SSCP Domain: Monitoring and Analysis Part 1

Target Audience
Expected Duration
Lesson Objectives
Course Number

Current business practices demand a certain amount of due diligence with regards to keeping track of system events pertaining to security. This course on security monitoring and analysis provides the learner with an understanding of the requirements and procedures that are components of a secure business environment. In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication, data integrity, transport formats and transmission methods. As an SSCP candidate, you are expected to show understanding of these aspects of secure communications in the digital age. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)

Lesson Objectives

SSCP Domain: Monitoring and Analysis Part 1

  • recognize techniques for ensuring compliance to a security framework
  • match components of a security network to their descriptions
  • identify controls to help enforce a security policy
  • recognize how to monitor a secured system
  • identify the domains of security responsibility
  • describe common SNMP security issues and recommended security solutions
  • recognize how to implement a security framework
  • describe how to monitor a security framework
  • identify the characteristics of active and passive monitoring systems
  • define the key terms used to discuss monitoring technologies
  • recognize when to implement network-based and host-based intrusion detection and prevention systems
  • identify the motivation behind a system attack
  • distinguish between intrusions and events in a security framework
  • determine the appropriate intrusion detection and prevention system for a particular scenario
  • Course Number: