SSCP Domain: Security Operations and Administration Part 3

Target Audience
Expected Duration
Lesson Objectives
Course Number

Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to identify and organize essential information in an organization, and how to document and implement policies, standards, procedures and guidelines. These skills will ensure confidentiality, integrity and availability of core business information. This course teaches the learner about Software Release Management and Deployment. It examines Accreditation and Assurance as well as Change Control and Configuration Management and demonstrates Endpoint Security and Metrics for Measuring Security. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains and covers the most recent key areas of knowledge as outlined in the Candidate Information Bulletin (CIB) effective date: February 1, 2012.

Target Audience
Experienced IT professionals with a basic knowledge of network and communications protocols and equipment seeking to pass the System Security Certified Practitioner (SSCP) exam, or otherwise gain knowledge in assessing, planning, implementing and managing IT security in an enterprise environment. A minimum of one year's professional experience in one of the seven SSCP CBK Domains is required for certification.

Expected Duration (hours)

Lesson Objectives

SSCP Domain: Security Operations and Administration Part 3

  • recognize how to implement a release management policy
  • select appropriate EAL levels to evaluate an information system for certification and accreditation
  • describe the software certification and accreditation process
  • recognize appropriate configuration management techniques for a particular scenario
  • describe the steps of the patch management process
  • describe endpoint security management solutions
  • identify important endpoint security considerations
  • recognize how to measure security performance using metrics
  • identify critical success factors for security awareness programs
  • analyze application deployment security measures for a particular scenario
  • optimize endpoint security and security awareness
  • Course Number: