Author
Updated
11/10/2020Released
7/5/2018To join one of Mike's free study groups for access to bonus tips and practice questions, visit certmike.com.
- Malware
- Attack types
- Social engineering
- Host security
- Securing your code
- Mobile security
- Virtualization security
- Cloud security
- Big data security
Skill Level Intermediate
Duration
Views
- Hi, I'm Mike Chapple, and I'd like to welcome you to our SSCP Systems and Application Security course. The System Security Certified Practitioner Certification is a popular entry-level certification for information security professionals. Earning the SSCP Certification requires passing an exam covering seven different domains of information security. This course covers one of those domains, systems and application security. This domain accounts for 15% of the questions on the test, and this course is part of an eight core series designed to prepare you for the SSCP exam. In this course, we'll be focusing on identifying and analyzing malicious code and activity, implementing and operating endpoint device security controls, operating and configuring cloud security controls, securing big data systems, and operating and securing virtual environments. The information you learn in this course will help you pass the SSCP exam and also provide a critical foundation for your career in information security. In addition to the information I cover in this course, I encourage you to visit my website at certmike.com and join my free SSCP study group. I'll send you exam tips, practice test questions, and reminders to help keep you on track with your test preparation. Alright, let's get rolling.
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
Malware: Defense and Response
with Scott M Burrell40m 46s Intermediate
-
Introduction
-
1. Malware
-
Looking at advanced malware4m 24s
-
Understanding botnets2m 44s
-
2. Attack Types
-
Denial of service attacks4m 25s
-
Eavesdropping attacks3m 51s
-
Network attacks5m 56s
-
Watering hole attacks3m 6s
-
-
3. Social Engineering
-
Social engineering5m 31s
-
Impersonation attacks4m 45s
-
Physical social engineering2m 27s
-
-
4. Host Security
-
Malware prevention6m 49s
-
Application management5m 44s
-
5. Secure Coding Practices
-
Error and exception handling3m 52s
-
Code repositories6m 28s
-
Third-party code4m 49s
-
Code signing2m 35s
-
-
6. Mobile Security
-
Mobile device security2m 35s
-
Mobile device management6m 14s
-
Mobile device tracking3m 14s
-
Mobile application security4m 23s
-
Bring your own device (BYOD)5m 49s
-
-
7. Virtualization Security
-
Virtualization4m 20s
-
Virtualization security6m 20s
-
Port isolation1m 41s
-
-
8. Cloud Security
-
Cloud computing models4m 16s
-
Public cloud tiers5m 35s
-
Securing the cloud4m 7s
-
-
9. Big Data Security
-
Big data security3m 27s
-
-
Conclusion
-
What's next?1m 31s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Systems and application security