(ISC)²|SSCP|Systems Security Certified Practitioner| Skip to main Content

Official (ISC)2 Systems Security Certified Practitioner (SSCP) Training. Incl Exam.

  • Course Code SSCP
  • Duration 5 days

Course Delivery

Public Classroom Price


excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview


The Official (ISC)²® Systems Security Certified Practitioner (SSCP®) training provides a comprehensive review of the knowledge required to implement, monitor and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. This training course will help students review and refresh their knowledge and identify areas they need to study for the SSCP exam.Content aligns with and comprehensively covers the sevendomains of the (ISC)² SSCPCommon Body of Knowledge (CBK®).

As an (ISC)2Official Training Provider, we use courseware developed by (ISC)² –creator of the SSCP CBK –to ensure your training is relevant and up-to-date. Our instructors are verified security experts who hold the SSCP and have completed intensive training to teach (ISC)² content.

Please Note: An exam voucher is included with this course.

Course Schedule

    • Delivery Format: Virtual Learning
    • Date: 19-23 April, 2021
    • Location: Virtual


Target Audience


This training course is intended for practitioners who have at least one year of cumulative, paid work experience in one or more of the seven domains of the (ISC)2 SSCP CBK and are pursuing SSCP training and certification to acquire the credibility and mobility to advance within their current information security careers.This training is ideal for those with technical skills and practical, hand-on security knowledge working in operational IT positions.

Course Objectives


After completing this course you should be able to:

  • Understand the different Access Control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability.
  • Understand the processes necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information as it is applied by the Security Operations and Administration.
  • The Risk Identification, Monitoring, and Analysis Domain identifies the how to identify, measure, and control losses associated with adverse events. You will review,analyze, select, and evaluate safeguards for mitigating risk.
  • Identify how to handle Incident Response and Recovery using consistent, applies approaches including the use of the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts in order to mitigate damages, recover business operations, and avoid critical business interruption; and emergency response and post-disaster recovery.
  • Identify and differentiate key cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure as it applies to securing communications in the presence of third parties.
  • Define and identify the Networks and Communications Security needed to secure network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted.
  • The Systems and Application Security section identifies and defines technical and non-technical attacks and how an organization can protect itself from these attacks including the concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments.

Course Content


Domain 1: Access Controls

Domain 2: Security Operations and Administration

Domain 3: Risk Identification, Monitoring and Analysis

Domain 4: Incident Response and Recovery

Domain 5: Cryptography

Domain 6: Network and Communications Security

Domain 7: Systems and Application Security

Course Prerequisites


Attendees should meet the following prerequisites:

  • Candidates must hav e a minimum of 1-year cumulative work experience in 1 or more of the 7 domains of the SSCP CBK
  • A candidate that doesn’t have the required experience to become an SSCP may become an Associate of (ISC)² by successfully passing the SSCP examination. The Associate of (ISC)² will then have 2 years to earn the 1 year required experience.





Test Certification


Recommended as preparation for the following exam:

  • (ISC)² Certified Information Systems Security Professional Exam

Gaining this accreditation is not just about passing the exam, there are a number of other criterias that need to be met including 1 year of cumulative, paid work experience in one or more of the seven domains of the ISC)²® SSCP CBK . Full details can be found at https://www.isc2.org/Certifications/SSCP

Those without the required experience can take the exam to become an Associate of (ISC)²  while working towards the experience needed for full certification


Follow on Courses




Cookie Control toggle icon