2 days to save $500 for SANS San Diego 2013
 

(ISC)2 SSCP Community Review Seminar

This year, the Global Information Security Workforce Study found that the acute shortage of skilled cyber security professionals is having a global economic impact driven by a combination of business conditions, executives not fully understanding the need for security, and an inability to locate enough qualified information security professionals. More than half of the respondents - 56% - feel that their organizations are short staffed. Two-thirds of CISOs reported feeling short staffed as well. The lack of trained and skilled IT security staff is resulting in frequent and costly data breaches. The Systems Security Certified Practitioner (SSCP) certification measures the competence of a security professional against an internationally accepted common body of knowledge encompassing 7 security domains including Access Controls, Security Operations & Administration, Monitoring and Analysis, Risk Response and Recovery, Cryptography, Networks and Communications and Malicious Code and Activity. We will focus on how to take the SSCP domains and use them to become a more valueable security professional through certification and practical application of knowledge.

  • You will learn how to demonstrate knowledge in account management, access control concepts, and attack methods that are used to defeat access control systems.
  • You will learn how to demonstrate knowledge in privacy issues, data classification, data integrity, audit, policies, standards, guidelines, and procedures as well as the application of accepted industry practices.
  • You will understand risk management including risk analysis and threats and vulnerabilities.
  • You will learn what the basic concepts of cryptography are, including public and private key algorithms, key distribution and management, methods of attack as well as the principles of public key infrastructure.
  • You will understand all of the concepts of malicious and mobile code, types of malicious code threats, how malicious code is introduced into the environment, as well as various protection and recovery methods.

Audience Profile:

The SSCP is geared toward individuals who may hold technical and engineering related information technology positions such as network security engineers, systems security analysts, security administrators as well as non-security specific technical positions that require an understanding of security concepts and of best security practices including system administrators, application programmers, database administrators and systems analysts.

Methodology:

This course will be delivered utilizing best practice methodologies for a constructive learning environment. In employing this framework, concepts will be shared with the class in a traditional format in order to expand their frame of reference, but learners will also share their individual experiences, in and from the workplace, based upon these concepts. The individual learners in the classroom have varied experiences, workplace tasks, and hands-on knowledge that will allow others to comprehend and increase their own understandings in order to grow, retain, and transfer this newly attained knowledge.

Core Material to be addressed based on the 7 Domains of the SSCP CBK:

1. Access Controls

Tasks within the access controls domain permit management to specify what users are permitted to do, which resources they are allowed to access, and what operations they are able to perform on a system.

At the end of this section learners will be able to:

  • Implement Logical Access Controls In terms Of Subjects
  • Implement Logical Access Controls In terms Of Objects
  • Implement Authentication Mechanisms
  • Apply Access Control Concepts
  • Describe Basic Security Concepts Related To Cloud Computing and Virtualization

2. Security Operations and Administration

The security operations & administration domain entails the identification of an organizations information assets and the documentation required for the implementations of policies, standards, procedures and guidelines that ensure confidentiality, integrity and availability.

At the end of this section learners will be able to:

  • Validate Security Controls
  • Perform Data Classification
  • Perform Change Management Duties
  • Describe Endpoint Device Security
  • Comply With Data Management Policies

3. Monitoring and Analysis

Within the monitoring and analysis domain, monitoring deals with activities that are accountable for collecting information, providing methods of identifying security events, assigning priority to these events, taking the appropriate actions to maintain the security of the system, and reporting the pertinent information to the appropriate individual, group, or process.

At the end of this section learners will be able to:

  • Explain Effective Monitoring Of Systems
  • Monitor Intrusion Detection/Prevention Systems
  • Monitor Event Correlation Systems
  • Analyze Monitoring Results

4. Risk, Response and Recovery

The risk, response and recovery domain covers multiple aspects of existing threats, and mitigating and developing plans to deal with those threats. Risk management is the identification, measurement and control of loss associated with adverse events. It includes overall security review, risk analysis, selection and evaluation of safeguards, cost benefit analysis, management decisions, safeguard implementation, and effectiveness review.

Business Continuity Planning (BCP) facilitates the rapid recovery of business operations to reduce the overall impact of the disaster, through ensuring continuity of the critical business functions. Disaster Recovery Planning includes procedures for emergency response, extended backup operations and post-disaster recovery when the computer installation suffers loss of computer resources and physical facilities.

At the end of this section learners will be able to:

  • Explain The Risk Management Process
  • Participate In Risk Assessment
  • Perform Security Assessment Activities
  • Explain And Support Business Continuity Planning And Disaster Recovery Planning

5. Cryptography

Cryptography domain deals with the protection of information by modifying the information to ensure its integrity, confidentiality authenticity and non-repudiation. Cryptanalysis deals with defeating the cryptosystem and violating the confidentiality or integrity of the protected data. The ability of any organization to protect its information from unauthorized access or modification is critical. The application of cryptography for the storage and transmission of information attempts to address these concerns.

At the end of this section learners will be able to:

  • Explain How To Install And Maintain Cryptographic Systems
  • Execute Certificate and Key Management
  • Execute The Implementation Of Secure Protocols

6. Networks and Communication

The networks and communications domain encompasses the network structure, transmission methods, transport formats and security measures used to maintain the integrity, availability, authentication and confidentiality of the transmitted information over both private and public communication networks.

At the end of this section learners will be able to:

  • Explain Firewalls and Proxies
  • Describe and Manage Remote Access
  • Describe and Address Network Security Concepts
  • Design Secure Network Topologies

7. Malicious Code and Activity

The malicious code & activity domain addresses computer code that can be described as being harmful or destructive to the computing environment. This includes viruses, worms, logic bombs, the Trojan horse and other technical and non-technical attacks. The number and types of attacks using malicious code is increasing. The requirement for an individual or an organization to protect themselves from these attacks is extremely important.

At the end of this section learners will be able to:

  • Identify Malicious Activity
  • Implement Malicious Code Countermeasures

Course Syllabus
Course Contents
  HST.1: SSCP Community Review - How, What and Why we do what we do

CPE/CMU Credits: 6

Topics

Access Controls

  • What are they?
  • Who do they apply to?

Security Operations and Administration

  • How do we validate and classify?
  • When do we need to document?

Monitoring and Analysis

  • Why do we monitor?
  • Where do we look for evidence?

 
  HST.2: SSCP Community Review - How, What and Why we do what we do

CPE/CMU Credits: 6

Topics

Risk, Response and Recovery

  • What is Risk?
  • Who is vulnerable?

Cryptography

  • When should we use encryption?

Networks and Communication

  • How are secure networks designed?
  • Why should remote access be allowed in secure networks?

Malicious Code and Activity

  • Where should we implement contremeasures?

 
Additional Information
 
  Who Should Attend
  • This seminar is highly recommended for network security engineers, systems security analysts and security administrators that require an understanding of security concepts and best practices that are available and in use within the security community today.
  • This seminar is highly recommended for IT system administrators, application programmers, database administrators, and systems analysts who want to learn what tools are available to enable them to create and operate secure computing environments.
  • This seminar is highly recommended for end users who want to learn more about what information security is, and what the key criteria and areas of focus are for information security practioners and professionals today.

 
  What You Will Receive
  • Course Manual
 
  You Will Be Able To
  • You will be able to understand requirements for access control
  • You will be able to understand basic security concepts related to cloud computing
  • You will be able to maintain adherence to security policies, baselines, standards and procedures
  • You will be able to maintain effective monitoring systems
  • You will be able to identify, analyze and discuss monitoring results
  • You will be able to understand and discuss the Risk Management Process
  • You will know where to go to access the tools necessary to use secure protocols
  • You will be able to understand security issues related to network design
  • You will be able to identify malicious code
  • You will be able to understand and support Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

 

Author Statement

This SSCP community review seminar was conceived as a way to allow security practitioners and professionals to come together and share their experiences within a moderated and structured forum, the overall goal being to facilitate discussions around the 7 Domains of the SSCP CBK. While many security professionals and practitioners do security everyday, they often do not have an understanding of the underlying fundamentals and theories that proscribe their actions, and inform their activities. In addition, many security practitioners operate in isolation from the broader information security community today, and as a result, are not able to utilize the latest tools, techniques, and best practices that exist due to a lack of knowledge and awareness. A community driven event, focused on a review of each SSCP CBK Domain will allow for the participants to share information, best practices, and methodologies with each other, as well as to participate in a review of the key theories and mechanisms that structure the SSCP CBK today.

*CPE/CMU credits not offered for the SelfStudy delivery method

Type
Topic
Course
/ Location
/ Instructor
Date
Register

Training Event
Dec 12, 2013 -
Dec 19, 2013
 

*Course contents may vary depending upon location, see specific event description for details.