Example SSCP PDF
Example SSCP PDF
20
V.
B.
SSCP ®
Training
e
Slide Book
rc
tfo
us
Tr
©
TABLE OF CONTENT
INTRODUCTIONS __________________________________________________________________ 5
INTRODUCTIONS ________________________________________________________________ 5
SSCP DOMAINS _________________________________________________________________ 7
SSCP EXAM _____________________________________________________________________ 8
PRE-ASSESSMENT QUESTIONS _____________________________________________________ 12
17
DOMAIN 1: ACCESS CONTROLS _____________________________________________________ 21
WHY ACCESS CONTROL? _________________________________________________________ 22
TYPES OF ACCESS CONTROLS ______________________________________________________ 23
20
IDENTIFICATION ________________________________________________________________ 26
AUTHENTICATION ______________________________________________________________ 27
ACCESS CONTROL MODELS _______________________________________________________ 35
SSO AND FEDERATION ___________________________________________________________ 41
REVIEW QUESTIONS_____________________________________________________________ 45
V.
DOMAIN 2: SECURITY OPERATIONS AND ADMINISTRATION ______________________________ 51
CODE OF ETHICS ________________________________________________________________
B. 52
SECURITY CONCEPTS AND PRINCIPLES_______________________________________________ 54
DATA MANAGEMENT POLICIES ____________________________________________________ 57
SECURITY EDUCATION AND AWARENESS TRAINING ____________________________________ 64
BUSINESS CONTINUITY PLANNING _________________________________________________ 68
e
REVIEW QUESTIONS_____________________________________________________________ 69
DOMAIN 3: RISK IDENTIFICATION, MONITORING AND ANALYSIS __________________________ 75
rc
17
REVIEW QUESTIONS____________________________________________________________ 195
DOMAIN 7: SYSTEMS AND APPLICATION SECURITY ____________________________________ 203
INTERNET RISKS & THREATS ______________________________________________________ 204
20
CYBER ATTACKS _______________________________________________________________ 209
ENDPOINT DEVICE SECURITY _____________________________________________________ 217
CLOUD SECURITY ______________________________________________________________ 219
SECURE BIG DATA______________________________________________________________ 230
V.
SECURE SOFTWARE-DEFINED NETWORKS AND VIRTUAL ENVIRONMENTS__________________ 231
REVIEW QUESTIONS____________________________________________________________ 233
B.
e
rc
fo
u st
Tr
©