Pearson
(SSCP) Systems Security Certified Practitioner Specialization
Pearson

(SSCP) Systems Security Certified Practitioner Specialization

SSCP Certified Complete Cybersecurity Training. In-Demand IT Security Skills Prepare you for SSCP Certification Exam With 15 Hours of Video Training

Pearson

Instructor: Pearson

Included with Coursera Plus

Get in-depth knowledge of a subject
Beginner level

Recommended experience

1 month at 5 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers
Get in-depth knowledge of a subject
Beginner level

Recommended experience

1 month at 5 hours a week
Flexible schedule
Earn a career credential
Share your expertise with employers

What you'll learn

  • Master the principles of risk management and incident response to effectively safeguard organizational assets.

  • Gain proficiency in implementing robust access controls and endpoint security measures.

  • Develop a thorough understanding of network and communication security to protect data integrity and confidentiality.

Overview

What’s included

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

July 2025

31 practice exercises

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Pearson

Specialization - 7 course series

What you'll learn

  • Master the foundational concepts of security operations, including the CIA triad and functional security controls.

  • Understand the importance of change management and configuration management in maintaining secure environments.

  • Develop strategies for effective security awareness training as a vital administrative control.

  • Integrate physical security measures with cybersecurity practices for comprehensive protection.

Skills you'll gain

Configuration Management, Security Strategy, Security Controls, Information Systems Security, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Security Management, Computer Security Awareness Training, and Data Ethics

What you'll learn

  • Understand and apply basic and advanced cryptographic solutions for data protection.

  • Master the principles of public key infrastructure (PKI) to establish trusted communications.

  • Learn to select and implement secure protocols for enhanced data security.

  • Develop proficiency in symmetric and asymmetric encryption, and hashing for data integrity.

Skills you'll gain

Encryption, Cryptography, Public Key Infrastructure, Data Integrity, Key Management, Authentications, Cryptographic Protocols, Digital Communications, Information Privacy, Network Security, Data Security, and Information Systems Security

What you'll learn

  • Master authentication methods and identity management life cycles.

  • Understand and apply various access control models (DAC, MAC, RBAC).

  • Conduct effective vulnerability assessments and continuous security monitoring.

  • Develop skills in quantitative and qualitative risk management.

Skills you'll gain

Identity and Access Management, Role-Based Access Control (RBAC), Authentications, Information Systems Security, Vulnerability Assessments, Security Controls, Vulnerability Management, Threat Detection, Multi-Factor Authentication, Continuous Monitoring, Authorization (Computing), Security Management, User Accounts, and Network Security

What you'll learn

  • Conduct thorough vulnerability assessments and manage vulnerabilities effectively.

  • Implement continuous security monitoring and manage logs and SIMs.

  • Analyze monitoring results to detect and trace malicious activities.

  • Apply qualitative and quantitative risk assessment techniques.

Skills you'll gain

Continuous Monitoring, Vulnerability Management, Anomaly Detection, Event Monitoring, Vulnerability Assessments, Security Management, Cyber Risk, Vulnerability Scanning, Threat Management, Security Information and Event Management (SIEM), Threat Detection, Risk Management Framework, System Monitoring, and Incident Response

What you'll learn

  • Understand and apply fundamental network concepts, including TCP/IP and OSI models.

  • Identify and mitigate network attacks such as spoofing and denial of service.

  • Operate and manage network security devices like firewalls and intrusion detection systems.

  • Implement secure wireless communication and manage network access controls.

Skills you'll gain

OSI Models, Wireless Networks, TCP/IP, Network Security, Network Protocols, Network Routers, Authentications, Firewall, Intrusion Detection and Prevention, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Security Controls, Local Area Networks, Authorization (Computing), General Networking, and Network Administration

What you'll learn

  • Implement and maintain endpoint security using TPM, IDS, IPS, and host-based firewalls.

  • Identify and mitigate malicious code and social engineering attacks.

  • Operate secure virtual environments and understand virtualization technologies.

  • Navigate cloud security challenges and manage mobile device security effectively.

Skills you'll gain

Endpoint Security, Mobile Security, Malware Protection, Cloud Security, Data Security, User Provisioning, Application Security, Virtual Machines, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Firewall, Containerization, and Virtualization

What you'll learn

  • Understand and apply the Incident Response Lifecycle effectively.

  • Conduct forensic investigations with a focus on ethics and legal issues.

  • Develop and implement comprehensive business continuity plans.

  • Master disaster recovery strategies and Business Impact Analysis (BIA).

Skills you'll gain

Incident Response, Business Continuity, Business Continuity Planning, Investigation, Resource Allocation, Resource Management, Business Analysis, Risk Analysis, Computer Security Incident Management, Law, Regulation, and Compliance, Cybersecurity, Prioritization, Ethical Standards And Conduct, Data Storage Technologies, Disaster Recovery, and Business Priorities

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
268 Courses13,858 learners

Offered by

Pearson

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions