ISC2 - SSCP Course & Exam

Duration

Duration:

Only 5 Days

Method

Method:

Classroom / Online / Hybrid

Next date

Next date:

16/9/2024 (Monday)

Overview

Official ISC2 Training Provider ISC2 SSCP Systems Security Certified Practitioner

The goal of this five-day accelerated SSCP certification course is to provide IT and information security professionals with a fully-immersed, zero-distraction, all-inclusive SSCP training experience. You'll develop the expertise to tackle the operational demands and responsibilities of a security practitioner, including authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, and more.

SSCP Certification was designed to recognise an international standard for practitioners of information security [IS] and understanding of a Common Body of Knowledge (CBK). It focuses on practices, roles and responsibilities as defined by experts from major IS industries. Certification can enhance an IS career and provide added credibility.

Your SSCP course encompasses the ISC2 SSCP CBK Review Seminar, intense hands-on instruction, meals, and accommodation.

SSCP accreditation provides information security personnel and their employers with international credibility. It also gives their employers a reliable measure of professional competence.

The key advantage of authorised ISC2 Institute Training is fundamental: The institute's goal is to provide an extensive overview of the Common Body of Knowledge (CBK), the compendium of information security practices and standards compiled and continually updated by ISC2 and used as the basis for the SSCP exam.

You will access exclusive benefits as Firebrand Training are an authorised ISC2 host partner. Only authorised ISC2 host partners:

  • Are guaranteed to adhere to stringent technical pre-screening practices - Candidates that do not have the necessary work and education experience my be subject to decertification
  • Guarantee the highest quality of education and customer satisfaction - Candidates are able to contact ISC2 directly for program quality assurance
  • Utilise ISC2 Institute's instructors, trained directly by the consortium - Many SSCP instructors participated in the actual development of the SSCP CBK
  • Employ the only official ISC2 courseware and materials The product of extensive work from SSCPs, CISSPs, ISC2; Instructors, and Subject Matter Experts

On this course, you'll prepare for and sit the SSCP exam, covered by your Certification Guarantee.

This accelerated training course is designed for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. The SSCP is ideal for those working in or towards positions such as, but not limited to:

  • Network Security Engineer
  • Systems/Network Administrator
  • Security Analyst
  • Systems Engineer
  • Security Consultant/Specialist
  • Security Administrator
  • Systems/Network Analyst
  • Database Administrator

Highest Performing Affiliate of the Year

Highest Performing Affiliate of the Year – EMEA

Firebrand Training has been named as “Highest Performing Affiliate of the Year – EMEA” by ISC2. The major security association helps companies recognise organisations and individuals who are knowledgeable in security through the CISSP, CSSLP and SSCP training.

Firebrand Training is an Authorised Provider of ISC2 training. W. Hord Tipton, Executive Director of ISC2, stated: “This award represents Firebrand as the top performer for ISC2...for the EMEA region.”

Benefits

ISC2 Membership Benefits

ISC2 is an international, non-profit membership association built for security professionals. When you certify, you’ll become a member of ISC2. As a member, you’ll join a global network of 125,000+ and get access to an array of exclusive resources, tools and peer-to-peer networking opportunities, conference and event discounts.

Become a member by earning one of ISC2’s gold standard certifications. Contact us to find out more.

SSCP certification benefits

Information security professionals invest substantially in information assets, including technology, architecture and process. But how can protection of these assets be ensured? Only through the strengths of the professionals in charge.

Industry standards, ethics and certification of IS professionals and practitioners becomes critical to ensuring a higher standard for security is achieved. ISC2, as the only not-for-profit consortium charged with maintaining, administering and certifying IS professionals in the Common Body of Knowledge [CBK], is the premier resource for IS professionals worldwide.

Why Choose Firebrand Training for SSCP training?

  • ISC2 instructors present the SSCP Common Body of Knowledge (CBK) Seminar
  • We utilise only ISC2 copyrighted training material, which is unavailable to other non-partner organizations
  • Our zero-distraction, accelerated delivery model provides today's network and information security professionals with a value-added option for official, accelerated training on the seven domains of the SSCP Common Body of Knowledge (CBK).
  • You'll sit your SSCP exam during your course at the Firebrand Training Centre

You will benefit from participating in the program should you be a

  • Security administrator looking to improve your skills and employment opportunities
  • Company desiring to improve your security profile and competitive edge
  • Vendor wanting to enhance the marketability of your product with qualified security administrators

When you have certified personnel on staff, your company is operating at a known level of professional competency. Your risks are lowered and your liabilities decreased. Customers and investors are assured that your company can protect their investment. SSCPs have demonstrated their extensive knowledge of security administration. They have the ability to implement and maintain highly secure systems and to respond quickly to problems and violations. They reduce your risks and limit potential reputation, financial and business losses.

SSCP certification reduces training costs, as well by identifying highly qualified individuals for your security positions; people that can train and mentor your staff and improve their security awareness. A company-mandated certification program improves employee morale by creating a consistent career path that guarantees an employee's skills will remain current. It also improves your ability to attract and retain a highly competent staff.

Seven reasons why you should sit your course with Firebrand Training

  1. Two options of training. Choose between residential classroom-based, or online courses
  2. You'll be certified fast. With us, you’ll be trained in record time
  3. Our course is all-inclusive. A one-off fee covers all course materials, exams**, accommodation* and meals*. No hidden extras.
  4. Pass the first time or train again for free. This is our guarantee. We’re confident you’ll pass your course the first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  5. You’ll learn more. A day with a traditional training provider generally runs from 9 am – 5 pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day of quality learning time, with your instructor
  6. You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  7. You’ll be studying with the best. We’ve been named in the Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified over 135,000 professionals
  • * For residential training only. Doesn't apply for online courses
  • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts

Curriculum

This course covers the seven domains contained in the SSCP Common Body of Knowledge.

Domain 1: Access Controls

1.1 Implement and maintain authentication methods

  • Single/multifactor authentication
  • Single sign-on
  • Device authentication
  • Federated access

1.2 Support internetwork trust architectures

  • Trust relationships (e.g., 1-way, 2-way, transitive)
  • Extranet
  • Third party connections

1.3 Participate in the identity management lifecycle

  • Authorisation
  • Proofing
  • Provisioning/de-provisioning
  • Maintenance
  • Entitlement
  • Identity and Access Management (IAM) systems

1.4 Implement access controls

  • Mandatory
  • Non-discretionary
  • Discretionary
  • Role-based
  • Attribute-based
  • Subject-based
  • Object-based

Domain 2: Security Operations and Administration

2.1 Comply with codes of ethics

  • ISC2 Code of Ethics
  • Organisational code of ethics

2.2 Understand security concepts

2.3 Document, implement, and maintain functional security controls

  • Deterrent controls
  • Preventative controls
  • Detective controls
  • Corrective controls
  • Compensating controls

2.4 Participate in asset management

  • Lifecycle (hardware, software, and data)
  • Hardware inventory
  • Software inventory and licensing
  • Data storage

2.5 Implement security controls and assess compliance

  • Technical controls (e.g., session timeout, password aging)
  • Physical controls (e.g., mantrap, cameras, locks)
  • Administrative controls (e.g., security policies and standards, procedures, baselines)
  • Periodic audit and review
  • Confidentiality
  • Integrity
  • Availability
  • Accountability
  • Privacy
  • Non-repudiation
  • Least privilege
  • Separation of duties

2.6 Participate in change management

  • Execute change management process
  • Identify security impact
  • Testing /implementing patches, fixes, and updates (e.g., operating system, applications, SDLC)

2.7 Participate in security awareness and training

2.8 Participate in physical security operations (e.g., data centre assessment, badging)

Domain 3: Risk Identification, Monitoring, and Analysis

3.1 Understand the risk management process

  • Risk visibility and reporting (e.g., risk register, sharing threat intelligence, Common Vulnerability Scoring System (CVSS))
  • Risk management concepts (e.g., impact assessments, threat modelling, Business Impact Analysis (BIA))
  • Risk management frameworks (e.g., ISO, NIST)
  • Risk treatment (e.g., accept, transfer, mitigate, avoid, recast)

3.2 Perform security assessment activities

  • Participate in security testing
  • Interpretation and reporting of scanning and testing results
  • Remediation validation
  • Audit finding remediation

3.3 Operate and maintain monitoring systems (e.g., continuous monitoring)

  • Events of interest (e.g., anomalies, intrusions, unauthorised changes, compliance monitoring)
  • Logging
  • Source systems
  • Legal and regulatory concerns (e.g., jurisdiction, limitations, privacy)

3.4 Analyse monitoring results

  • Security baselines and anomalies
  • Visualisations, metrics, and trends (e.g., dashboards, timelines)
  • Event data analysis
  • Document and communicate findings (e.g., escalation)

Domain 4: Incident Response and Recovery

4.1 Support incident lifecycle

  • Preparation
  • Detection, analysis, and escalation
  • Containment
  • Eradication
  • Recovery
  • Lessons learned/implementation of new countermeasure

4.2 Understand and support forensic investigations

  • Legal and ethical principles
  • Evidence handling (e.g., first responder, triage, chain of custody, preservation of scene)

4.3 Understand and support Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) activities

  • Emergency response plans and procedures (e.g., information system contingency plan)
  • Interim or alternate processing strategies
  • Restoration planning
  • Backup and redundancy implementation
  • Testing and drills

Domain 5: Cryptography

5.1 Understand fundamental concepts of cryptography

5.2 Understand reasons and requirements for cryptography

5.3 Understand and support secure protocols

5.4 Understand Public Key Infrastructure (PKI) systems

  • Fundamental key management concepts (e.g., key rotation, key composition, key creation, exchange, revocation, escrow)
  • Web of Trust (WOT) (e.g., PGP, GPG)
  • Hashing
  • Salting
  • Symmetric/asymmetric encryption/Elliptic Curve Cryptography (ECC)
  • Non-repudiation (e.g., digital signatures/ certificates, HMAC, audit trail)
  • Encryption algorithms (e.g., AES, RSA)
  • Key strength (e.g., 256, 512, 1024, 2048 bit keys)
  • Cryptographic attacks, cryptanalysis, and counter measures
  • Confidentiality
  • Integrity and authenticity
  • Data sensitivity (e.g., PII, intellectual property, PHI)
  • Regulatory
  • Services and protocols (e.g., IPSec, TLS, S/MIME, DKIM)
  • Common use cases
  • Limitations and vulnerabilities

6.1 Understand and apply fundamental concepts of networking

6.2 Understand network attacks and countermeasures (e.g., DDoS, man-in-the-middle, DNS poisoning)

6.3 Manage network access controls

  • Network access control and monitoring (e.g., remediation, quarantine, admission)
  • Network access control standards and protocols (e.g., IEEE 802.1X, Radius, TACACS)
  • Remote access operation and configuration (e.g., thin client, SSL VPN, IPSec VPN, telework)

6.4 Manage network security

  • Logical and physical placement of network devices (e.g., inline, passive)
  • Segmentation (e.g., physical/logical, data/control plane, VLAN, ACLs)
  • Secure device management 6.5 Operate and configure network-based security devices
  • Firewalls and proxies (e.g., filtering methods)
  • Network intrusion detection/prevention systems
  • Routers and switches
  • Traffic-shaping devices (e.g., WAN optimisation, load balancing)

6.6 Operate and configure wireless technologies (e.g., bluetooth, NFC, WiFi)

  • Transmission security
  • Wireless security devices (e.g.,WIPS, WIDS)
  • Domain 6: Network and Communications Security
  • OSI and TCP/IP models
  • Network topographies (e.g., ring, star, bus, mesh, tree)
  • Network relationships (e.g., peer to peer, client server)
  • Transmission media types (e.g., fiber, wired, wireless)
  • Commonly used ports and protocols

Domain 7: Systems and Application Security

7.1 Identify and analyse malicious code and activity Malware (e.g., rootkits, spyware, scareware, ransomware, trojans, virus, worms, trapdoors, backdoors, and remote access trojans)

  • Malicious code countermeasures (e.g., scanners, anti-malware, code signing, sandboxing)
  • Malicious activity (e.g., insider threat, data theft, DDoS, botnet)
  • Malicious activity countermeasures (e.g., user awareness, system hardening, patching, sandboxing, isolation)

7.2 Implement and operate endpoint device security

7.3 Operate and configure cloud security

7.4 Operate and secure virtual environments

  • HIDS
  • Host-based firewalls
  • Application white listing
  • Endpoint encryption
  • Trusted Platform Module (TPM)
  • Mobile Device Management (MDM) (e.g., COPE, BYOD)
  • Secure browsing (e.g., sandbox)
  • Deployment models (e.g., public, private, hybrid, community)
  • Service models (e.g., IaaS, PaaS and SaaS)
  • Virtualisation (e.g., hypervisor)
  • Legal and regulatory concerns (e.g., privacy, surveillance, data ownership, jurisdiction, eDiscovery)
  • Data storage and transmission (e.g., archiving, recovery, resilience)
  • Third party/outsourcing requirements (e.g., SLA, data portability, data destruction, auditing)
  • Shared responsibility model
  • Software-defined networking
  • Hypervisor
  • Virtual appliances
  • Continuity and resilience
  • Attacks and countermeasures
  • Shared storage

Exam Track

On this accelerated course, you'll prepare for and sit your SSCP exam at the Firebrand Training Centre, covered by your Certification Guarantee.

Exam Details:

  • Length of exam - 3 hours
  • Number of questions: 125
  • Question format: Multiple choice
  • Passing grade: 700 out of 1000 points

To qualify for this cyber security certification, you must pass the exam and have at least one year of cumulative, paid work experience in one or more of the seven domains of the ISC2 SSCP Common Body of Knowledge (CBK), or a degree (bachelors or masters) in a recognised cyber security program.

If you don't have the required experience to become an SSCP, you can become an Associate of ISC2 by successfully passing the SSCP examination. You then have two years to earn the one year required experience.

Re-certification is required every three years. You can maintain the certification by meeting all of the ISC2 SSCP renewal requirements.

What's Included

The SSCP Accelerated Course encompasses the ISC2 SSCP CBK Review Seminar, intense hands-on instruction, tailored pre-reading materials, meals, and accommodations. We attend to every detail so our students can focus solely on their studies.

The SSCP CBK Review

The official ISC2 SSCP CBK Review Seminar (Student Handbook).

Authorised ISC2 Instructors & Courseware

Firebrand Training utilises the official ISC2 copyrighted training materials for the program delivery. These materials have been derived from extensive work from SSCPs, CISSPs, ISC2 Instructors, and Subject Matter Experts in developing material and presentation.

Accommodation & Meals

Accommodation is provided for you in a modern, en-suite bedroom - making studying comfortable and convenient. Breakfasts, lunches, dinner, fresh-brewed coffee, and ample snacks and beverages are provided throughout the day.

CPE credits can be earned by attending this 5-day SSCP course. ISC2 recognises a maximum of 40 CPEs for an existing ISC2 certification holder.

Your accelerated course includes:

  • Accommodation *
  • Meals, unlimited snacks, beverages, tea and coffee *
  • On-site exams **
  • Exam vouchers **
  • Practice tests **
  • Certification Guarantee ***
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Digital courseware **
  • * For residential training only. Accommodation is included from the night before the course starts. This doesn't apply for online courses.
  • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts
  • *** Pass first time or train again free as many times as it takes, unlimited for 1 year. Just pay for accommodation, exams, and incidental costs.

Prerequisites

There are currently no formal prerequisites to attend the SSCP course. Though it is recommended that students have some knowledge of other IT domains, including a basic working knowledge of network technologies. The CompTIA Security+ certification, while not required, would also be beneficial.

In order to attain the SSCP certification, delegates require a minimum of one year’s cumulative paid full-time work experience in one or more of the seven domains covered in the SSCP CBK. Valid experience includes information systems security-related work performed, or work that requires information security knowledge and involves direct application of that knowledge.

If you do not have the required experience, you may still sit for the exam and become an Associate of ISC2 until you have gained the required experience.

Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 134561 students and asked them all to review our Accelerated Learning. Currently, 96.41% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"Good training - kept things interesting and people engaged even with the more dry material of the course"
Anonymous (8/5/2023 (Monday) to 12/5/2023 (Friday))

"The materials are comprehensive and the course delivery was detailed and interactive."
SK. (8/5/2023 (Monday) to 12/5/2023 (Friday))

"Course was structured well with an instructor who was able to pick out the important parts of the course through the wall of text in the books. He also provided multiple answering stages to keep engagement and was animated to make the course "fun"... Or as fun as 5 near 10 hours days can be!"
HH. (8/5/2023 (Monday) to 12/5/2023 (Friday))

"I would recommend Firebrand, Its very intensive and requires full days and then revision after. if this is for you then I would 100% go for it"
Chris Baars, Maersk. (18/11/2019 (Monday) to 22/11/2019 (Friday))

"Thank you to the excellent trainer, she really helped break down the course to relatable examples. "
Sheetal Tank. (3/6/2019 (Monday) to 7/6/2019 (Friday))

Course Dates

ISC2 - SSCP - Systems Security Certified Practitioner

Start

Finish

Status

Book now

4/3/2024 (Monday)

8/3/2024 (Friday)

Finished - Leave feedback

 

16/9/2024 (Monday)

20/9/2024 (Friday)

Open

Book now

Latest Reviews from our students