SSCP Certification Boot Camp
Rated 3.5/5 based on 11 customer reviews

SSCP Certification Boot Camp

Available: Out of Stock
$0.00

Request Info

SSCP Certification Boot Camp

Take your career to the next level by earning one of the most in-demand security certifications available. You’ll leave fully prepared to pass the challenging SSCP exam and become an (ISC)² Systems Security Certified Practitioner.

 

Earn your SSCP, guaranteed!

Boot camp overview

SSCP holders are expected to have a broad range of skills related to implementing, monitoring and administering IT infrastructure in accordance with information security policies and procedures and industry best practices. This boot camp provides you with a proven method for mastering this huge range of knowledge. You’ll leave with the necessary skills to effectively implement, document and maintain security controls that ensure data confidentiality, integrity and availability.

Infosec’s proprietary SSCP certification courseware materials are always up to date and synchronized with the latest (ISC)² SSCP exam objectives. Our industry-leading curriculum combined with award- winning SSCP training, provided by expert instructors, delivers the platform you need in order to pass the SSCP exam with flying colors the first time you take it.

Skill up and get certified, guaranteed

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Flex Pro or Flex Classroom course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

What's included?

93% pass rate — the best in the industry

  • Five days of intense SSCP training
  • Infosec proprietary digital courseware (physical textbooks available to purchase)
  • SSCP exam voucher
  • 90-day access to replays of daily lessons (Flex Pro)
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee (Flex Pro)

    What you'll learn

    The goal of this boot camp is to prepare you for the challenging SSCP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). This material is matched to the most recent (ISC)² exam objectives and designed to provide you an unmatched, total immersion training experience that will successfully prepare you to pass the SSCP exam.

    The seven SSCP domain areas include:

    • Access controls
    • Security operations and administration
    • Risk identification, monitoring and analysis
    • Incident response and recovery
    • Cryptography
    • Network and communication security
    • Systems and application security

    Who should attend?

    • Network security engineers
    • Security systems administrators
    • Information assurance analysts
    • IT security engineers
    • IT security consultants
    • Database administrators
    • IT systems engineers

    Prerequisites

    In order to obtain the SSCP certification, you must have:

    • At least one year of professional experience in the information security field
    • A work history reflecting direct experience in at least one of the seven domains listed in the (ISC)² SSCP Common Body of Knowledge (CBK)

    However, you can become an Associate of (ISC)² by passing the exam without the required work experience.

    Why choose Infosec

    Your flexible learning experience

    Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best.

    Public training boot camps held nationwide

    • Pre-study course materials
    • Live instruction
    • Digital courseware
    • Daily reinforcement materials
    • Catered lunches
    • Infosec community forum access
    • 100% Satisfaction Guarantee
    • Knowledge Transfer Guarantee

    MOST POPULAR

    Immersive, live-streamed instruction

    • Pre-study course materials
    • Live instruction
    • Digital courseware
    • Daily reinforcement materials
    • Detailed performance reporting
    • Video replays
    • 90-day extended access to materials
    • Infosec community forum access
    • Exam Pass Guarantee
    • 100% Satisfaction Guarantee
    • Knowledge Transfer Guarantee

    Tailored team training at your location

    • Pre-study course materials
    • Live, customized instruction at your location
    • Digital courseware
    • Daily reinforcement materials
    • Detailed team performance reporting
    • Video replays
    • 90-day extended access to materials
    • Infosec community forum access
    • Exam Pass Guarantee
    • 100% Satisfaction Guarantee
    • Knowledge Transfer Guarantee

    Can’t get away for a week?
    Learn cybersecurity on-demand.

    Get the cybersecurity training you need at a pace that fits your schedule with a subscription to Infosec Skills. Includes unlimited access to hundreds of additional on-demand courses — plus cloud-hosted cyber ranges where you can practice and apply knowledge in real-world scenarios — all for just $34 a month!

    • 70+ learning paths
    • 500+ courses
    • Cloud-hosted cyber ranges and hands-on projects
    • Skill assessments and certification practice exams
    • Infosec community peer support 

    SSCP Boot Camp details

    Boot camp schedule

    Day 1

    Access controls

    • Authentication methods
      • Authentication factors
      • Single sign-on (SSO)
      • Device authentication
      • Federated access
    • Internetwork trust architectures
      • Types of trust relationships
      • Extranet and third-party connections
    • Identity management lifecycle
      • Authorization
      • Proofing
      • Provisioning/de-provisioning
      • Maintenance
      • Entitlement
      • Identity and access management (IAM) systems
    • Access control implementation
      • Access control models: mandatory, non-discretionary, discretionary
      • RBAC (role-based access control)
      • Attribute/subject/object-based access control

    Day 2

    Security operations and administration

    • Codes of ethics
      • (ISC)² Code of Ethics
      • Organizational code of ethics
    • Fundamental security concepts
      • The C-I-A triad (Confidentiality-Integrity-Availability)
      • Accountability
      • Privacy and personal data protection
      • Non-repudiation
      • Least privilege
      • Separation of duties
    • Security control types
      • Deterrent controls
      • Preventative controls
      • Detective controls
      • Corrective controls
      • Compensating controls
    • Implementing security controls
    • Documenting security controls
    • Maintaining security controls
    • Asset management
      • Asset definition
      • Asset lifecycle
      • Asset inventory (hardware and software)
      • Secure data storage
    • Security control assessment
      • Technical/Physical/Administrative controls
      • Control audit and review
    • Change management
      • Change management process
      • Security impact of changes
      • Patch management
    • Security awareness and training
    • Physical security

    Risk identification, monitoring and analysis

    • Risk management process
      • Risk visibility and reporting
      • Risk management concepts
      • Risk management frameworks
      • Risk handling strategies
    • Security assessments
      • Security testing
      • Test results interpretation and analysis
      • Remediation
    • Logging and monitoring
      • Types of security events
      • Logging
      • Legal and regulatory considerations
    • Security data analysis
      • Security baselines
      • Data visualization and metrics
      • Documenting and communicating findings

    Day 3

    Incident response and recovery

    • Incident lifecycle (incident response phases)
      • Preparation
      • Detection, analysis and escalation
      • Containment
      • Eradication
      • Recovery
      • Lessons learned/implementation of new countermeasure
    • Forensic investigations
      • Legal and ethical principles
      • Evidence handling
    • Business continuity (BC) and disaster recovery (DR)
      • BC and DR plans
      • Backup and recovery strategies
      • Redundancy
      • BC and DR plans testing

    Cryptography

    • Cryptography fundamentals
      • Hashing and salting
      • Symmetric and asymmetric encryption
      • Authenticity and non-repudiation
      • Encryption algorithms
      • Cryptographic attacks and countermeasures
    • Cryptography use cases and requirements
      • Confidentiality, integrity and authenticity
      • Sensitive data types
      • Regulatory requirements
    • Secure communication protocols
    • Public key infrastructure (PKI)
      • PKI architecture and components
      • Key management
      • Web of trust

    Day 4

    Network and communications security

    • Networking fundamentals
      • OSI and TCP/IP models
      • Network topographies and architectures
      • Transmission media types
      • Common ports and protocols
    • Network attacks and countermeasures
    • Network access controls
      • Standards and technologies
      • Secure remote access
    • Network security management
      • Secure device placement
      • Physical and logical segmentation
      • Secure device management
    • Network security devices
      • Firewalls and proxies
      • IDS/IPS
      • Routers and switches
      • Traffic-shaping devices
    • Wireless security

    Day 5

    Systems and application security

    • Malicious code and activity
      • Malware types
      • Malware countermeasures
      • Malicious activity types and countermeasures
    • Endpoint security
      • HIDS and host-based firewalls
      • Trusted platform module (TPM)
      • Mobile device management (MDM)
      • Sandboxing and application whitelisting
    • Cloud security
      • Cloud deployment and service models
      • Virtualization concepts
      • Data security in the cloud
      • Third-party considerations
      • Legal and regulatory considerations
    • Virtualization security
      • Software-defined networking
      • Hypervisor
      • Virtual appliances
      • Continuity and resilience
      • Attacks and countermeasures
      • Shared storage

    SCCP exam review

    SSCP Certification Boot Camp

    Take your career to the next level by earning one of the most in-demand security certifications available. You’ll leave fully prepared to pass the challenging SSCP exam and become an (ISC)² Systems Security Certified Practitioner.

     

    Earn your SSCP, guaranteed!

    Boot camp overview

    SSCP holders are expected to have a broad range of skills related to implementing, monitoring and administering IT infrastructure in accordance with information security policies and procedures and industry best practices. This boot camp provides you with a proven method for mastering this huge range of knowledge. You’ll leave with the necessary skills to effectively implement, document and maintain security controls that ensure data confidentiality, integrity and availability.

    Infosec’s proprietary SSCP certification courseware materials are always up to date and synchronized with the latest (ISC)² SSCP exam objectives. Our industry-leading curriculum combined with award- winning SSCP training, provided by expert instructors, delivers the platform you need in order to pass the SSCP exam with flying colors the first time you take it.

    Skill up and get certified, guaranteed

    Exam Pass Guarantee

    If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year.

    100% Satisfaction Guarantee

    If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different Flex Pro or Flex Classroom course.

    Knowledge Transfer Guarantee

    If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

    What's included?

    93% pass rate — the best in the industry

    • Five days of intense SSCP training
    • Infosec proprietary digital courseware (physical textbooks available to purchase)
    • SSCP exam voucher
    • 90-day access to replays of daily lessons (Flex Pro)
    • 100% Satisfaction Guarantee
    • Exam Pass Guarantee (Flex Pro)

      What you'll learn

      The goal of this boot camp is to prepare you for the challenging SSCP exam by covering the objectives defined in the (ISC)² common body of knowledge (CBK). This material is matched to the most recent (ISC)² exam objectives and designed to provide you an unmatched, total immersion training experience that will successfully prepare you to pass the SSCP exam.

      The seven SSCP domain areas include:

      • Access controls
      • Security operations and administration
      • Risk identification, monitoring and analysis
      • Incident response and recovery
      • Cryptography
      • Network and communication security
      • Systems and application security

      Who should attend?

      • Network security engineers
      • Security systems administrators
      • Information assurance analysts
      • IT security engineers
      • IT security consultants
      • Database administrators
      • IT systems engineers

      Prerequisites

      In order to obtain the SSCP certification, you must have:

      • At least one year of professional experience in the information security field
      • A work history reflecting direct experience in at least one of the seven domains listed in the (ISC)² SSCP Common Body of Knowledge (CBK)

      However, you can become an Associate of (ISC)² by passing the exam without the required work experience.

      Why choose Infosec

      Your flexible learning experience

      Infosec Flex makes expert, live instruction convenient with online and in-person formats tailored to how, when and where you learn best.

      Public training boot camps held nationwide

      • Pre-study course materials
      • Live instruction
      • Digital courseware
      • Daily reinforcement materials
      • Catered lunches
      • Infosec community forum access
      • 100% Satisfaction Guarantee
      • Knowledge Transfer Guarantee

      MOST POPULAR

      Immersive, live-streamed instruction

      • Pre-study course materials
      • Live instruction
      • Digital courseware
      • Daily reinforcement materials
      • Detailed performance reporting
      • Video replays
      • 90-day extended access to materials
      • Infosec community forum access
      • Exam Pass Guarantee
      • 100% Satisfaction Guarantee
      • Knowledge Transfer Guarantee

      Tailored team training at your location

      • Pre-study course materials
      • Live, customized instruction at your location
      • Digital courseware
      • Daily reinforcement materials
      • Detailed team performance reporting
      • Video replays
      • 90-day extended access to materials
      • Infosec community forum access
      • Exam Pass Guarantee
      • 100% Satisfaction Guarantee
      • Knowledge Transfer Guarantee

      Can’t get away for a week?
      Learn cybersecurity on-demand.

      Get the cybersecurity training you need at a pace that fits your schedule with a subscription to Infosec Skills. Includes unlimited access to hundreds of additional on-demand courses — plus cloud-hosted cyber ranges where you can practice and apply knowledge in real-world scenarios — all for just $34 a month!

      • 70+ learning paths
      • 500+ courses
      • Cloud-hosted cyber ranges and hands-on projects
      • Skill assessments and certification practice exams
      • Infosec community peer support 

      SSCP Boot Camp details

      Boot camp schedule

      Day 1

      Access controls

      • Authentication methods
        • Authentication factors
        • Single sign-on (SSO)
        • Device authentication
        • Federated access
      • Internetwork trust architectures
        • Types of trust relationships
        • Extranet and third-party connections
      • Identity management lifecycle
        • Authorization
        • Proofing
        • Provisioning/de-provisioning
        • Maintenance
        • Entitlement
        • Identity and access management (IAM) systems
      • Access control implementation
        • Access control models: mandatory, non-discretionary, discretionary
        • RBAC (role-based access control)
        • Attribute/subject/object-based access control

      Day 2

      Security operations and administration

      • Codes of ethics
        • (ISC)² Code of Ethics
        • Organizational code of ethics
      • Fundamental security concepts
        • The C-I-A triad (Confidentiality-Integrity-Availability)
        • Accountability
        • Privacy and personal data protection
        • Non-repudiation
        • Least privilege
        • Separation of duties
      • Security control types
        • Deterrent controls
        • Preventative controls
        • Detective controls
        • Corrective controls
        • Compensating controls
      • Implementing security controls
      • Documenting security controls
      • Maintaining security controls
      • Asset management
        • Asset definition
        • Asset lifecycle
        • Asset inventory (hardware and software)
        • Secure data storage
      • Security control assessment
        • Technical/Physical/Administrative controls
        • Control audit and review
      • Change management
        • Change management process
        • Security impact of changes
        • Patch management
      • Security awareness and training
      • Physical security

      Risk identification, monitoring and analysis

      • Risk management process
        • Risk visibility and reporting
        • Risk management concepts
        • Risk management frameworks
        • Risk handling strategies
      • Security assessments
        • Security testing
        • Test results interpretation and analysis
        • Remediation
      • Logging and monitoring
        • Types of security events
        • Logging
        • Legal and regulatory considerations
      • Security data analysis
        • Security baselines
        • Data visualization and metrics
        • Documenting and communicating findings

      Day 3

      Incident response and recovery

      • Incident lifecycle (incident response phases)
        • Preparation
        • Detection, analysis and escalation
        • Containment
        • Eradication
        • Recovery
        • Lessons learned/implementation of new countermeasure
      • Forensic investigations
        • Legal and ethical principles
        • Evidence handling
      • Business continuity (BC) and disaster recovery (DR)
        • BC and DR plans
        • Backup and recovery strategies
        • Redundancy
        • BC and DR plans testing

      Cryptography

      • Cryptography fundamentals
        • Hashing and salting
        • Symmetric and asymmetric encryption
        • Authenticity and non-repudiation
        • Encryption algorithms
        • Cryptographic attacks and countermeasures
      • Cryptography use cases and requirements
        • Confidentiality, integrity and authenticity
        • Sensitive data types
        • Regulatory requirements
      • Secure communication protocols
      • Public key infrastructure (PKI)
        • PKI architecture and components
        • Key management
        • Web of trust

      Day 4

      Network and communications security

      • Networking fundamentals
        • OSI and TCP/IP models
        • Network topographies and architectures
        • Transmission media types
        • Common ports and protocols
      • Network attacks and countermeasures
      • Network access controls
        • Standards and technologies
        • Secure remote access
      • Network security management
        • Secure device placement
        • Physical and logical segmentation
        • Secure device management
      • Network security devices
        • Firewalls and proxies
        • IDS/IPS
        • Routers and switches
        • Traffic-shaping devices
      • Wireless security

      Day 5

      Systems and application security

      • Malicious code and activity
        • Malware types
        • Malware countermeasures
        • Malicious activity types and countermeasures
      • Endpoint security
        • HIDS and host-based firewalls
        • Trusted platform module (TPM)
        • Mobile device management (MDM)
        • Sandboxing and application whitelisting
      • Cloud security
        • Cloud deployment and service models
        • Virtualization concepts
        • Data security in the cloud
        • Third-party considerations
        • Legal and regulatory considerations
      • Virtualization security
        • Software-defined networking
        • Hypervisor
        • Virtual appliances
        • Continuity and resilience
        • Attacks and countermeasures
        • Shared storage

      SCCP exam review