the edges of your network. PCs, tablets, Smartphones, flash drives, and even things like printouts. These are anything that can carry data or might need to be managed.

Data Management Policies
Hi this is Tony Northrup for TRAINSIGNAL and in this video lesson I'm going to describe Data Management Policies for the SSCP certification exam. Now if you look at the SSCP certification exam objectives, this particular sub objective includes some other topics. I've already covered those in other lessons, so I'm not going to repeat myself here. The one thing that is unique about this video lesson is the coverage of digital rights management, DRM. Also known as information rights management or enterprise digital rights management, IRM or sometimes EDRM. So what is DRM? DRM is using cryptography to protect your data even when it leaves your file servers or database servers. So DRM can protect your data when it leaves your network. It can protect your data on a flash drive, it can protect your data even if it's in an email attachment. It's amazing this way. And it's something that's only really emerged in the last 5 to 10 years.

Security Concepts
Hi this is Tony Northrup for TrainSignal and this is going to be a really fun video lesson covering basic Security Concepts for the SSCP certification exam. Up first the CIA triad, confidentiality, integrity, and availability. You'll see these terms throughout these lessons and plenty on your SSCP certification exam, as well as the real world. Now the CIA triad is decades old and in the last few years we've started to throw in some other security concepts that aren't really covered by the triad, privacy and authenticity. So I'll dedicate a few slides to those concepts as well.