課程信息
4.5
11 個評分
4 個審閱
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為17 小時

建議:5 hours/week...
可選語言

英語(English)

字幕:英語(English)
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為17 小時

建議:5 hours/week...
可選語言

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 3 小時

Understand and Comply with Code of Ethics and Security Concepts

Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization. ...
Reading
10 個視頻 (總計 67 分鐘), 10 個閱讀材料, 1 個測驗
Video10 個視頻
Security Concepts: Confidentiality7分鐘
Security Concepts: Ensuring Confidentiality4分鐘
Security Concepts: Consequences of Integrity Failures6分鐘
Security Concepts: Core Guidelines5分鐘
Security Concepts: Least Privilege7分鐘
Security Concepts: Additional Controls6分鐘
Security Concepts: Risk Assessment Data5分鐘
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls5分鐘
Security Controls: Timeline of a Security Incident6分鐘
Reading10 個閱讀材料
Understand and Comply with Code of Ethics10分鐘
Security Concepts: Confidentiality10分鐘
Security Concepts: Ensuring Confidentiality10分鐘
Security Concepts: Consequences of Integrity Failures10分鐘
Security Concepts: Core Guidelines10分鐘
Security Concepts: Least Privilege10分鐘
Security Concepts: Additional Controls10分鐘
Security Concepts: Risk Assessment Data10分鐘
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls10分鐘
Security Controls: Timeline of a Security Incident10分鐘
Quiz1 個練習
Quiz 120分鐘
2
完成時間(小時)
完成時間為 4 小時

Participate in Asset Management

Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention....
Reading
14 個視頻 (總計 84 分鐘), 14 個閱讀材料, 1 個測驗
Video14 個視頻
Asset Management: The Waterfall Model10分鐘
Asset Management: Benefits and Drawbacks5分鐘
Asset Management: Deployment of System4分鐘
Asset Management: OWASP Top Ten5分鐘
Asset Management: Guidelines for Developers5分鐘
Asset Management: IT Asset Management (ITAM)5分鐘
Asset Management: Impact and Result4分鐘
Asset Management: Encryption Vulnerabilities6分鐘
Asset Management: Data Scrubbing6分鐘
Asset Management: Considerations6分鐘
Asset Management: Secure Output6分鐘
Asset Management: Destruction of Magnetic Media4分鐘
Asset Management: Disclosure Controls4分鐘
Reading14 個閱讀材料
Asset Management: Life Cycle10分鐘
Asset Management: The Waterfall Model10分鐘
Asset Management: Benefits and Drawbacks10分鐘
Asset Management: Deployment of System10分鐘
Asset Management: OWASP Top Ten10分鐘
Asset Management: Guidelines for Developers10分鐘
Asset Management: IT Asset Management (ITAM)10分鐘
Asset Management: Impact and Result10分鐘
Asset Management: Encryption Vulnerabilities10分鐘
Asset Management: Data Scrubbing10分鐘
Asset Management: Considerations10分鐘
Asset Management: Secure Output10分鐘
Asset Management: Destruction of Magnetic Media10分鐘
Asset Management: Disclosure Controls10分鐘
Quiz1 個練習
Quiz 220分鐘
3
完成時間(小時)
完成時間為 3 小時

Implement and Assess Compliance with Controls & Participate in Change Management Duties

Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures. Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process....
Reading
9 個視頻 (總計 58 分鐘), 9 個閱讀材料, 1 個測驗
Video9 個視頻
Compliance with Controls: Managerial Controls6分鐘
Compliance with Controls: Policy Life Cycle7分鐘
Change Management Duties: Implementation and Configuration Management Plan7分鐘
Change Management Duties: Systems Assurance and Controls Validation5分鐘
Change Management Duties: CM Process5分鐘
Change Management Duties: Configuration Management for Operating Systems6分鐘
Change Management Duties: Control8分鐘
Change Management Duties: Testing Patches, Fixes, and Updates6分鐘
Reading9 個閱讀材料
Compliance with Controls: Technical Controls10分鐘
Compliance with Controls: Managerial Controls10分鐘
Compliance with Controls: Policy Life Cycle10分鐘
Change Management Duties: Implementation and Configuration Management Plan10分鐘
Change Management Duties: Systems Assurance and Controls10分鐘
Change Management Duties: CM Process10分鐘
Change Management Duties: Configuration Management for Operating Systems10分鐘
Change Management Duties: Control10分鐘
Change Management Duties: Testing Patches, Fixes, and Updates10分鐘
Quiz1 個練習
Week 3 Quiz20分鐘
4
完成時間(小時)
完成時間為 3 小時

Participate in Physical Security Operations & Security Awareness Training

Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems. ...
Reading
11 個視頻 (總計 65 分鐘), 11 個閱讀材料, 1 個測驗
Video11 個視頻
Physical Security Operations: Doors4分鐘
Physical Security Operations: Door Locks4分鐘
Physical Security Operations: Turnstiles6分鐘
Physical Security Operations: Securing the Area6分鐘
Physical Security Operations: Rack Security5分鐘
Physical Security Operations: HVAC6分鐘
Security Operations: Sprinkler Systems5分鐘
Security Operations: Gas Suppression Systems5分鐘
Security Awareness Training: Critical Success Factors7分鐘
Security Awareness Training: Training6分鐘
Reading11 個閱讀材料
Physical Security Operations: Physical Security10分鐘
Physical Security Operations: Doors10分鐘
Physical Security Operations: Door Locks10分鐘
Physical Security Operations: Turnstiles10分鐘
Physical Security Operations: Securing the Area10分鐘
Physical Security Operations: Rack Security10分鐘
Physical Security Operations: HVAC10分鐘
Security Operations: Sprinkler Systems10分鐘
Security Operations: Gas Suppression Systems10分鐘
Security Awareness Training: Critical Success Factors10分鐘
Security Awareness Training: Training10分鐘
Quiz1 個練習
Week 4 Quiz20分鐘
4.5
4 個審閱Chevron Right

熱門審閱

創建者 GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

講師

Avatar

(ISC)² Education & Training

Education & Training

關於 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

關於 (ISC)² Systems Security Certified Practitioner (SSCP) 專項課程

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常見問題

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.

  • The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

還有其他問題嗎?請訪問 學生幫助中心