课程信息
4.6
8 个评分
2 个审阅
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为17 小时

建议:5 hours/week...
可选语言

英语(English)

字幕:英语(English)
100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
初级

初级

完成时间(小时)

完成时间大约为17 小时

建议:5 hours/week...
可选语言

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 3 小时

Understand and Comply with Code of Ethics and Security Concepts

Module Topics: (ISC)2 Code of Ethics, Organizational Code of Ethics, There are usually three types of controls, managerial (sometimes called administrative), Technical (sometimes called logical), and physical (sometimes called operational), Deterrent, Preventative, Detective, and Corrective Controls. Understand and Comply with Code of Ethics: In (ISC)2 Code of Ethics, you will learn about Code of Ethics, and Code of Ethics Canons. In Organizational Code of Ethics, you will learn about how a code of ethics applies to security practitioners, and applying ethical principles. Understand Security Concepts: In Confidentiality, you will learn about consequences of a breach, and ensuring confidentiality. In integrity, you will learn about consequences of integrity failure, availability, and consequences of availability failures. You will also Non-Repudiation. In Privacy, you will understand core guidelines. In least privilege, you will learn about least privilege and cots Applications. You will understand the concept of separation of duties and defense in depth, examples approaches, and additional controls. In Risk based Controls, you will learn about risk assessment data. Security concepts also covers accountability and authorization. ...
Reading
10 个视频 (总计 67 分钟), 10 个阅读材料, 1 个测验
Video10 个视频
Security Concepts: Confidentiality7分钟
Security Concepts: Ensuring Confidentiality4分钟
Security Concepts: Consequences of Integrity Failures6分钟
Security Concepts: Core Guidelines5分钟
Security Concepts: Least Privilege7分钟
Security Concepts: Additional Controls6分钟
Security Concepts: Risk Assessment Data5分钟
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls5分钟
Security Controls: Timeline of a Security Incident6分钟
Reading10 个阅读材料
Understand and Comply with Code of Ethics10分钟
Security Concepts: Confidentiality10分钟
Security Concepts: Ensuring Confidentiality10分钟
Security Concepts: Consequences of Integrity Failures10分钟
Security Concepts: Core Guidelines10分钟
Security Concepts: Least Privilege10分钟
Security Concepts: Additional Controls10分钟
Security Concepts: Risk Assessment Data10分钟
Security Controls: Deterrent, Preventive, Detective, and Corrective Controls10分钟
Security Controls: Timeline of a Security Incident10分钟
Quiz1 个练习
Quiz 120分钟
2
完成时间(小时)
完成时间为 4 小时

Participate in Asset Management

Module Topics: Life Cycle, Hardware/Software, and Data. In life Cycle, you will learn about the waterfall model, it's benefits and drawbacks, requirements gathering and analysis, requirements definition, system design, implementation, integration, testing, deployment of system, maintenance, additional application development methods, system vulnerabilities, secure development, and acquisition practices, OWASP top ten, guidelines for developers, IT asset management (ITAM), device management, continuous diagnostics and mitigation (CDM), hardware, hardware asset management desired state, hardware asset management data, the SSCP's challenge, impact and results. In Data, you will learn about secure information storage, considerations, encryption vulnerabilities, database encryption, data scrubbing, data deduplication, managing encryption keys, consideration, Information Rights Management (IRM), secure output, data retention and disposal, shredders, security levels, destruction of magnetic media, erasure or reformatting, data wiping, degaussing, and disclosure controls: data leakage prevention....
Reading
14 个视频 (总计 84 分钟), 14 个阅读材料, 1 个测验
Video14 个视频
Asset Management: The Waterfall Model10分钟
Asset Management: Benefits and Drawbacks5分钟
Asset Management: Deployment of System4分钟
Asset Management: OWASP Top Ten5分钟
Asset Management: Guidelines for Developers5分钟
Asset Management: IT Asset Management (ITAM)5分钟
Asset Management: Impact and Result4分钟
Asset Management: Encryption Vulnerabilities6分钟
Asset Management: Data Scrubbing6分钟
Asset Management: Considerations6分钟
Asset Management: Secure Output6分钟
Asset Management: Destruction of Magnetic Media4分钟
Asset Management: Disclosure Controls4分钟
Reading14 个阅读材料
Asset Management: Life Cycle10分钟
Asset Management: The Waterfall Model10分钟
Asset Management: Benefits and Drawbacks10分钟
Asset Management: Deployment of System10分钟
Asset Management: OWASP Top Ten10分钟
Asset Management: Guidelines for Developers10分钟
Asset Management: IT Asset Management (ITAM)10分钟
Asset Management: Impact and Result10分钟
Asset Management: Encryption Vulnerabilities10分钟
Asset Management: Data Scrubbing10分钟
Asset Management: Considerations10分钟
Asset Management: Secure Output10分钟
Asset Management: Destruction of Magnetic Media10分钟
Asset Management: Disclosure Controls10分钟
Quiz1 个练习
Quiz 220分钟
3
完成时间(小时)
完成时间为 3 小时

Implement and Assess Compliance with Controls & Participate in Change Management Duties

Module Topics: Technical Controls, Operational Controls, Managerial Controls, Security Policies, Standards, Guidelines, and Procedures, Implementation and Configuration Management Plan, security Impact Assessment, System Architecture/Interoperability of Systems, Testing Patches, Fixes, and Updates. In technical Controls, you will learn about identification and authentication, logical access controls, public access controls, audit trails. In Operational Controls, you will learn about operational security measures, operational solutions, managerial Controls. In Security Policies, Standards, Guidelines, and Procedures, you will learn about subject-specific security policies, typical policy elements, policy life cycle, components of a security policy, standard guidelines, and procedures. Participate in Change Management Duties: In Implementation and Configuration Management Plan, you will learn about release management, release manager, release management policy, release management process, code signing, release management tools, systems assurance and controls validation, configuration management (CM), CM process, CM system goals, operational aspects of CM, hardware inventory, software inventory, configuration lists, configuration management for opening systems, identification, automated configuration management tools, control, accounting, and auditing. You will also understand the concepts of Security Impact Assessment and System Architecture/Interoperability of Systems. In Testing, Patches, Fixes, and Updates, you will learn about patch management, patch management process....
Reading
9 个视频 (总计 58 分钟), 9 个阅读材料, 1 个测验
Video9 个视频
Compliance with Controls: Managerial Controls6分钟
Compliance with Controls: Policy Life Cycle7分钟
Change Management Duties: Implementation and Configuration Management Plan7分钟
Change Management Duties: Systems Assurance and Controls Validation5分钟
Change Management Duties: CM Process5分钟
Change Management Duties: Configuration Management for Operating Systems6分钟
Change Management Duties: Control8分钟
Change Management Duties: Testing Patches, Fixes, and Updates6分钟
Reading9 个阅读材料
Compliance with Controls: Technical Controls10分钟
Compliance with Controls: Managerial Controls10分钟
Compliance with Controls: Policy Life Cycle10分钟
Change Management Duties: Implementation and Configuration Management Plan10分钟
Change Management Duties: Systems Assurance and Controls10分钟
Change Management Duties: CM Process10分钟
Change Management Duties: Configuration Management for Operating Systems10分钟
Change Management Duties: Control10分钟
Change Management Duties: Testing Patches, Fixes, and Updates10分钟
Quiz1 个练习
Week 3 Quiz20分钟
4
完成时间(小时)
完成时间为 3 小时

Participate in Physical Security Operations & Security Awareness Training

Module Topics: Security Awareness Training, Physical Security, Building Security, keys, Locks, and safes, communications and Server Rooms, Restricted and Work Area Security, Utilities and HVAC Considerations, Fire Prevention, Detection, and Suppression. Participate in Physical Security Operations: In Physical Security, you will learn about interior access control elements, and escort and visitor control. In building security, you will learn about doors, perimeter doors, door locks, mantraps, and turnstiles. In Keys, Locks, and Safe, you will learn about types of locks, hi-tech keys, safes, vaults, containers, key control, medeco guide for developing and managing key control. In communications and Server Rooms, you will learn about securing the area, protection from lightning, server rooms, and rack security. In Restricted and Work Area Security, you will learn about restricted work areas, data center security, and the "two- person rule". In Utilities and HVAC Considerations, you will learn about utilities and power uninterruptible power supply, generator, HVAC, air contamination, guidelines, and water issues. In Fire Prevention, Detection, and Suppression, you will learn about fire detection, fire suppression, sprinkler systems, and gas suppression systems. ...
Reading
11 个视频 (总计 65 分钟), 11 个阅读材料, 1 个测验
Video11 个视频
Physical Security Operations: Doors4分钟
Physical Security Operations: Door Locks4分钟
Physical Security Operations: Turnstiles6分钟
Physical Security Operations: Securing the Area6分钟
Physical Security Operations: Rack Security5分钟
Physical Security Operations: HVAC6分钟
Security Operations: Sprinkler Systems5分钟
Security Operations: Gas Suppression Systems5分钟
Security Awareness Training: Critical Success Factors7分钟
Security Awareness Training: Training6分钟
Reading11 个阅读材料
Physical Security Operations: Physical Security10分钟
Physical Security Operations: Doors10分钟
Physical Security Operations: Door Locks10分钟
Physical Security Operations: Turnstiles10分钟
Physical Security Operations: Securing the Area10分钟
Physical Security Operations: Rack Security10分钟
Physical Security Operations: HVAC10分钟
Security Operations: Sprinkler Systems10分钟
Security Operations: Gas Suppression Systems10分钟
Security Awareness Training: Critical Success Factors10分钟
Security Awareness Training: Training10分钟
Quiz1 个练习
Week 4 Quiz20分钟
4.6
2 个审阅Chevron Right

热门审阅

创建者 GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

讲师

Avatar

(ISC)² Education & Training

Education & Training

关于 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

关于 (ISC)² Systems Security Certified Practitioner (SSCP) 专项课程

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常见问题

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • 此课程是 Coursera 上提供的众多课程之一,当前只对已购买课程或已获得助学金的学生开放。如果您要学习此课程,但却承担不起课程费用,我们建议您提交助学金申请。

  • The course schedule contains approximately 16 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 6 weeks.

还有其他问题吗?请访问 学生帮助中心