Pearson
(SSCP) Systems Security Certified Practitioner Specialization
Pearson

(SSCP) Systems Security Certified Practitioner Specialization

SSCP Certified Complete Cybersecurity Training. In-Demand IT Security Skills Prepare you for SSCP Certification Exam With 15 Hours of Video Training

Pearson

Instructor: Pearson

Included with Coursera Plus

Get in-depth knowledge of a subject
Beginner level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans
Get in-depth knowledge of a subject
Beginner level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans

What you'll learn

  • Master the principles of risk management and incident response to effectively safeguard organizational assets.

  • Gain proficiency in implementing robust access controls and endpoint security measures.

  • Develop a thorough understanding of network and communication security to protect data integrity and confidentiality.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

July 2025

31 practice exercises

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Pearson

Specialization - 7 course series

What you'll learn

  • Master the foundational concepts of security operations, including the CIA triad and functional security controls.

  • Understand the importance of change management and configuration management in maintaining secure environments.

  • Develop strategies for effective security awareness training as a vital administrative control.

  • Integrate physical security measures with cybersecurity practices for comprehensive protection.

Skills you'll gain

Computer Security Awareness Training, Change Control, Security Management, Cyber Security Policies, Data Ethics, Configuration Management, Safety and Security, Enterprise Security, Security Controls, Information Systems Security, and Security Strategy

What you'll learn

  • Understand and apply basic and advanced cryptographic solutions for data protection.

  • Master the principles of public key infrastructure (PKI) to establish trusted communications.

  • Learn to select and implement secure protocols for enhanced data security.

  • Develop proficiency in symmetric and asymmetric encryption, and hashing for data integrity.

Skills you'll gain

Encryption, Cryptography, Public Key Infrastructure, Data Security, Network Security, Information Systems Security, Digital Communications, Cryptographic Protocols, Key Management, Data Integrity, Authentications, and Information Privacy

What you'll learn

  • Master authentication methods and identity management life cycles.

  • Understand and apply various access control models (DAC, MAC, RBAC).

  • Conduct effective vulnerability assessments and continuous security monitoring.

  • Develop skills in quantitative and qualitative risk management.

Skills you'll gain

Role-Based Access Control (RBAC), Identity and Access Management, Authentications, Multi-Factor Authentication, Security Controls, Vulnerability Management, Authorization (Computing), Network Security, Vulnerability Assessments, Security Management, Continuous Monitoring, Threat Detection, Information Systems Security, and User Accounts

What you'll learn

  • Conduct thorough vulnerability assessments and manage vulnerabilities effectively.

  • Implement continuous security monitoring and manage logs and SIMs.

  • Analyze monitoring results to detect and trace malicious activities.

  • Apply qualitative and quantitative risk assessment techniques.

Skills you'll gain

Vulnerability Management, Continuous Monitoring, Cyber Risk, Threat Detection, Incident Response, Security Information and Event Management (SIEM), Threat Management, Security Management, System Monitoring, Vulnerability Scanning, Risk Management Framework, Event Monitoring, Anomaly Detection, and Vulnerability Assessments

What you'll learn

  • Understand and apply fundamental network concepts, including TCP/IP and OSI models.

  • Identify and mitigate network attacks such as spoofing and denial of service.

  • Operate and manage network security devices like firewalls and intrusion detection systems.

  • Implement secure wireless communication and manage network access controls.

Skills you'll gain

TCP/IP, Wireless Networks, OSI Models, Network Security, Network Protocols, Network Routers, Mobile Security, Network Administration, General Networking, Intrusion Detection and Prevention, Authentications, Firewall, Security Controls, Authorization (Computing), Distributed Denial-Of-Service (DDoS) Attacks, and Local Area Networks

What you'll learn

  • Implement and maintain endpoint security using TPM, IDS, IPS, and host-based firewalls.

  • Identify and mitigate malicious code and social engineering attacks.

  • Operate secure virtual environments and understand virtualization technologies.

  • Navigate cloud security challenges and manage mobile device security effectively.

Skills you'll gain

Mobile Security, Endpoint Security, Malware Protection, Cloud Security, Data Security, Firewall, Virtualization, Virtual Machines, Containerization, Information Systems Security, User Provisioning, Intrusion Detection and Prevention, Security Awareness, and Application Security

What you'll learn

  • Understand and apply the Incident Response Lifecycle effectively.

  • Conduct forensic investigations with a focus on ethics and legal issues.

  • Develop and implement comprehensive business continuity plans.

  • Master disaster recovery strategies and Business Impact Analysis (BIA).

Skills you'll gain

Incident Response, Business Continuity, Investigation, Business Continuity Planning, Data Storage Technologies, Resource Management, Risk Analysis, Prioritization, Cybersecurity, Resource Allocation, Business Priorities, Disaster Recovery, Computer Security Incident Management, Ethical Standards And Conduct, Law, Regulation, and Compliance, and Business Analysis

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
268 Courses13,264 learners

Offered by

Pearson

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions