Course details

System Security Certified Practitioner (SSCP 2018): Securing Environments

System Security Certified Practitioner (SSCP 2018): Securing Environments

Expected Duration
Lesson Objectives
Course Number
Expertise Level


Learners can explore how to secure virtual and cloud environments in this 12-video course, which examines different types of virtualization technologies, including hypervisors, application virtualization, OS (operating system) virtualization, and desktop virtualization. Prepare for the Systems Security Certified Practitioner (SSCP) certification exam by examining hypervisors, a physical host that runs virtual machines, and appropriate software, and uses them to increase server density. You will learn about application virtualization, where the app files are not installed on the host machine, but run on the host machine. Next, you will examine OS virtualization where a virtual machine is assigned virtual hardware, such as virtual CPUs, virtual network adapters, and hard disks. You will learn how to install and configure a Microsoft Hyper-V Virtual Machine. Learn how to configure iSCSI (Internet Small Computer Systems Interface), and secure it by using CHAP (challenge handshake authentication protocol). Then learn to use AWS (Amazon Web Service) to secure data at rest in the cloud. Finally, you will examine laws and regulations to consider when using public cloud services.

Expected Duration (hours)

Lesson Objectives

System Security Certified Practitioner (SSCP 2018): Securing Environments

  • Course Overview
  • describe the benefits of operating system and application virtualization
  • explain the purpose of Type 1 and Type 2 hypervisors
  • install Microsoft Hyper-V on a Windows Server
  • explain how to secure hypervisors and virtual machines
  • configure a virtual machine on a protected Hyper-V network
  • configure iSCSI and CHAP on a Microsoft iSCSI network
  • explain the differences between virtualization and public/private/community/hybrid clouds and shared responsibility
  • distinguish the differences between SaaS, IaaS, PaaS, and their SLAs
  • describe auditing, data portability, data destruction, and how archiving and server-side encryption can protect cloud stored data
  • discuss how laws and regulations apply to the use of public cloud computing regarding jurisdiction, data ownership, and eDiscovery
  • use standard techniques to protect cloud and virtual assets
  • Course Number:

    Expertise Level