Arrow Electronics, Inc.

SSCP Value Bundle for CC holders

CODE: ISC_SSCP-CC

LÄNGE: 1440 Hours (180 Tage)

PREIS: €375,00

Beschreibung

As the cybersecurity landscape continues to evolve, it is essential to demonstrate the unique knowledge and capabilities you bring to security defenses. Elevate your skills now with ISC2, your trusted membership association and the premier global association for cybersecurity professionals.

Our limited-time Systems Security Certified Practitioner (SSCP) Certification Bundle is available exclusively to CC holders. For just U.S. $375, you’ll receive:

  • SSCP Online Self-Paced Training – Providing 180-day access to expertly designed adaptive training content
  • SSCP Exam + Peace of Mind Protection – Including one free retake if necessary 

This exclusive SSCP bundle combines flexibility, support and great value to help you take the next step with confidence.

Lernziel

Why Choose SSCP? 

SSCP certification demonstrates that you have the advanced knowledge and skills to implement, monitor and administer IT infrastructure using information security policies and procedures. You’re key to protecting the confidentiality, integrity and availability of data for individuals and organizations.  

About SSCP Online Self-Paced Training

Official ISC2 Online Self-Paced SSCP Training leverages the power of artificial intelligence, guiding you through a customized learning experience adapted to your unique needs.

Voraussetzungen

Learners must meet these requisites to earn their certificate:

  • Complete and pass each domain with a score of 70% or higher (includes all knowledge checks and the end-of-domain assessment).
  • Complete the Learner Acknowledgement, verifying you are enrolled and authorized to take the final assessment.
  • Complete and pass the final assessment with a score of 70% or higher.
  • Complete the course evaluation survey.

 

Hardware Specifications

  • Processor 2 GHz +
  • RAM 4 GB +
  • Monitor minimum resolution (1024 x 768)
  • Video card
  • Keyboard and mouse or other assistive technology

Computer Peripherals

  • Speakers/headphones (noise-cancelling headset is recommended)
  • Microphone
  • Camera (recommended)
  • Supported Operating Systems

    • Macintosh OS X 10.10 to present
    • Windows 10 to present
    • Supported Browsers

      • Google Chrome
      • Microsoft Edge
      • Mozilla Firefox
      • Application Software

        • Adobe Reader:
        • https://get.adobe.com/reader/

          Inhalt

          What Is Covered?

          • Domain 1: Security Concepts and Practices
          • Domain 2: Access Controls
          • Domain 3: Risk Identification, Monitoring, and Analysis
          • Domain 4: Incident Response and Recovery
          • Domain 5: Cryptography
          • Domain 6: Network and Communications Security
          • Domain 7: Systems and Application Security

          What Will You Learn?

          • Analyze the key concepts involved in implementing, documenting, and maintaining functional security controls.
          • Implement the processes of the asset and change management life cycles in security operations and administration.
          • Relate the access controls and authentication methods to the identity management life cycle.
          • Apply the internet trust architectures to ensure secure and reliable interactions across interconnected networks.
          • Select the vulnerability management activities based on security assessments, relevant compliance and legal issues, and the risk management process.
          • Safeguard an organization’s IT environment by classifying and applying tools for information collection, prioritizing security events, and managing log files to support effective security monitoring.
          • Develop the incident response policies and processes, business continuity plans, and disaster recovery strategies that align with organizational and regulatory requirements.
          • Participate in forensic investigations by practicing methodologies for evidence collection, analysis, and reporting.
          • Apply cryptography concepts.
          • Apply protocols such as Transport Layer Security (TLS)/Secure Sockets Layer (SSL) for secure data transmission.
          • Select the services and protocols to secure data transmission in consideration of their limitations and vulnerabilities.
          • Apply the key management practices and Web of Trust principles to establish and maintain secure, trusted communications and data protection mechanisms.
          • Weitere Informationen

            What’s Included

            • Self-paced online adaptive learning journey
            • Data-driven analytics dashboard for real-time feedback on learner progress
            • Robust search functionality to narrow topics
            • Pre- and post-course assessments
            • Knowledge checks and end-of-domain quizzes
            • Digital eTextbook
            • Interactive content
            • Domain-by-domain study sheets with key points
            • Email content support
            • Online interactive flash cards
            • Glossary of Terms
            • 24/7/365 chat technical support

             

            • Languages Offered
              At this time, content is only available in English.
            • Cancellation Policy

            • Refunds for any ISC2 courses will not be provided.

            Kurstermine