Confidently follow learning paths that help you develop the right skills in the right order to achieve your goals.
The SSCP® is an entry-level (ISC)² certification that helps newcomers enter the information security space. It also serves as a stepping stone to the more advanced CISSP certification. This series provides coverage of the seven domains of the SSCP Common Body of Knowledge (SSCP CBK®) updated on April 15, 2015.Get Started
Network Security Engineer, Security Administrator, CISSP, CompTIA Security+, Ethical Hacking
To obtain the SSCP certification, you must have at least one year of full-time paid work experience. If you do not meet this requirement, you can proceed and become an Associate of (ISC)².
This selection of courses will stretch your security knowledge by introducing you to the 7 CBK® Domains.
This course introduces the System Security Certified Practitioner Exam, the information required to pass the exam, the Pluralsight learning path describing the content of the series, and the 6 step certification process involved in taking, passing, and maintaining the certification.
In this course, you'll learn how to use single and multifactor authentication; explore single sign-on and device authentication; learn about one-way and two-way trust relationships and transitive trusts; participate in authorization, proofing, provisioning, maintenance, and entitlement; and differentiate between mandatory and discretionary access control, non-discretionary access control, and role-based and attribute-based access control.
In this course, you will learn to understand and comply with the codes of ethics, understand security concepts, document and operate security controls, participate in assets management, implement and asses compliance with controls, participate in change management, participate in security awareness training and participate in physical security operations.
In this course, you will learn to understand the risk management process, perform security assessment activities, operate and maintain monitoring systems, and analyze monitoring results.
In this course, you will learn to participate in Incident Handling. The learner will understand and support Forensic Investigations and will understand and support Business Continuity Plans and Disaster Recovery Plans.
In this course, you will learn to understand and apply fundamental concepts of cryptography, the learner will understand requirements for cryptography, and will understand and support secure protocols, the learner will operate and implement cryptographic systems.
In this course, you will learn and explore Network and Communication Security. You will learn to understand security issues related to networks, protect telecommunications technologies, control network access, manage LAN-based security, operate and configure network-based security devices, and implement and operate wireless technologies.
In this course, you will learn to identify and analyze malicious code and activity, implement and operate endpoint device security, operate and configure cloud security, explore secure big data systems, and operate and secure virtual environments.