SSCP Domain: Monitoring and Analysis Part 2


Overview/Description
Target Audience
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. The course examines how to determine appropriate methods to protect hosts and networks within a business environment, how to test them for vulnerability and how to determine appropriate methods for carrying out a security penetration test. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)
2.0

Lesson Objectives

SSCP Domain: Monitoring and Analysis Part 2

  • describe features of vulnerability testing software
  • select appropriate methods for protecting hosts
  • recognize how to implement advanced firewall testing
  • identify qualities of Internet perimeter systems
  • describe traffic types and conditions that a monitoring system in an IDS environment should cover
  • recognize the implications of war driving for network security
  • determine appropriate methods to protect hosts and test them for vulnerability
  • determine appropriate methods to protect networks and test them for vulnerability
  • identify important considerations for planning a penetration test
  • describe reconnaissance information gathering techniques
  • describe common network mapping based information gathering techniques
  • describe how to exploit systems during a penetration test
  • describe how to perform a penetration test
  • determine appropriate methods for carrying out a security penetration test
  • Course Number:
    sp_sycp_a05_it_enus