Author
Updated
10/27/2020Released
12/6/2017To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- The security triad: confidentiality, integrity, and availability
- Security principles
- Resource security
- Data security
- Security controls
- Assessing security controls
- Security policy
- Physical security
Skill Level Intermediate
Duration
Views
- Hi, I'm Mike Chapple, and I'd like to welcome you to our SSCP Security Operations and Administration Course. The System Security Certified Practitioner Certification is a popular entry-level certification for information security professionals. Earning the SSCP Certification requires passing an exam covering seven different domains of information security. This course covers one of those domains, security operations, and administration. This domain accounts for 15% of the questions on the test, and this course is part of an eight core series designed to prepare you for the SSCP exam. In this course, we'll be focusing on understanding core security concepts and the code of ethics. We'll also focus on documenting and operating security controls, participating in asset and change management processes, participating in security awareness and training programs, developing physical security controls, and implementing and assessing compliance with security controls. The information you learn in this course will help you pass the SSCP exam, and also, provide a critical foundation for your career in information security. In addition to the information I cover in this course, I encourage you to visit my website at certmike.com and join my free SSCP study group. I'll send you exam tips, practice test questions, and reminders to help keep you on track with your test preparation. All right, let's get rolling.
Q: This course was updated on 05/18/2018. What changed?
A: New videos were added that cover software licensing. In addition, the following topics were updated: integrity, leveraging industry standards, data encryption, security control selection and implementation, audits and assessments, security policy framework, security policy training and procedures, and ethics.
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate
-
Introduction
-
1. The Security Triad
-
Confidentiality2m 24s
-
Integrity4m 42s
-
Availability1m 58s
-
2. Security Principles
-
Accountability3m 42s
-
Privacy compliance4m 24s
-
Employee privacy2m 23s
-
-
3. Resource Security
-
Physical asset management2m 46s
-
Software licensing2m 28s
-
-
4. Data Security
-
Understanding data security3m 13s
-
Data security policies5m 17s
-
Data security roles2m 59s
-
Data privacy3m 48s
-
Limiting data collection3m 19s
-
-
5. Data Security Controls
-
File permissions10m 22s
-
Data encryption6m 21s
-
Cloud storage security5m 17s
-
6. Security Controls
-
Control frameworks3m 55s
-
7. Assessing Security Controls
-
Management review3m 14s
-
Security metrics3m 18s
-
Audits and assessments6m 58s
-
Control management3m 37s
-
8. Security Policy
-
Security policy framework4m 40s
-
Security policies5m 16s
-
-
9. Awareness and Training
-
Compliance training3m 27s
-
User habits2m 47s
-
User-based threats1m 54s
-
Awareness program reviews1m 20s
-
10. Physical Security
-
Site and facility design2m 44s
-
Physical access control3m 58s
-
Visitor management1m 35s
-
-
Next Steps
-
Ethics1m 52s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Security operations and administration