SSCP Certification Boot Camp
Take your career to the next level by earning one of the most in-demand security certifications available. You’ll leave fully prepared to pass the challenging SSCP exam and become an (ISC)² Systems Security Certified Practitioner.
Earn your SSCP, guaranteed!
Boot camp overview
SSCP holders are expected to have a broad range of skills related to implementing, monitoring and administering IT infrastructure in accordance with information security policies and procedures and industry best practices. This boot camp provides you with a proven method for mastering this huge range of knowledge. You’ll leave with the necessary skills to effectively implement, document and maintain security controls that ensure data confidentiality, integrity and availability.
Infosec’s proprietary SSCP certification courseware materials are always up to date and synchronized with the latest (ISC)² SSCP exam objectives. Our industry-leading curriculum combined with award- winning SSCP training, provided by expert instructors, delivers the platform you need in order to pass the SSCP exam with flying colors the first time you take it.
Skill up and get certified, guaranteed
Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Flex Pro or Flex Classroom course.
Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
What's included?
93% pass rate — the best in the industry
- Five days of intense SSCP training
- Infosec proprietary digital courseware (physical textbooks available to purchase)
- SSCP exam voucher
- 90-day access to replays of daily lessons (Flex Pro)
- 100% Satisfaction Guarantee
- Exam Pass Guarantee (Flex Pro)
What you'll learn
The goal of this boot camp is to prepare you for the challenging SSCP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). This material is matched to the most recent (ISC)² exam objectives and designed to provide you an unmatched, total immersion training experience that will successfully prepare you to pass the SSCP exam.
The seven SSCP domain areas include:
- Access controls
- Security operations and administration
- Risk identification, monitoring and analysis
- Incident response and recovery
- Cryptography
- Network and communication security
- Systems and application security
Who should attend?
- Network security engineers
- Security systems administrators
- Information assurance analysts
- IT security engineers
- IT security consultants
- Database administrators
- IT systems engineers
Prerequisites
In order to obtain the SSCP certification, you must have:
- At least one year of professional experience in the information security field
- A work history reflecting direct experience in at least one of the seven domains listed in the (ISC)² SSCP Common Body of Knowledge (CBK)
However, you can become an Associate of (ISC)² by passing the exam without the required work experience.
Why choose Infosec
Your flexible learning experience
Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best.
Public training boot camps held nationwide
- Pre-study course materials
- Live instruction
- Digital courseware
- Daily reinforcement materials
- Catered lunches
- Infosec community forum access
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
MOST POPULAR
Immersive, live-streamed instruction
- Pre-study course materials
- Live instruction
- Digital courseware
- Daily reinforcement materials
- Detailed performance reporting
- Video replays
- 90-day extended access to materials
- Infosec community forum access
- Exam Pass Guarantee
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
Tailored team training at your location
- Pre-study course materials
- Live, customized instruction at your location
- Digital courseware
- Daily reinforcement materials
- Detailed team performance reporting
- Video replays
- 90-day extended access to materials
- Infosec community forum access
- Exam Pass Guarantee
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
Can’t get away for a week?
Learn cybersecurity on-demand.
Get the cybersecurity training you need at a pace that fits your schedule with a subscription to Infosec Skills. Includes unlimited access to hundreds of additional on-demand courses — plus cloud-hosted cyber ranges where you can practice and apply knowledge in real-world scenarios — all for just $34 a month!
- 70+ learning paths
- 500+ courses
- Cloud-hosted cyber ranges and hands-on projects
- Skill assessments and certification practice exams
- Infosec community peer support
SSCP Boot Camp details
Boot camp schedule
Day 1
Access controls
- Authentication methods
- Authentication factors
- Single sign-on (SSO)
- Device authentication
- Federated access
- Internetwork trust architectures
- Types of trust relationships
- Extranet and third-party connections
- Identity management lifecycle
- Authorization
- Proofing
- Provisioning/de-provisioning
- Maintenance
- Entitlement
- Identity and access management (IAM) systems
- Access control implementation
- Access control models: mandatory, non-discretionary, discretionary
- RBAC (role-based access control)
- Attribute/subject/object-based access control
Day 2
Security operations and administration
- Codes of ethics
- (ISC)² Code of Ethics
- Organizational code of ethics
- Fundamental security concepts
- The C-I-A triad (Confidentiality-Integrity-Availability)
- Accountability
- Privacy and personal data protection
- Non-repudiation
- Least privilege
- Separation of duties
- Security control types
- Deterrent controls
- Preventative controls
- Detective controls
- Corrective controls
- Compensating controls
- Implementing security controls
- Documenting security controls
- Maintaining security controls
- Asset management
- Asset definition
- Asset lifecycle
- Asset inventory (hardware and software)
- Secure data storage
- Security control assessment
- Technical/Physical/Administrative controls
- Control audit and review
- Change management
- Change management process
- Security impact of changes
- Patch management
- Security awareness and training
- Physical security
Risk identification, monitoring and analysis
- Risk management process
- Risk visibility and reporting
- Risk management concepts
- Risk management frameworks
- Risk handling strategies
- Security assessments
- Security testing
- Test results interpretation and analysis
- Remediation
- Logging and monitoring
- Types of security events
- Logging
- Legal and regulatory considerations
- Security data analysis
- Security baselines
- Data visualization and metrics
- Documenting and communicating findings
Day 3
Incident response and recovery
- Incident lifecycle (incident response phases)
- Preparation
- Detection, analysis and escalation
- Containment
- Eradication
- Recovery
- Lessons learned/implementation of new countermeasure
- Forensic investigations
- Legal and ethical principles
- Evidence handling
- Business continuity (BC) and disaster recovery (DR)
- BC and DR plans
- Backup and recovery strategies
- Redundancy
- BC and DR plans testing
Cryptography
- Cryptography fundamentals
- Hashing and salting
- Symmetric and asymmetric encryption
- Authenticity and non-repudiation
- Encryption algorithms
- Cryptographic attacks and countermeasures
- Cryptography use cases and requirements
- Confidentiality, integrity and authenticity
- Sensitive data types
- Regulatory requirements
- Secure communication protocols
- Public key infrastructure (PKI)
- PKI architecture and components
- Key management
- Web of trust
Day 4
Network and communications security
- Networking fundamentals
- OSI and TCP/IP models
- Network topographies and architectures
- Transmission media types
- Common ports and protocols
- Network attacks and countermeasures
- Network access controls
- Standards and technologies
- Secure remote access
- Network security management
- Secure device placement
- Physical and logical segmentation
- Secure device management
- Network security devices
- Firewalls and proxies
- IDS/IPS
- Routers and switches
- Traffic-shaping devices
- Wireless security
Day 5
Systems and application security
- Malicious code and activity
- Malware types
- Malware countermeasures
- Malicious activity types and countermeasures
- Endpoint security
- HIDS and host-based firewalls
- Trusted platform module (TPM)
- Mobile device management (MDM)
- Sandboxing and application whitelisting
- Cloud security
- Cloud deployment and service models
- Virtualization concepts
- Data security in the cloud
- Third-party considerations
- Legal and regulatory considerations
- Virtualization security
- Software-defined networking
- Hypervisor
- Virtual appliances
- Continuity and resilience
- Attacks and countermeasures
- Shared storage
SCCP exam review
SSCP Certification Boot Camp
Take your career to the next level by earning one of the most in-demand security certifications available. You’ll leave fully prepared to pass the challenging SSCP exam and become an (ISC)² Systems Security Certified Practitioner.
Earn your SSCP, guaranteed!
Boot camp overview
SSCP holders are expected to have a broad range of skills related to implementing, monitoring and administering IT infrastructure in accordance with information security policies and procedures and industry best practices. This boot camp provides you with a proven method for mastering this huge range of knowledge. You’ll leave with the necessary skills to effectively implement, document and maintain security controls that ensure data confidentiality, integrity and availability.
Infosec’s proprietary SSCP certification courseware materials are always up to date and synchronized with the latest (ISC)² SSCP exam objectives. Our industry-leading curriculum combined with award- winning SSCP training, provided by expert instructors, delivers the platform you need in order to pass the SSCP exam with flying colors the first time you take it.
Skill up and get certified, guaranteed
Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.
100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Flex Pro or Flex Classroom course.
Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
What's included?
93% pass rate — the best in the industry
- Five days of intense SSCP training
- Infosec proprietary digital courseware (physical textbooks available to purchase)
- SSCP exam voucher
- 90-day access to replays of daily lessons (Flex Pro)
- 100% Satisfaction Guarantee
- Exam Pass Guarantee (Flex Pro)
What you'll learn
The goal of this boot camp is to prepare you for the challenging SSCP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). This material is matched to the most recent (ISC)² exam objectives and designed to provide you an unmatched, total immersion training experience that will successfully prepare you to pass the SSCP exam.
The seven SSCP domain areas include:
- Access controls
- Security operations and administration
- Risk identification, monitoring and analysis
- Incident response and recovery
- Cryptography
- Network and communication security
- Systems and application security
Who should attend?
- Network security engineers
- Security systems administrators
- Information assurance analysts
- IT security engineers
- IT security consultants
- Database administrators
- IT systems engineers
Prerequisites
In order to obtain the SSCP certification, you must have:
- At least one year of professional experience in the information security field
- A work history reflecting direct experience in at least one of the seven domains listed in the (ISC)² SSCP Common Body of Knowledge (CBK)
However, you can become an Associate of (ISC)² by passing the exam without the required work experience.
Why choose Infosec
Your flexible learning experience
Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best.
Public training boot camps held nationwide
- Pre-study course materials
- Live instruction
- Digital courseware
- Daily reinforcement materials
- Catered lunches
- Infosec community forum access
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
MOST POPULAR
Immersive, live-streamed instruction
- Pre-study course materials
- Live instruction
- Digital courseware
- Daily reinforcement materials
- Detailed performance reporting
- Video replays
- 90-day extended access to materials
- Infosec community forum access
- Exam Pass Guarantee
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
Tailored team training at your location
- Pre-study course materials
- Live, customized instruction at your location
- Digital courseware
- Daily reinforcement materials
- Detailed team performance reporting
- Video replays
- 90-day extended access to materials
- Infosec community forum access
- Exam Pass Guarantee
- 100% Satisfaction Guarantee
- Knowledge Transfer Guarantee
Can’t get away for a week?
Learn cybersecurity on-demand.
Get the cybersecurity training you need at a pace that fits your schedule with a subscription to Infosec Skills. Includes unlimited access to hundreds of additional on-demand courses — plus cloud-hosted cyber ranges where you can practice and apply knowledge in real-world scenarios — all for just $34 a month!
- 70+ learning paths
- 500+ courses
- Cloud-hosted cyber ranges and hands-on projects
- Skill assessments and certification practice exams
- Infosec community peer support
SSCP Boot Camp details
Boot camp schedule
Day 1
Access controls
- Authentication methods
- Authentication factors
- Single sign-on (SSO)
- Device authentication
- Federated access
- Internetwork trust architectures
- Types of trust relationships
- Extranet and third-party connections
- Identity management lifecycle
- Authorization
- Proofing
- Provisioning/de-provisioning
- Maintenance
- Entitlement
- Identity and access management (IAM) systems
- Access control implementation
- Access control models: mandatory, non-discretionary, discretionary
- RBAC (role-based access control)
- Attribute/subject/object-based access control
Day 2
Security operations and administration
- Codes of ethics
- (ISC)² Code of Ethics
- Organizational code of ethics
- Fundamental security concepts
- The C-I-A triad (Confidentiality-Integrity-Availability)
- Accountability
- Privacy and personal data protection
- Non-repudiation
- Least privilege
- Separation of duties
- Security control types
- Deterrent controls
- Preventative controls
- Detective controls
- Corrective controls
- Compensating controls
- Implementing security controls
- Documenting security controls
- Maintaining security controls
- Asset management
- Asset definition
- Asset lifecycle
- Asset inventory (hardware and software)
- Secure data storage
- Security control assessment
- Technical/Physical/Administrative controls
- Control audit and review
- Change management
- Change management process
- Security impact of changes
- Patch management
- Security awareness and training
- Physical security
Risk identification, monitoring and analysis
- Risk management process
- Risk visibility and reporting
- Risk management concepts
- Risk management frameworks
- Risk handling strategies
- Security assessments
- Security testing
- Test results interpretation and analysis
- Remediation
- Logging and monitoring
- Types of security events
- Logging
- Legal and regulatory considerations
- Security data analysis
- Security baselines
- Data visualization and metrics
- Documenting and communicating findings
Day 3
Incident response and recovery
- Incident lifecycle (incident response phases)
- Preparation
- Detection, analysis and escalation
- Containment
- Eradication
- Recovery
- Lessons learned/implementation of new countermeasure
- Forensic investigations
- Legal and ethical principles
- Evidence handling
- Business continuity (BC) and disaster recovery (DR)
- BC and DR plans
- Backup and recovery strategies
- Redundancy
- BC and DR plans testing
Cryptography
- Cryptography fundamentals
- Hashing and salting
- Symmetric and asymmetric encryption
- Authenticity and non-repudiation
- Encryption algorithms
- Cryptographic attacks and countermeasures
- Cryptography use cases and requirements
- Confidentiality, integrity and authenticity
- Sensitive data types
- Regulatory requirements
- Secure communication protocols
- Public key infrastructure (PKI)
- PKI architecture and components
- Key management
- Web of trust
Day 4
Network and communications security
- Networking fundamentals
- OSI and TCP/IP models
- Network topographies and architectures
- Transmission media types
- Common ports and protocols
- Network attacks and countermeasures
- Network access controls
- Standards and technologies
- Secure remote access
- Network security management
- Secure device placement
- Physical and logical segmentation
- Secure device management
- Network security devices
- Firewalls and proxies
- IDS/IPS
- Routers and switches
- Traffic-shaping devices
- Wireless security
Day 5
Systems and application security
- Malicious code and activity
- Malware types
- Malware countermeasures
- Malicious activity types and countermeasures
- Endpoint security
- HIDS and host-based firewalls
- Trusted platform module (TPM)
- Mobile device management (MDM)
- Sandboxing and application whitelisting
- Cloud security
- Cloud deployment and service models
- Virtualization concepts
- Data security in the cloud
- Third-party considerations
- Legal and regulatory considerations
- Virtualization security
- Software-defined networking
- Hypervisor
- Virtual appliances
- Continuity and resilience
- Attacks and countermeasures
- Shared storage
SCCP exam review