Post Description
Lesson 01 - Introduction
Lesson 02 - Logical access control
Lesson 03 - Authentication Mechanisms
Lesson 04 - Centralized Authentication
Lesson 05 - Access Control Concepts
Lesson 06 - Internetwork Trust Architecture
Lesson 07 - Identity Management
Lesson 08 - Cloud Computing
Lesson 09 - Code Of Ethics
Lesson 10 - Security Administration
Lesson 11 - Change Management
Lesson 12 - Security Evaluation and Assistance
Lesson 13 - Security Awareness
Lesson 14 - Information Communication
Lesson 15 - Endpoint Device Security
Lesson 16 - Data Management Policies
Lesson 17 - Security Concepts
Lesson 18 - Continuous Monitorin
Lesson 19 - Analysis of Monitoring results
Lesson 20 - Risk Management Process
Lesson 21 - Security Assessment Activities
Lesson 22 - Incident Handling Analysis
Lesson 23 - Business Contuinuity Plan
Lesson 24 - Disaster RecoveryPlan
Lesson 25 - Concepts and Requirements of Cryptography
Lesson 26 - Certificate and Key Management
Lesson 27 - Secure Protocols
Lesson 28 - Networks
Lesson 29 - Telecommunications
Lesson 30 - Remote Access
Lesson 31 - Firewalls and Proxies
Lesson 32 - Wireless and Cellular Technologies
Lesson 33 - Malicious Code
Lesson 34 - Malicious Code Countermeasures
Lesson 35 - Malicious Activity
Lesson 36 - Malicious Activity Countermeasures
Lesson 37 - Getting Systems Security Certified Practitioner (SSCP) Endorsed
Lesson 38 - Maintaining the Certification and CPEs
Comments # 0