Systems Security Certified Practitioner: Systems and Application Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Malicious attacks on systems and applications are now an everyday problem, and security professionals have to know how to identify and protect against them. This course covers how to identify and analyze malicious activity, including malicious code and countermeasures. It also outlines best practices for endpoint device and cloud security, including host-based firewalls, HIDS, virtualization, and service models. In this course, you will learn about best practices for securing big data systems and operating and securing virtual environments, including appliance and attack countermeasures. This course is one of a series in the Skillsoft learning path that covers the objectives for the (ISC)2 Systems Security Certified Practitioner Exam.

Target Audience
Individuals interested in the (ISC)2 Systems Security Certified Practitioner exam; security professionals interested in acquiring new skills and knowledge in security best practices

Prerequisites
None

Expected Duration (hours)
2.1

Lesson Objectives

Systems Security Certified Practitioner: Systems and Application Security

  • start the course
  • describe characteristics of malicious code
  • identify countermeasures for mitigating risk and damage from malicious code
  • distinguish between different types of malicious activity
  • identify countermeasures for mitigating risk and damage from malicious activity
  • use HIDS for endpoint device security
  • use host-based firewalls for endpoint device security
  • use application whitelisting for endpoint device security
  • use endpoint encryption for endpoint device security
  • use trusted platform module for endpoint device security
  • use mobile device management for endpoint device security
  • identify secure browsing best practices for endpoint device security
  • distinguish between cloud security operation models
  • distinguish between cloud security service models
  • describe characteristics of cloud virtualization
  • identify the legal and privacy concerns associated with cloud security
  • identify secure data storage and transmission options for cloud security
  • identify security requirements when outsourcing cloud services
  • identify application vulnerabilities that apply to big data systems
  • identify architecture and design vulnerabilities that apply to big data systems
  • describe best practices for secure software-defined networking in virtual environments
  • identify characteristics and role of hypervisors in virtual environments
  • describe characteristics of virtual appliances and their role in virtual environments
  • describe continuity and resilience in secure virtual environments
  • identify the most common attacks on virtual environments and countermeasures for mitigating risk and damage
  • describe best practices for shared storage in virtual environments
  • describe best practices for implementing and operating systems and application security
  • Course Number:
    sp_sscp_a08_it_enus

    Expertise Level
    Beginner