关于此 专业证书
100% 在线课程

100% 在线课程

立即开始,按照自己的计划学习。
灵活的计划

灵活的计划

设置并保持灵活的截止日期。
初级

初级

完成时间(小时)

完成时间大约为7 个月

建议 4 小时/周
可选语言

英语(English)

字幕:英语(English)...
100% 在线课程

100% 在线课程

立即开始,按照自己的计划学习。
灵活的计划

灵活的计划

设置并保持灵活的截止日期。
初级

初级

完成时间(小时)

完成时间大约为7 个月

建议 4 小时/周
可选语言

英语(English)

字幕:英语(English)...

专业证书 的运作方式

加入课程

专业证书课程是一系列能够帮助您做好工作准备的在线课程。一些专业证书助力您开启在 IT 支持等特定领域的职业生涯,而另一些证书则可以帮助您通过行业认证考试。若要开始学习,请注册该课程或选择首先开始学习的单一课程。当您订阅专业证书课程的部分课程时,您将自动注册整个专业证书课程。您可以只完成一门课程,可以随时暂停学习或结束订阅。访问您的学生控制面板,管理您的课程注册情况并跟踪进度。

获得证书

当完成所有课程后,您会收到一个可共享的电子证书,您可以将其添加到您简历和领英档案中。

how it works

此专业证书包含 6 门课程

课程1

Access Controls

4.2
17 个评分
3 个审阅
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Objectives 1. Describe how to implement Authentication mechanisms 2. Identify and operate internetwork trust architectures 3. Describe the process of administering identity management life cycle 4. Implement the different types of access controls (Subject/Object based)...
课程2

Security Operations and Administration

4.6
7 个评分
2 个审阅
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operations...
课程3

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

5.0
4 个评分
1 个审阅
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives 1. Describe the risk management process 2. Perform security assessment activities 3. Describe processes for operating and maintaining monitoring systems 4. Identify events of interest 5. Describe the various source systems 6. Interpret reporting findings from monitoring results 7. Describe the incident handling process 8. Contribute to the incident handling process based upon role within the organization 9. Describe the supporting role in forensics investigation processes 10. Describe the supporting role in the business continuity planning process 11. Describe the supporting role in the disaster recovery planning process...
课程4

Cryptography

3.7
3 个评分
1 个审阅
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography 3. Define the basic requirements for cryptography 4. Identify processes to support secure protocols 5. Describe the process for implementing cryptographic systems 6. Define key management concepts 7. Define Public Key Infrastructure 8. Identify processes for key administration and validation 9. Describe the implementation of secure protocols...

讲师

Avatar

(ISC)² Education & Training

Education & Training

关于 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

常见问题

  • 此课程完全在线学习,无需到教室现场上课。您可以通过网络或移动设备随时随地访问课程视频、阅读材料和作业。

  • You'll walk away with a more thorough understanding of information security concepts and industry best practices for systems security. You'll also gain confidence to sit for and pass the SSCP certification exam.

  • The certificate contains 40 hours of study materials over 6 courses. You have access to course content for 120 days from the time you register.

  • This certificate is designed for people with strong technical skills and practical security knowledge. No specific background is required.

  • No. Each course covers specific content that does not rely on information from the other courses.

  • No. The certificate program is intended to prepare students to sit for the SSCP certification exam.

    In order to hold the SSCP certification cadidates must pass the SSCP certification exam and meet work experience requirements as outlined below:

    Candidates must have a minimum of 1 year cumulative work experience in 1 or more of the 7 domains of the SSCP CBK. A 1 year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

    Candidates that do not have the required experience can take and pass the SSCP exam to earn an Associate of (ISC)² designation, and will have up to two years to earn the required work experience for the SSCP.

  • The certificate for this course prepares you to confidently sit for the (ISC)2 SSCP certification exam. To become SSCP-certified, candidates must pass the SSCP exam and meet outlined work experience requirements.

  • Candidates must have at least 1 year of cumulative work experience in 1 or more of the 7 domains of the (ISC)2 SSCP Common Body of Knowledge (CBK). A 1-year prerequisite pathway will be granted for candidates who received a degree (bachelor's or master's) in a cybersecurity program.

    Candidates without the required experience can take and pass the SSCP exam to earn an Associate of (ISC)2 designation, and will have up to 2 years to gain the work experience needed for the SSCP.

  • The American Council on Education's College Credit Recommendation Service (ACE CREDIT®) has evaluated and recommended 3 college credit hours for completing a Training Seminar for the SSCP.

    ACE CREDIT connects workplace learning with colleges and universities by helping adults gain access to academic credit at colleges and universities for formal courses and examinations taken in the workplace or other settings outside traditional higher education.

    For more information, visit the ACE CREDIT website at:

    http://www.acenet.edu/news-room/Pages/College-Credit-Recommendation-Service-CREDIT.aspx

还有其他问题吗?请访问 学生帮助中心