Cyber Security Category

Systems Security Certified Practitioner (SSCP®) - Self-paced

  • Length 180 days access
  • Price  $825 inc GST
Course overview
Book now

Why study this course

Official ISC2 Online Self-paced Training gives you the freedom to learn anytime, anywhere. Targeted courseware aligns with the ISC2 Systems Security Certified Practitioner (SSCP®) exam outline and enhances learning with instructional videos, audio presentations, interactive exercises and assessments. When you need extra support, email ISC2 Authorized Instructors with your questions for expert guidance.

ISC2 developed the SSCP certification for individuals in operational IT roles seeking to prove their knowledge, skills and experience by attaining an ISO-accredited certification. SSCP provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with cybersecurity policies and procedures that ensure data confidentiality, integrity and availability.

SSCP Self-paced training includes:

  • 180-day access to official course content:

    • 22+ hours of video-based instructional content

    • 20 content-specific learning activities and 12 applied scenarios

    • 61 knowledge checks

    • 8 end-of-chapter quizzes with answer feedback

    • 160-question post-course assessment with answer feedback

    • Online interactive flash cards

    • Glossary of terms

    • 24x7x365 chat technical support, provided by ISC2

    • Instructor email support, provided by ISC2

  • Official ISC2 Certificate of Completion

  • Course Completion Badge

Please note: The exam is not included in the course fee but can be purchased separately. Please contact us for a quote.

ISC2 may require up to ten days to issue the self-paced material after it has been purchased.

Can’t see the video above? Click here to open it in a new screen.

Request Course Information


What you’ll learn

  • Describe security and the alignment of asset management to risk management

  • Appraise risk management options and the use of access controls to protect assets

  • Examine the field of cryptographyto secure information and communication

  • Build a security posture by securing software, data, and endpoints

  • Apply network and communications security to establish a secure networked environment

  • Evaluate cloud and wireless security

  • Prepare for incident detection and response

  • Implement appropriate measures that contribute to the maturation of risk management


ISC2 Official Training Partner - Preferred

ISC2 at Lumify Work

ISC2: The world’s leading cyber security and IT security professional organisation. Lumify Work is one of only a few select training providers in Australia with campuses in New Zealand and the Philippines. We offer official ISC2 courses and training materials.


Who is the course for?

This course is for individuals planning to pursue the ISC2 SSCP certification. The SSCP is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner's ability to implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. 


Course subjects

Refer to the SSCP Exam Outline for a deeper dive into the SSCP domains.

Domain 1. Security Operations and Administration

  • Comply with codes of ethics

  • Understand security concepts

  • Identify and implement security controls

  • Document and maintain functional security controls

  • Participate in asset management lifecycle (hardware, software and data)

  • Participate in change management lifecycle

  • Participate in implementing security awareness and training (e.g., social engineering/ phishing)

  • Collaborate with physical security operations (e.g., data center assessment, badging)

Domain 2. Access Controls

  • Implement and maintain authentication methods

  • Support internetwork trust architectures

  • Participate in the identity management lifecycle

  • Understand and apply access controls

Domain 3. Risk Identification, Monitoring and Analysis

  • Understand the risk management process

  • Understand legal and regulatory concerns (e.g., jurisdiction, limitations, privacy)

  • Participate in security assessment and vulnerability management activities

  • Operate and monitor security platforms (e.g., continuous monitoring)

  • Analyse monitoring results

Domain 4. Incident Response and Recovery

  • Support incident lifecycle (e.g., National Institute of Standards and Technology (NIST), International Organisation for Standardisation (ISO))

  • Understand and support forensic investigations

  • Understand and support business continuity plan (BCP) and disaster recovery plan (DRP) activities

Domain 5. Cryptography

  • Understand reasons and requirements for cryptography

  • Apply cryptography concepts

  • Understand and implement secure protocols

  • Understand and support public key infrastructure (PKI) systems

Domain 6. Network and Communications Security

  • Understand and apply fundamental concepts of networking

  • Understand network attacks (e.g., distributed denial of service (DDoS), man-in-the-middle (MITM), Domain Name System (DNS) poisoning) and countermeasures (e.g., content delivery networks (CDN))

  • Manage network access controls

  • Manage network security

  • Operate and configure network-based security devices

  • Secure wireless communications

Domain 7. Systems and Application Security

  • Identify and analyse malicious code and activity

  • Implement and operate endpoint device security

  • Administer Mobile Device Management (MDM)

  • Understand and configure cloud security

  • Operate and maintain secure virtual environments


Prerequisites

Prior to taking this course the learner should have experience, skills, or knowledge obtained while serving in the following roles: 

  • Network Security Engineer 

  • IT/Systems/Network Administrator 

  • Security Analyst 

  • Systems Engineer 

  • Security Consultant/Specialist 

  • Security Administrator 

  • Systems/Network Analyst 

  • Database Administrator 

  • Individuals operating in a security operations center (SOC) environment performing the role of incident handler, SIEM, forensics specialist, threat intel researcher, etc. 

Exam candidates must have a minimum of one year cumulative paid work experience in one or more of the seven domains of the SSCP CBK® (Common Body of Knowledge). A one year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

A candidate who doesn’t have the required experience to become an SSCP may become an Associate of ISC2 by successfully passing the SSCP exam. An Associate of ISC2 can then accumulate the necessary work experience to achieve full certification.


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Select and book a course

Options

Can't find a date you like?

Contact sales