Pearson
(SSCP) Systems Security Certified Practitioner Specialization
Pearson

(SSCP) Systems Security Certified Practitioner Specialization

SSCP Certified Complete Cybersecurity Training. In-Demand IT Security Skills Prepare you for SSCP Certification Exam With 15 Hours of Video Training

Pearson

Instructor: Pearson

Included with Coursera Plus

Get in-depth knowledge of a subject
Beginner level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans
Get in-depth knowledge of a subject
Beginner level

Recommended experience

4 weeks to complete
at 5 hours a week
Flexible schedule
Learn at your own pace
Earn a Certificate
With paid plans

What you'll learn

  • Master the principles of risk management and incident response to effectively safeguard organizational assets.

  • Gain proficiency in implementing robust access controls and endpoint security measures.

  • Develop a thorough understanding of network and communication security to protect data integrity and confidentiality.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

July 2025

31 practice exercises

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Pearson

Specialization - 7 course series

What you'll learn

  • Master the foundational concepts of security operations, including the CIA triad and functional security controls.

  • Understand the importance of change management and configuration management in maintaining secure environments.

  • Develop strategies for effective security awareness training as a vital administrative control.

  • Integrate physical security measures with cybersecurity practices for comprehensive protection.

Skills you'll gain

Information Systems Security, Security Controls, Configuration Management, Data Ethics, Enterprise Security, Security Strategy, Safety and Security, Change Control, Computer Security Awareness Training, Cyber Security Policies, and Security Management

What you'll learn

  • Understand and apply basic and advanced cryptographic solutions for data protection.

  • Master the principles of public key infrastructure (PKI) to establish trusted communications.

  • Learn to select and implement secure protocols for enhanced data security.

  • Develop proficiency in symmetric and asymmetric encryption, and hashing for data integrity.

Skills you'll gain

Encryption, Cryptography, Public Key Infrastructure, Key Management, Authentications, Information Systems Security, Network Security, Information Privacy, Data Security, Cryptographic Protocols, Data Integrity, and Digital Communications

What you'll learn

  • Master authentication methods and identity management life cycles.

  • Understand and apply various access control models (DAC, MAC, RBAC).

  • Conduct effective vulnerability assessments and continuous security monitoring.

  • Develop skills in quantitative and qualitative risk management.

Skills you'll gain

Role-Based Access Control (RBAC), Identity and Access Management, Authentications, Multi-Factor Authentication, Vulnerability Management, Information Systems Security, Continuous Monitoring, Authorization (Computing), Network Security, Threat Detection, User Provisioning, Vulnerability Assessments, User Accounts, Security Controls, Security Management, and Threat Management

What you'll learn

  • Conduct thorough vulnerability assessments and manage vulnerabilities effectively.

  • Implement continuous security monitoring and manage logs and SIMs.

  • Analyze monitoring results to detect and trace malicious activities.

  • Apply qualitative and quantitative risk assessment techniques.

Skills you'll gain

Continuous Monitoring, Vulnerability Management, Cyber Risk, Risk Management Framework, Vulnerability Assessments, Security Management, Threat Detection, Threat Management, System Monitoring, Event Monitoring, Security Information and Event Management (SIEM), Vulnerability Scanning, Incident Response, and Anomaly Detection

What you'll learn

  • Understand and apply fundamental network concepts, including TCP/IP and OSI models.

  • Identify and mitigate network attacks such as spoofing and denial of service.

  • Operate and manage network security devices like firewalls and intrusion detection systems.

  • Implement secure wireless communication and manage network access controls.

Skills you'll gain

Wireless Networks, TCP/IP, OSI Models, Network Security, Network Protocols, General Networking, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Local Area Networks, Intrusion Detection and Prevention, Security Controls, Firewall, Network Administration, Authorization (Computing), Authentications, and Network Routers

What you'll learn

  • Implement and maintain endpoint security using TPM, IDS, IPS, and host-based firewalls.

  • Identify and mitigate malicious code and social engineering attacks.

  • Operate secure virtual environments and understand virtualization technologies.

  • Navigate cloud security challenges and manage mobile device security effectively.

Skills you'll gain

Endpoint Security, Mobile Security, Malware Protection, Cloud Security, Data Security, Security Awareness, User Provisioning, Virtualization, Information Systems Security, Intrusion Detection and Prevention, Containerization, Application Security, Firewall, and Virtual Machines

What you'll learn

  • Understand and apply the Incident Response Lifecycle effectively.

  • Conduct forensic investigations with a focus on ethics and legal issues.

  • Develop and implement comprehensive business continuity plans.

  • Master disaster recovery strategies and Business Impact Analysis (BIA).

Skills you'll gain

Incident Response, Business Continuity, Business Continuity Planning, Investigation, Business Priorities, Disaster Recovery, Cybersecurity, Risk Analysis, Resource Allocation, Law, Regulation, and Compliance, Computer Security Incident Management, Data Storage Technologies, Ethical Standards And Conduct, Business Analysis, Resource Management, and Prioritization

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Pearson
Pearson
268 Courses12,694 learners

Offered by

Pearson

Compare with similar products

Rating
Level
Skills
Tools
Last updated
Number of practice exercises
Degree eligibility
Part of Coursera Plus

You might also like

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions