About this Professonal Certificate
100% online courses

100% online courses

Start instantly and learn at your own schedule.
Flexible Schedule

Flexible Schedule

Set and maintain flexible deadlines.
Beginner Level

Beginner Level

Hours to complete

Approx. 7 months to complete

Suggested 4 hours/week
Available languages

English

Subtitles: English...
100% online courses

100% online courses

Start instantly and learn at your own schedule.
Flexible Schedule

Flexible Schedule

Set and maintain flexible deadlines.
Beginner Level

Beginner Level

Hours to complete

Approx. 7 months to complete

Suggested 4 hours/week
Available languages

English

Subtitles: English...

How the Professional Certificate Works

Take Courses

A Professional Certificate program is a series of online courses that help you become job-ready. Some Professional Certificates prepare you to launch a career in a specific field like IT support, while others help you to pass an industry certification exam. To begin, enroll in the program or choose a single course you'd like to start with. When you subscribe to a course that is part of a Professional Certificate program, you’re automatically enrolled in the full program. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to manage your course enrollments and track your progress.

Earn the Certificate

When you finish all of your courses, you'll receive a shareable electronic Certificate that you can add to your resume and LinkedIn.

how it works

There are 6 Courses in this Professional Certificate

Course1

Access Controls

4.3
18 ratings
3 reviews
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Objectives 1. Describe how to implement Authentication mechanisms 2. Identify and operate internetwork trust architectures 3. Describe the process of administering identity management life cycle 4. Implement the different types of access controls (Subject/Object based)...
Course2

Security Operations and Administration

4.6
8 ratings
2 reviews
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operations...
Course3

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

5.0
4 ratings
1 reviews
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives 1. Describe the risk management process 2. Perform security assessment activities 3. Describe processes for operating and maintaining monitoring systems 4. Identify events of interest 5. Describe the various source systems 6. Interpret reporting findings from monitoring results 7. Describe the incident handling process 8. Contribute to the incident handling process based upon role within the organization 9. Describe the supporting role in forensics investigation processes 10. Describe the supporting role in the business continuity planning process 11. Describe the supporting role in the disaster recovery planning process...
Course4

Cryptography

3.7
3 ratings
1 reviews
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography 3. Define the basic requirements for cryptography 4. Identify processes to support secure protocols 5. Describe the process for implementing cryptographic systems 6. Define key management concepts 7. Define Public Key Infrastructure 8. Identify processes for key administration and validation 9. Describe the implementation of secure protocols...

Instructor

Avatar

(ISC)² Education & Training

Education & Training

About (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

Frequently Asked Questions

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • You'll walk away with a more thorough understanding of information security concepts and industry best practices for systems security. You'll also gain confidence to sit for and pass the SSCP certification exam.

  • The certificate contains 40 hours of study materials over 6 courses. You have access to course content for 120 days from the time you register.

  • This certificate is designed for people with strong technical skills and practical security knowledge. No specific background is required.

  • No. Each course covers specific content that does not rely on information from the other courses.

  • No. The certificate program is intended to prepare students to sit for the SSCP certification exam.

    In order to hold the SSCP certification cadidates must pass the SSCP certification exam and meet work experience requirements as outlined below:

    Candidates must have a minimum of 1 year cumulative work experience in 1 or more of the 7 domains of the SSCP CBK. A 1 year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

    Candidates that do not have the required experience can take and pass the SSCP exam to earn an Associate of (ISC)² designation, and will have up to two years to earn the required work experience for the SSCP.

  • The certificate for this course prepares you to confidently sit for the (ISC)2 SSCP certification exam. To become SSCP-certified, candidates must pass the SSCP exam and meet outlined work experience requirements.

  • Candidates must have at least 1 year of cumulative work experience in 1 or more of the 7 domains of the (ISC)2 SSCP Common Body of Knowledge (CBK). A 1-year prerequisite pathway will be granted for candidates who received a degree (bachelor's or master's) in a cybersecurity program.

    Candidates without the required experience can take and pass the SSCP exam to earn an Associate of (ISC)2 designation, and will have up to 2 years to gain the work experience needed for the SSCP.

  • The American Council on Education's College Credit Recommendation Service (ACE CREDIT®) has evaluated and recommended 3 college credit hours for completing a Training Seminar for the SSCP.

    ACE CREDIT connects workplace learning with colleges and universities by helping adults gain access to academic credit at colleges and universities for formal courses and examinations taken in the workplace or other settings outside traditional higher education.

    For more information, visit the ACE CREDIT website at:

    http://www.acenet.edu/news-room/Pages/College-Credit-Recommendation-Service-CREDIT.aspx

More questions? Visit the Learner Help Center.