课程信息

5,692 次近期查看
可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为17 小时
英语(English)

讲师

可分享的证书
完成后获得证书
100% 在线
立即开始,按照自己的计划学习。
可灵活调整截止日期
根据您的日程表重置截止日期。
初级
完成时间大约为17 小时
英语(English)

提供方

Placeholder

(ISC)²

教学大纲 - 您将从这门课程中学到什么

1

1

完成时间为 5 小时

Identify and Analyze Malicious Code and Activity

完成时间为 5 小时
18 个视频 (总计 109 分钟), 18 个阅读材料, 1 个测验
18 个视频
Malicious Code and Activity: Key Concepts6分钟
Malicious Code and Activity: Malicious Code Countermeasures4分钟
Malicious Code and Activity: Software Exploitation Methods6分钟
Malicious Code and Activity: Software Exploitation Methods5分钟
Malicious Code and Activity: Code Signing5分钟
Malicious Code and Activity: Social Engineering6分钟
Malicious Code and Activity: Security Awareness Training6分钟
Malicious Code and Activity: Long File Extensions5分钟
Malicious Code and Activity: E-mail7分钟
Malicious Code and Activity: Countermeasures5分钟
Malicious Code and Activity: Examples of Spoofing5分钟
Malicious Code and Activity: Techniques5分钟
Malicious Code and Activity: Botnet-Led Exploits6分钟
Malicious Code and Activity: Malicious Web Activity6分钟
Malicious Code and Activity: Zero-Day Exploits4分钟
Malicious Code and Activity: Infected Factory Builds and Media4分钟
Malicious Code and Activity: Inspection of Processes7分钟
18 个阅读材料
Systems and Application Security10分钟
Malicious Code and Activity: Key Concepts10分钟
Malicious Code and Activity: Malicious Code Countermeasures10分钟
Malicious Code and Activity: Software Exploitation Methods10分钟
Malicious Code and Activity: Software Exploitation Methods10分钟
Malicious Code and Activity: Code Signing10分钟
Malicious Code and Activity: Social Engineering10分钟
Malicious Code and Activity: Security Awareness Training10分钟
Malicious Code and Activity: Long File Extensions10分钟
Malicious Code and Activity: E-mail10分钟
Malicious Code and Activity: Countermeasures10分钟
Malicious Code and Activity: Examples of Spoofing10分钟
Malicious Code and Activity: Techniques10分钟
Malicious Code and Activity: Botnet-Led Exploits10分钟
Malicious Code and Activity: Malicious Web Activity10分钟
Malicious Code and Activity: Zero-Day Exploits10分钟
Malicious Code and Activity: Infected Factory Builds and Media10分钟
Malicious Code and Activity: Inspection of Processes10分钟
1 个练习
Quiz 130分钟
2

2

完成时间为 1 小时

Implement and Operate Endpoint Device Security

完成时间为 1 小时
3 个视频 (总计 15 分钟), 3 个阅读材料, 1 个测验
3 个视频
Endpoint Device Security: Trusted Platform Module (TPM)6分钟
Endpoint Device Security: BYOD Policy Considerations2分钟
3 个阅读材料
Endpoint Device Security: HIDS10分钟
Endpoint Device Security: Trusted Platform Module (TPM)10分钟
Endpoint Device Security: BYOD Policy Considerations10分钟
1 个练习
Quiz 230分钟
3

3

完成时间为 5 小时

Operate and Configure Cloud Security

完成时间为 5 小时
16 个视频 (总计 105 分钟), 16 个阅读材料, 1 个测验
16 个视频
Cloud Security: Hybrid5分钟
Cloud Security: Virtualization7分钟
Cloud Security: Hypervisor4分钟
Cloud Security: Country-Specific Legal Considerations6分钟
Cloud Security: P&DP Laws6分钟
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8分钟
Cloud Security: Data Dispersion5分钟
Cloud Security: Threat to Storage Types9分钟
Cloud Security: Technologies to Address Threats4分钟
Cloud Security: DLP Architecture7分钟
Cloud Security: Review Activity6分钟
Cloud Security: Key Storage in the Cloud4分钟
Cloud Security: Common Approaches for Data Masking4分钟
Cloud Security: Data Retention Policies7分钟
Cloud Security: Disposal Options8分钟
16 个阅读材料
Cloud Security: Five Essential Characteristics of Clouds10分钟
Cloud Security: Hybrid10分钟
Cloud Security: Virtualization10分钟
Cloud Security: Hypervisor10分钟
Cloud Security: Country-Specific Legal Considerations10分钟
Cloud Security: P&DP Laws10分钟
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10分钟
Cloud Security: Data Dispersion10分钟
Cloud Security: Threat to Storage Types10分钟
Cloud Security: Technologies to Address Threats10分钟
Cloud Security: DLP Architecture10分钟
Cloud Security: Review Activity10分钟
Cloud Security: Key Storage in the Cloud10分钟
Cloud Security: Common Approaches for Data Masking10分钟
Cloud Security: Data Retention Policies10分钟
Cloud Security: Disposal Options10分钟
1 个练习
Quiz 330分钟
4

4

完成时间为 3 小时

Secure Big Data Systems & Operate and Secure Virtual Environments

完成时间为 3 小时
9 个视频 (总计 70 分钟), 9 个阅读材料, 1 个测验
9 个视频
Secure Big Data Systems: Interpreting Big Data4分钟
Secure Big data Systems: Key Challenges5分钟
Operate and Secure Virtual Environments: SDN5分钟
Operate and Secure Virtual Environments: Virtual Appliances8分钟
Operate and Secure Virtual Environments: DRS10分钟
Operate and Secure Virtual Environments: Common Attacks6分钟
Operate and Secure Virtual Environments: Network Security5分钟
Operate and Secure Virtual Environments: Virtual Machine Security16分钟
9 个阅读材料
Secure Big Data Systems: Big Data10分钟
Secure Big Data Systems: Interpreting Big Data10分钟
Secure Big data Systems: Key Challenges10分钟
Operate and Secure Virtual Environments: SDN10分钟
Operate and Secure Virtual Environments: Virtual Appliances10分钟
Operate and Secure Virtual Environments: DRS10分钟
Operate and Secure Virtual Environments: Common Attacks10分钟
Operate and Secure Virtual Environments: Network Security10分钟
Operate and Secure Virtual Environments: Virtual Machine Security10分钟
1 个练习
Quiz 430分钟

审阅

来自SYSTEMS AND APPLICATION SECURITY的热门评论

查看所有评论

关于 (ISC)² Systems Security Certified Practitioner (SSCP)

(ISC)² Systems Security Certified Practitioner (SSCP)

常见问题

还有其他问题吗?请访问 学生帮助中心