(ISC)² Systems Security Certified Practitioner (SSCP) Certificate Online

Move closer to a career in cybersecurity with (ISC)² courses that teach you IT security fundamentals and best practices that ensure data integrity, availability and protection.

Certificate | Beginner | 3-4 months | Coursera
Price: Included in $49 monthly subscription
GET UP TO 4 COLLEGE CREDITS

Franklin University has partnered with Coursera Campus to provide cutting-edge certificates to learners seeking to advance. Courses are open to all learners. No application required.

Included in your subscription

Get unlimited access to over 7,000 offerings found on the Coursera website – including guided projects, specializations and professional certificates offered by hundreds of leading universities and companies. You also get access to all 39 professional certificates found in the Franklin Marketplace.

LEARN MORE


What You Will Learn

  • Gain an understanding of access controls and how they're used to protect systems and data
  • Learn basic security concepts and how to apply them to ensure data integrity, availability and confidentiality
  • Become familiar with how to identify, monitor, and analyze risk, and learn processes related to incident response and post-disaster recovery
  • Understand and apply the practice of cryptography to support secure protocols

About the (ISC)² Systems Security Certification Practitioner Professional Certificate

The (ISC)² Systems Security Certification Practitioner Professional Certificate is designed for those wanting to take on a new challenge in the world of information security. This specialization is ideal for anyone looking to build a solid foundation in cybersecurity or take a step forward toward earning the SSCP certification.

With these six courses, you’ll prepare for a variety of cybersecurity-related roles, ranging from network security engineer to security analyst to systems engineer. Through your studies you’ll gain an understanding of network-related security issues, learn how to identify malicious activity, and prepare to support and safeguard IT infrastructure using security best practices.

Throughout these courses, you’ll learn key systems security concepts, such as authentication mechanisms, compliance controls and securing virtual environments. You’ll also apply what you learn during digital lab assignments and hands-on projects to further demonstrate your skills and knowledge to prospective employers. When you complete this Professional Certificate, you’ll be one step closer toward preparing to sit for SSCP certification. 

This Professional Certificate program is ideal for anyone with a passion for threat hunting and cyber incident management and response. You can expect this course to deepen your ability to think critically and solve complex problems in the realm of information security.

Required (ISC)² Systems Security Certified Practitioner (SSCP) Certificate Courses

Security Concepts and Practices

BEGINNER | Information Technology | Self-paced | 10 hours

Course 1 - Security Concepts and Practices This is the first course under the specialization SSCP. In this course, we will focus on the core aspects of security concepts and practice, starting with the importance of codes of ethics. We will then cover the basic principles of information security and move on to describe security controls, their implementation, maintenance, and assessment. We will also address the identification of corporate assets and the change management life cycle. We will then explain the importance of awareness and training and conclude with an exploration of physical security operations. Course 1 Learning Objectives After completing this course, the participant will be able to:  - Recall the ISC2 Code of Ethics. - Explain the importance of an organizational code of ethics in the cybersecurity profession. - Compare the security concepts of confidentiality, integrity, and availability. - Apply accountability in the implementation of certain data protection controls. - Explain the concept of non-repudiation. - Discuss the concept of least privilege. - Indicate the importance of segregation of duties. - Differentiate technical, physical, and administrative security controls. - Relate security controls to considerations of assessing compliance requirements and organizational needs. - Indicate the importance of periodic audit and review of security controls. - Categorize various control types or technologies based on their different roles as part of an overall security structure and posture. - Summarize the security of assets all through the stages of their life cycle. - Examine operational requirements of change management. - Categorize security education and awareness strategies. - Define measurements for gauging the effectiveness of a security education and awareness program. - Indicate strategies that security professionals can use to collaborate with physical security operations. Who Should Take This Course: Beginners Experience Required: No prior experience required
Access Control

BEGINNER | Information Technology | Self-paced | 6 hours

Course 2 - Access Controls This is the second course under the specialization SSCP. In this course, we will examine the business of controlling how our systems, services, resources and data can be Safely accessed only by those authorized to do so. We will discuss authentication methods, trust, the identity management life cycle and access control models. Course 2 Learning Objectives After completing this course, the participant will be able to:  - Categorize identity and access management implementation authentication methods.  - Discuss the importance of trust from a security standpoint.  - Compare levels of trust among various relationships and internetwork architectures.  - Explain the implications of trust among third-party connections.  - Differentiate among the activities of the identity management life cycle.  - Categorize various access control models.  - Define the elements, methods, and processes used when administering access control models.  Who Should Take This Course: Beginners Experience Required: No prior experience required
Risk Identification, Monitoring, and Analysis

BEGINNER | Information Technology | Self-paced | 6 hours

Course 3 - Risk Identification, Monitoring and Analysis This is the third course under the specialization SSCP In this course, we will explore how to manage the risks related to information systems. It is time to bring these ideas together in a context of continuous maturity modeling, measuring, and monitoring, which we will see is focused on the here and now. Risk alignment works best at the strategic, long-term level of planning; risk maturation, by contrast, can be most effective when considered in the day-to-day of business operations. This is sometimes called operationalizing the approach to risk management and maturation. Course 3 Learning Objectives After completing this course, the participant will be able to:  - Identify common risks and vulnerabilities. - Describe risk management concepts.  - Recognize risk management frameworks.  - Provide examples of appropriate risk tolerance.  - Provide examples of appropriate risk treatment.  - Identify risks of noncompliance with laws and regulations.  - Identify appropriate methods for risk management frameworks implementation.  - Indicate the range and scope of risk review.  - Identify the components of risk review.  - Describe vulnerability assessment activities used to examine all aspects of network and system security.  - Review the steps for monitoring, incident detection, and data loss prevention.  - Classify the use of tools that collect information about the IT environment to better examine the organization’s security posture.  - Identify events of interest to focus on those that may be part of an attack or intrusion.  - Select methods for managing log files.  - Describe tools and methods for analyzing the results of monitoring efforts.  - Identify communication requirements when documenting and reporting the results of monitoring security platforms.  Who Should Take This Course: Beginners Experience Required: No prior experience required
Incident Response and Recovery

BEGINNER | Information Technology | Self-paced | 4 hours

Course 4 - Incident Response and Recovery This is the fourth course under the specialization SSCP In this course, we will focus on incident response and recovery. We will explore the incident life cycle as defined by NIST and continue with a deeper look at supporting forensic investigations. We will also extend these ideas and concepts around the theme of business continuity and disaster recovery. Course 4 Learning Objectives After completing this course, the participant will be able to:  - Identify the elements of an incident response policy and members of the incident response team (IRT).  - Evaluate the security professional’s role in supporting forensic investigations.   - Explain how the security professional supports activities of business continuity and disaster recovery planning. Who Should Take This Course: Beginners Experience Required: No prior experience required
Cryptography

BEGINNER | Information Technology | Self-paced | 6 hours

Course 5 - Cryptography This is the fifth course under the specialization SSCP. In this course, we will explore the field of cryptography, including public-key infrastructures (PKIs), certificates, and digital signing. Here we enter the realm of confidentiality, integrity, and availability, since we use cryptography to protect data from unauthorized disclosure and improper modification and use encryption to regulate the ability of users to log in to systems and applications. Course 5 Learning Objectives After completing this course, the participant will be able to:  - Recognize the impacts of cryptography on confidentiality, integrity, and authenticity.  - Determine the requirements for cryptography when handling sensitive data.  - Identify regulatory and industry best practices in cryptography.  - Define cryptography entropy.  - Differentiate common cryptographic techniques used to enhance the security of sensitive data including hashing, salting, symmetric/asymmetric encryption, and elliptic curve cryptography.  - Identify the features and requirements of nonrepudiation.  - Compare the strength of different encryption algorithms and keys.  - Describe the process of identifying and addressing cryptographic attacks.  - Define the features of and the implementation process of secure services and protocols.  - Discuss common use cases for secure services and protocols.  - Explain limitations and vulnerabilities in the implementation of secure protocols.  - Summarize fundamental key management concepts.  - Describe the features of the Web of Trust (WoT) in relation to cryptographic protocols.  Who Should Take This Course: Beginners Experience Required: No prior experience required
Network and Communications Security

BEGINNER | Information Technology | Self-paced | 9 hours

Course 5: Network and Communications Security Welcome to course five: network and communication security. As we know, the explosive growth in networks, connectivity, and communications has paved the way for unprecedented transformation of business, personal, and government services into electronic, web enabled forms. This growth in e-business and e-commerce greatly expanded the threat surface. Fraudsters, criminals, unscrupulous business competitors, nation states, and non-nation state actors can take harmful actions against others worldwide. For decades, the world has operated on what is basically a network monoculture. One set of protocols and standards are used to power most of the internet, the worldwide, web e-commerce, and e-business. These standards include the open systems interconnection seven layer model from international organization for standardization and transmission. And the control protocol over internet protocol model from internet engineering taskforce. Almost every laptop, many smart devices, and other such end points use these standards to communicate with servers, and applications, and businesses, and governments. Therefore these models, or protocol stacks become our map of the threat surface. Security professionals need to have a solid understanding of modern networks and internet work concepts, techniques, technologies, and security issues. Their work is like police patrols, because they need to be familiar with the neighborhood's environment. Security professionals need to know the best ways to keep the neighborhood secure and to defend against attacks. The need for such a policing mentality is particularly urgent if the company has limited or no remote visibility into its operational technology systems. For this course, in module one, we start with a brief orientation to the network neighborhood, through the open systems interconnection seven layer, and transmission control protocol over internet protocol models. Then, we dive into all eight layers of this combined protocol stack. Introducing the key technologies at each layer and their regular use. In module two, we look at the various protocols that run on top of this architecture. In module three, we focus on attack and defensive strategies and tactics and build on the industry leading approach to put threat surface analysis into both the attackers and defenders operational context. In the last module, we bring these ideas together into a network security management and monitoring perspective. Now, let's discuss these four modules in detail. Course 5 Learning Objectives After completing this course, the participant will be able to:  L5.1 - Recognize layers of the OSI model, their functions and attacks present at each layer. L5.2 - Identify commonly used ports and protocols. L5.3 - Select appropriate countermeasures for various network attacks. L5.4 - Summarize best practices for establishing a secure networked environment. Course Agenda Module 1: Apply the Fundamental Concepts of Networking (Domain 6 - Network and Communications Security) Module 2: Securing Ports and Protocols (Domain 6 - Network and Communications Security) Module 3: Network Attacks and Countermeasures (Domain 6 - Network and Communications Security) Module 4: Manage Network Security (Domain 6 - Network and Communications Security) Who Should Take This Course: Beginners Experience Required: No prior experience required
Systems and Application Security

BEGINNER | Information Technology | Self-paced | 11 hours

Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices. Second, so many of the enhanced functions we take for granted in our daily personal and professional lives are made possible by cloud services, where our data is stored or processed.  Course 7 Learning Objectives After completing this course, the participant will be able to:  - Classify different types of malware. - Determine how to implement malware countermeasures. - Identify various types of malicious activities.  - Develop strategies for mitigating malicious activities.  - Describe various social engineering methods used by attackers.  - Explain the role of behavior analytics technologies in detecting and mitigating threats.  - Explain the role and functionality of host-based intrusion prevention system (HIPS), host-based intrusion detection system (HIDS), and host-based firewalls.  - Evaluate the benefits of application whitelisting in endpoint device security.  - Explain the concept of endpoint encryption and its role in endpoint security.  - Describe the role and functionality of Trusted Platform Module (TPM) technology in providing hardware-based security features.  - Identify the steps in implementing secure browsing practices using digital certificates and secure communication protocols.  - Explain the concept of endpoint detection and response (EDR) and its role in providing real-time monitoring, detection, investigation, and response capabilities to identify and mitigate advanced threats and security incidents on endpoint devices.  - Identify provisioning techniques for mobile devices.  - Explain the concept of containerization and how it contributes to effective mobile device management.  - Explain how encryption contributes to effective mobile device management.  - Describe the process of Mobile Application Management (MAM) to effectively manage the life cycle of mobile applications.  - Distinguish among public, private, hybrid, and community deployment models in cloud security.  - Distinguish among various service models and their impact on cloud security practices.  - Describe virtualization technologies and their role in maintaining cloud security.  - Identify legal and regulatory concerns related to cloud security.  - Determine strategies to implement data storage, processing, and transmission while maintaining cloud security.  - Explain the requirements and considerations associated with third-party services and outsourcing in cloud storage.  - Explain the concept of the shared responsibility model in cloud storage.  - Identify steps to manage and secure hypervisor environments.  - Explain how to deploy, configure, and maintain virtual appliances within virtualized environments.  - Determine the process for managing containerized environments.  - Describe the best practices of storage management in virtualized environments.  - Develop strategies for ensuring business continuity and resilience in virtualized environments.  - Analyze potential threats and attacks targeting virtual environments. Who Should Take This Course: Beginners Experience Required: No prior experience required

Complete This Certificate. Get College Credit.

You know that skill-specific courses will open the door to specialized jobs, but did you know that they will also move you closer to a degree at Franklin University?

The University has evaluated hundreds of certifications for industry-recognized proficiencies and awards credit that equates to specific Franklin courses, as well as technical- or elective-credit requirements. See how much time and money you'll save toward your degree by building on prior learning credit.

Browse & Filter

Degree Type
Program Type



Bolster Your Professional Skills

Take back control or rethink your career by strengthening your skills with a Professional Certificate through Franklin. Learn, hone or master job-related skills with professional development classes that won't break the bank or gobble up your free time. These online courses let you feed your curiosity and develop new skills that have real value in the workplace. Learn at your own pace. Cancel your subscription anytime.

Showcase Your Capabilities

Through Franklin’s partnership with Coursera, Certificate courses let you apply your learnings and build a career portfolio that helps demonstrate your professional capabilities to employers. Whether you're moving into a new field or progressing in your current one, the hands-on projects offer real-world examples that help illustrate your skills and abilities. Project completion is required to earn your Certificate.

Gain a Competitive Advantage

Get noticed by hiring managers and by your network of professional connections when you add a Professional Certificate to your credentials. Many Certificates are step toward full certification while others are the start of a new career journey. At Franklin, your Certificate also may be evaluated for course credit if you decide to enroll in one of our many degree programs.

Frequently Asked Questions

How much does the (ISC)² Systems Security Certification Practitioner Professional Certificate cost?

When you enroll in this self-paced certificate program, you decide how quickly you want to complete each of the courses in the specialization. To access the courses, you pay a small monthly cost of $35, so the total cost of your Professional Certificate depends on you. Plus, you can take a break or cancel your subscription anytime.

How long does it take to finish the (ISC)² Systems Security Certification Practitioner Professional Certificate?

It takes about 4-5 months to finish all the courses and hands-on projects to earn your certificate.

What prior experience do I need to enroll?

No prior experienced is needed for this beginner-level series. Enroll now.

What will I be able to do with my (ISC)² Systems Security Certification Practitioner Professional Certificate?

In addition to being one step closer to your SSCP certification, you'll have the foundational knowledge and skills needed to implement, deploy, maintain, and monitor security controls for IT infrastructure.

Plus, you'll want to share your certificate with your professional network to demonstrate your ability to ensure data confidentiality, integrity, and availability.

Do I need to apply and be accepted as a Franklin University student to take courses offered through the FranklinWORKS Marketplace?

No. Courses offered through the Marketplace are for all learners. There is no application or admission process.

If I complete a certificate and decide to enroll at Franklin, how do I get course credit toward a degree?

Please submit your certificate to plc@franklin.edu for review and processing. After your official evaluation has been completed, please review it to ensure that all eligible credits have been applied. 

You can submit documentation before or after you apply to Franklin.



3-4
Months to Complete

Shareable Certificate

Earn a certificate upon completion

100% Online

Start instantly and learn on your own schedule

Flexible

Set timelines that are convenient for you

Beginner Level

For anyone who is interested in learning

Login

Returning User

Have you taken Franklin courses previously? If so, you can log in with your existing credentials:

LOG IN

If you have an account but do not know your username or password, you can recover them here:

ACCOUNT RECOVERY

New User

The email address you entered is already associated with a Franklin account.

Please LOG IN in the Returning User area.

If you have an existing account with Franklin University but are unable to log in, you can recover a lost or forgotten username/password with the ACCOUNT RECOVERY button.

If you believe this to be in error, or if you are unable to use your existing Franklin account credentials, please contact the Franklin University Helpdesk for assistance.

Pay Now to Enroll in Coursera Programs!

For $49 per month, you will receive unlimited access to the full catalog of programs offered through Franklin University's partnership with Coursera.

Learn at your own pace, and cancel your subscription at any time.

(ISC)² Systems Security Certified Practitioner (SSCP) Certificate Online

Total $0

We do not refund payment for online courses or programs. If you purchased an online course and it is not what you expected, please contact us at FWMarketplace@franklin.edu to share your constructive feedback.

Ask A Question

Partnership and Group Discounts

If you are with an organization looking to upskill your workforce, discounted group pricing is available. Please contact:

Whitney Iles
Director of Partnerships and Client Management
whitney.iles@franklin.edu
614.947.6702

Additional Options

If you can't find what you're looking for, additional options may be available. Please contact:

David Kerr
Strategic Alliances Systems & Operations Director
FWMarketplace@franklin.edu
614.947.6079

How It Works

  1. Create Your Account

    Sign up with just your name, email, and phone number. This will let you log in and save your favorite programs as you browse our offerings, as well as access any products you purchase.

  2. Pay Now to Enroll

    Some programs are included as part of our $49 monthly subscription, while others are priced on an individual basis. Select what works for you and pay through our fast, simple, and secure payment portal.

  3. Start Learning

    Choose from our self-paced offerings to work on your own schedule, or select instructor-led courses for a more traditional experience.

  4. Share

    Share the certificates, badges, and credentials you earn to put your new skills to work for you.

How It Works

  1. Sign Up

    Provide your name, email and phone number to start learning more about MedCerts and get connected to a personal education consultant.

  2. Meet Your Education Consultant

    Enroll in your ideal program based on your career goals. We'll help you determine the best path & payment plan for you.

  3. Start Learning

    Utilize our immersive learning & dynamic exam prep. Get guidance and motivation from your personal Student Success Advisor.

  4. Get Certified

    Use your newly learned knowledge to take your certification exam & gain national credentials.

Partner Console

Your changes were successfully submitted