Got a question? Call 02 8286 9429   |   
Cyber Security Category

Systems Security Certified Practitioner (SSCP®) - Self-paced

  • Length self-paced
Course overview
Book now

Why study this course

Official (ISC)² Online Self-paced Training gives you the freedom to learn anytime, anywhere. Targeted courseware aligns with the new SSCP exam outline and enhances learning with instructional videos, audio presentations, interactive exercises and assessments. When you need extra support, email (ISC)2 Authorized Instructors with your questions for expert guidance. 

(ISC)² developed the Systems Security Certified Practitioner (SSCP) certification for individuals in operational IT roles seeking to prove their knowledge, skills and experience by attaining an ISO-accredited certification. SSCP provides confirmation of a practitioner’s ability to implement, monitor and administer IT infrastructure in accordance with cybersecurity policies and procedures that ensure data confidentiality, integrity and availability. 

SSCP Self-paced training includes:

  • 180-day access to official course content:

    • 22+ hours of video-based instructional content

    • 20 content-specific learning activities and 12 applied scenarios

    • 61 knowledge checks

    • 8 end-of-chapter quizzes with answer feedback

    • 160-question post-course assessment with answer feedback

    • Online interactive flash cards

    • Glossary of terms

    • 24x7x365 chat technical support, provided by (ISC)²

    • Instructor email support, provided by (ISC)²

  • Official (ISC)2 Certificate of Completion

  • Course Completion Badge

Please note: The exam is not included in the course fee but can be purchased separately.

Introducing Systems Security Certified Practitioner (SSCP®)

Can’t see the video above? Click here to open it in a new screen.

Aligns to certification

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.

What you’ll learn

  • Describe security and the alignment of asset management to risk management

  • Appraise risk management options and the use of access controls to protect assets

  • Examine the field of cryptographyto secure information and communication

  • Build a security posture by securing software, data, and endpoints

  • Apply network and communications security to establish a secure networked environment

  • Evaluate cloud and wireless security

  • Prepare for incident detection and response

  • Implement appropriate measures that contribute to the maturation of risk management

Stay ahead of the technology curve

Don’t let your tech outpace the skills of your people

Quality instructors and content

Expert instructors with real world experience and the latest vendor- approved in-depth course content.

Partner-Preferred Supplier

Chosen and awarded by the world’s leading vendors as preferred training partner.

Ahead of the technology curve

No matter your chosen technologies or platforms, we can help you stay one step ahead.

Who is the course for?

This course is for individuals planning to pursue the SSCP certification. The SSCP is the ideal certification for those with proven technical skills and practical, hands-on security knowledge in operational IT roles. It provides confirmation of a practitioner's ability to implement, monitor, and administer IT infrastructure in accordance with information security policies and procedures that ensure data confidentiality, integrity and availability. 

Course subjects

Refer to the SSCP Exam Outline for a deeper dive into the SSCP domains.

Domain 1. Security Operations and Administration

  • Comply with codes of ethics

  • Understand security concepts

  • Identify and implement security controls

  • Document and maintain functional security controls

  • Participate in asset management lifecycle (hardware, software and data)

  • Participate in change management lifecycle

  • Participate in implementing security awareness and training (e.g., social engineering/ phishing)

  • Collaborate with physical security operations (e.g., data center assessment, badging)

Domain 2. Access Controls

  • Implement and maintain authentication methods

  • Support internetwork trust architectures

  • Participate in the identity management lifecycle

  • Understand and apply access controls

Domain 3. Risk Identification, Monitoring and Analysis

  • Understand the risk management process

  • Understand legal and regulatory concerns (e.g., jurisdiction, limitations, privacy)

  • Participate in security assessment and vulnerability management activities

  • Operate and monitor security platforms (e.g., continuous monitoring)

  • Analyse monitoring results

Domain 4. Incident Response and Recovery

  • Support incident lifecycle (e.g., National Institute of Standards and Technology (NIST), International Organisation for Standardisation (ISO))

  • Understand and support forensic investigations

  • Understand and support business continuity plan (BCP) and disaster recovery plan (DRP) activities

Domain 5. Cryptography

  • Understand reasons and requirements for cryptography

  • Apply cryptography concepts

  • Understand and implement secure protocols

  • Understand and support public key infrastructure (PKI) systems

Domain 6. Network and Communications Security

  • Understand and apply fundamental concepts of networking

  • Understand network attacks (e.g., distributed denial of service (DDoS), man-in-the-middle (MITM), Domain Name System (DNS) poisoning) and countermeasures (e.g., content delivery networks (CDN))

  • Manage network access controls

  • Manage network security

  • Operate and configure network-based security devices

  • Secure wireless communications

Domain 7. Systems and Application Security

  • Identify and analyse malicious code and activity

  • Implement and operate endpoint device security

  • Administer Mobile Device Management (MDM)

  • Understand and configure cloud security

  • Operate and maintain secure virtual environments


Prior to taking this course the learner should have experience, skills, or knowledge obtained while serving in the following roles: 

  • Network Security Engineer 

  • IT/Systems/Network Administrator 

  • Security Analyst 

  • Systems Engineer 

  • Security Consultant/Specialist 

  • Security Administrator 

  • Systems/Network Analyst 

  • Database Administrator 

  • Individuals operating in a security operations center (SOC) environment performing the role of incident handler, SIEM, forensics specialist, threat intel researcher, etc. 

Candidates must have a minimum of one year cumulative paid work experience in one or more of the seven domains of the SSCP CBK® (Common Body of Knowledge). A one year prerequisite pathway will be granted for candidates who received a degree (bachelors or masters) in a cybersecurity program.

A candidate who doesn’t have the required experience to become an SSCP may become an Associate of (ISC)² by successfully passing the SSCP examination. The Associate of (ISC)² will then have two years to earn the one year required experience.

Terms & Conditions

The supply of this course by DDLS is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.

Request Course Information

By submitting an enquiry, you agree to our privacy policy and receiving email and other forms of communication from us. You can opt-out at any time.