SSCP Certification Training
Systems Security Certified Practitioner training course for the new 2021 exam syllabus.
Earning a globally recognized advanced security administration and operations certification like the SSCP is a great way to grow your career and better secure your organization’s critical assets. SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures established by the cybersecurity experts at (ISC)².
The SSCP has been listed in the top 10 list of cybersecurity certifications. It's perfect as a stand alone certification or a complement to the CompTIA Security+, Certified Ethical Hacker, Cisco CyberOps Associate or Linux Security Administrator. It lays the foundation for more advanced certifications such as CISSP, CASP+ as well as a career as an IT security manager or consultant.
The SSCP is ideal for IT administrators, managers, directors and network security professionals responsible for the hands-on operational security of their organization’s critical assets, including those in the following positions:
- Network Security Engineer
- Systems Administrator
- Security Analyst
- Systems Engineer
- Security Consultant/Specialist
- Security Administrator
- Systems/Network Analyst
- Database Administrator
If you are considering a career in cyber security, the SSCP is the perfect stepping stone. More advanced certifications such as the CISSP require several years experience. The SSCP exam complements others with similar objectives (listed above) dramatically cutting down your study efforts but increasing your results.
This course prepares you for the new (2021) version of the exam.
SSCP Essentials Exam Pass

Manuel Ascencion
Manuel used this video training course and lab coaching to pass his SSCP exam.
The exam is perfect for aspiring security managers, penetration testers or cyber ops professionals. You can progress onto the CISSP after you have a few years experience under your belt. Security knowledge is a must-have for network engineers, programmers and cloud engineers. It's also tested in CompTIA, Cisco and Microsoft exams.
Your Instructor
Mark Drinan
Mark is an avid Cyber Security enthusiast with experience working in the Cyber Security department of a Big Four company. Mark has obtained two Cyber Security certifications: the CompTIA PenTest+ Certification and the ISC2 System Security Certified Practitioner (SSCP) Certification.
Outside of work, Mark enjoys learning and participating in various hacking platforms such as HackTh eBox, TryHackMe, and CTF competitions.
- Over 13 hours of video training
- Instructor guided labs
- End-of-module exams
- End-of-course certificate
- Access to members only forum
- Exam vendor – Pearson Vue
- Prerequisites – None
- Recommended – None
Module 1 | Security Operations and Administration |
---|---|
Unit 1 | Welcome to the Course |
Unit 2 | Core Security Concepts |
Unit 3 | Identify and Implement Security Controls |
Unit 4 | Document and Maintain Functional Security Controls |
Unit 5 | Asset Management Lifecycle |
Unit 6 | Change Management Lifecycle |
Unit 7 | Security Awareness Training |
Unit 8 | Physical Security Operations |
Module 2 | Access Controls |
Unit 1 | Implement and Maintain Authentication Methods |
Unit 2 | Support Internetwork Trust Architectures |
Unit 3 | Participate in the Identity Management Lifecycle |
Unit 4 | Understand and Apply Access Controls |
Module 3 | Risk Identification, Monitoring and Analysis |
Unit 1 | Understand the Risk Management Process |
Unit 2 | Understand the Risk Management Process 2 |
Unit 3 | Understand Legal and Regulatory Concerns |
Unit 4 | Operate and Monitor Security Platforms |
Unit 5 | Analyze Monitoring Results |
Module 4 | Incident Response and Recovery |
Unit 1 | Support Incident Lifecycle |
Unit 2 | Understand and Support Forensic Investigations |
Unit 3 | Understand and Support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) Activities |
Module 5 | Cryptography |
Unit 1 | Understand Reasons and Requirements for Cryptography |
Unit 2 | Apply Cryptography Concepts - Symmetric Encryption |
Unit 3 | Apply Cryptography Concepts - Asymmetric Encryption, Elliptical Curve Cryptography, Nonrepudiation |
Unit 4 | Apply Cryptography Concepts - Strength of Encryption Algorithms and Keys, Cryptographic Attacks. |
Unit 5 | Understand and Implement Secure Protocols |
Unit 6 | Understand and Support Public Key Infrastructure (PKI) Systems |
Module 6 | Network and Communications Security |
Unit 1 | Understand and Apply Fundamental Concepts of Networking |
Unit 2 | OSI and TCP/IP Models |
Unit 3 | Topologies, Transmission Media Types, Common Ports and Protocols |
Unit 4 | Understand network attacks |
Unit 5 | Manage Network Access Controls |
Unit 6 | Manage Network Security |
Unit 7 | Operate and configure network-based security devices |
Unit 8 | Secure wireless communications |
Module 7 | Systems and Application Security |
Unit 1 | Identify and Analyze Malicious Code and Activity |
Unit 2 | Implement and Operate Endpoint Device Security |
Unit 3 | Understand and Configure Cloud Security |
Unit 4 | Operate and maintain secure virtual environments |
Module 8 | Bonus Exams |
Unit 1 | Exam 1 |
Unit 2 | Exam 2 |