SSCP | Systems Security Certified Practitioner


If you’re an information security professional looking to demonstrate your competence in best security practices in IT, then the Systems Security Certified Practitioner -SSCP - certification is for you.

  • 1

    Highly demanded field of expertise

     In the IT arena security has become one of the most important areas of specialty available, with companies relying on networks for the secure storage and fast retrieval of mission critical corporate data and information.

  • 2

    Globally recognised certification

    Recognised as the best entry level IT security certification across the globe.

  • 3

    Get hired

    Undertake a certification that will show your proficiency in IT security to kickstart your career in IT or to enhance your current career progress.

Your quick course guide

Certification: SSCP

Study time: Full time - five to six days | Part time - six weeks 

Vendor: (ISC)²

Provider: Skillsoft

Student support: StudentCare™ and expert mentors

Prerequisites: One year+ experience in information security + subscription to (ISC)² Code of Ethics recommended

Assessment: Exam based - SSCP 

Resources: Internet access and email

Ideal for: Senior network security engineers, senior security systems analysts or senior security administrators 

Included in your modules

SSCP introduction

  • Information security
  • SSCP
  • CBK
  • Security concerns

Access control

  • Identification, authentication, authorisation and accounting
  • Access control techniques
  • Best practices for access control
  • Access control administration
  • Access control models, methodologies and implementation Physical security
  • Attacks
  • Monitoring and intrusion detection
  • Penetration testing


  • The C.I.A. triad policy, standards, guidelines and baselines
  • Privacy issues and regulation
  • Data classification
  • Security architecture and design
  • Controls, evaluation criteria and security models
  • Development lifecycle
  • Configuration management
  • Hardware components
  • Employment practices
  • Security threats and attacks

Audit and monitoring

  • Types of controls 
  • Incident response and analysis
  • Monitoring devices and techniques  


  • Cryptographic terms and technologies
  • Message authentication
  • Certificate authority

Data communications

  • Security overview
  • Internet, intranet and extranet security
  • TCP/IP LANs, WANs and VPNs
  • Network layer security protocols 
  • Transport layer security 
  • Application layer security protocols

Malicious code and malware 

  • Malicious code types
  • Mobile code threats
  • Types of attacks

Risk response and recovery

  • Risk management
  • Knowledge based systems 
  • Safeguards and countermeasures
  • Incident handling
  • Forensics Business continuity project planning

Get certified the Learning People way

Professional development that works around you

  • World's #1 eLearning portal
  • 12 months unlimited access
  • Expert mentors
  • Test prep
  • Global community of peers
  • Award winning training used globally by leading corporate clients

Average salary

2016 JUL
2017 JUL
2018 JUL
Read more

Why join us?

  • Award winning customer support
  • We know the job market inside out
  • Trusted by the giants
  • Value for money
  • CV detox - exclusive to our students
  • We're with you from start to finish
  • Expert career advice
  • Progress reports
  • Exam booking support
  • All UK students receive an NUS student discount card
  • Your success is our success

CV detox

It's not just about your CV...