ISC2 SSCP 120-Day Weekday Study Plan

This schedule breaks down the seven SSCP domains and the final review strategy into 120 sessions. The weighting of the domains has been used to approximate the number of days assigned to each area.

DayDomain90-Minute Session Focus
Week 1: D1 – Security Operations & Administration (15%)
Day 1D1Security Roles (CISO, Analyst, Data Owner, Custodian) and Responsibilities.
Day 2D1Security Awareness vs. Training (Behavior vs. Skills).
Day 3D1Change Management Process (Request, Approval, Implementation).
Day 4D1Asset Management: Identification, Classification, and Tracking.
Day 5D1Asset Management: Lifecycle Management and Disposal.
Week 2: D1 – Security Operations & Administration (Cont.)
Day 6D1Media Protection Procedures (Handling, Storage, Destruction).
Day 7D1Physical Security: Site Access and Entry Controls (Locks, Badges).
Day 8D1Physical Security: Environmental Controls (HVAC, Fire Suppression, Power).
Day 9D1Documentation: Policies, Standards, Procedures, and Guidelines.
Day 10D1Review D1 (Days 1-9) + Practice Questions.
Week 3: D2 – Access Controls (16%)
Day 11D2Authentication Factors: Something You Know (Passwords) and best practices.
Day 12D2Authentication Factors: Something You Have (Tokens, Smart Cards).
Day 13D2Authentication Factors: Something You Are (Biometrics, types, error rates).
Day 14D2Multi-Factor Authentication (MFA) and Defense-in-Depth.
Day 15D2Federated Identity: Concepts of SAML, OAuth, and OpenID Connect.
Week 4: D2 – Access Controls (Cont.)
Day 16D2Authorization Models: Mandatory Access Control (MAC).
Day 17D2Authorization Models: Discretionary Access Control (DAC).
Day 18D2Authorization Models: Role-Based Access Control (RBAC) (most common).
Day 19D2Principle of Least Privilege and Need-to-Know.
Day 20D2Account Provisioning, Review, and De-provisioning procedures.
Week 5: D2 – Access Controls (Cont.)
Day 21D2Access Control Technologies: Firewalls and Proxies (Forward/Reverse).
Day 22D2Access Control Technologies: RADIUS and TACACS+ protocols.
Day 23D2Network Access Control (NAC): Concepts and Enforcement Modes.
Day 24D2Review D2 (Days 11-23) + Practice Questions.
Day 25D3Risk Management Concepts: Assets, Threats, and Vulnerabilities.
Week 6: D3 – Risk Identification, Monitoring, and Analysis (15%)
Day 26D3Qualitative Risk Analysis: High/Medium/Low, Likelihood, and Impact.
Day 27D3Quantitative Risk Analysis: SLE, ARO, and ALE calculation.
Day 28D3Risk Treatment Options: Avoid, Transfer, Mitigate, Accept.
Day 29D3Vulnerability Assessments: Methods, tools, and reporting.
Day 30D3Penetration Testing Phases: Planning, Discovery, Attack.
Week 7: D3 – Risk Identification, Monitoring, and Analysis (Cont.)
Day 31D3Penetration Testing Types: Black Box, White Box, Gray Box.
Day 32D3Monitoring Tools: IDS vs. IPS (Signature vs. Anomaly-based).
Day 33D3SIEM (Security Information and Event Management) Overview.
Day 34D3SIEM: Log Aggregation, Normalization, and Correlation.
Day 35D3Log Management: Collection, Storage, and Retention policies.
Week 8: D3 – Risk Identification, Monitoring, and Analysis (Cont.)
Day 36D3Monitoring: Baselines, False Positives, and False Negatives.
Day 37D3Security Continuous Monitoring (SCM) and Alert Triage.
Day 38D3Review D3 (Days 25-37) + Practice Questions.
Day 39D4Incident Response (IR) Process: Preparation Phase.
Day 40D4IR Process: Identification (Detection and Triage).
Week 9: D4 – Incident Response and Recovery (14%)
Day 41D4IR Process: Containment (Isolation of affected systems).
Day 42D4IR Process: Eradication (Root cause removal).
Day 43D4IR Process: Recovery (Restoring systems).
Day 44D4IR Process: Lessons Learned (Post-incident review).
Day 45D4Digital Forensics: Importance of Chain of Custody.
Week 10: D4 – Incident Response and Recovery (Cont.)
Day 46D4Digital Forensics: Preserving Evidence (Volatile vs. Non-Volatile Data).
Day 47D4Business Continuity Planning (BCP): Maintaining essential functions.
Day 48D4Disaster Recovery Planning (DRP): Restoring IT infrastructure.
Day 49D4Recovery Metrics: RTO (Time) and RPO (Data Loss).
Day 50D4Backups: Full, Incremental, and Differential types.
Week 11: D4 – Incident Response and Recovery (Cont.)
Day 51D4Backup Storage Strategies (Offsite, Cloud) and Testing.
Day 52D4High Availability (HA) and Fault Tolerance concepts.
Day 53D4Review D4 (Days 39-52) + Practice Questions.
Day 54D5Cryptography Types: Symmetric (AES, DES, Speed).
Day 55D5Cryptography Types: Asymmetric (RSA, ECC, Key Exchange).
Week 12: D5 – Cryptography (9%)
Day 56D5Hashing: SHA-256, Integrity, and One-Way Function.
Day 57D5Public Key Infrastructure (PKI): Components (CA, RA, CRL).
Day 58D5PKI: Certificate Usage, Validation, and Revocation.
Day 59D5Key Management: Generation, Storage, and Escrow.
Day 60D5Key Management: Revocation and Destruction procedures.
Week 13: D5 & D6 – Cryptography (Cont.) & Network Security (16%)
Day 61D5Applications of Cryptography: TLS/SSL, S/MIME, PGP.
Day 62D5Review D5 (Days 54-61) + Practice Questions.
Day 63D6OSI Model Layers and Protocol Functions (L2, L3, L7).
Day 64D6Network Devices: Switches, Routers, and Hubs (functions/security).
Day 65D6Secure Network Devices: Firewalls and ACLs (Configuration Basics).
Week 14: D6 – Network and Communications Security (Cont.)
Day 66D6Secure Network Devices: Proxy Server types and filtering.
Day 67D6Secure Network Devices: IPS/IDS placement and modes.
Day 68D6Network Segmentation: VLANs and their security purpose.
Day 69D6Network Segmentation: DMZs and their role in perimeter defense.
Day 70D6Network Segmentation: Physical vs. Logical Separation.
Week 15: D6 – Network and Communications Security (Cont.)
Day 71D6Secure Protocols: SSH vs. Telnet, SNMPv3, Secure Email.
Day 72D6HTTPS/TLS: Understanding the handshake and encryption.
Day 73D6Wireless Security: Evolution from WEP to WPA3.
Day 74D6Wireless AP Security: Disabling SSID, MAC filtering, and power control.
Day 75D6Virtual Private Networks (VPNs): Remote Access VPNs.
Week 16: D6 – Network and Communications Security (Cont.)
Day 76D6VPNs: Site-to-Site VPNs and Tunneling Protocols (IPsec).
Day 77D6Network Hardening: Disabling unnecessary services and ports.
Day 78D6Network Monitoring and Traffic Analysis (Basics).
Day 79D6Review D6 (Days 63-78) + Practice Questions.
Day 80D7Operating System Hardening: Patches and updates management.
Week 17: D7 – Systems and Application Security (15%)
Day 81D7OS Hardening: Disabling unnecessary services/accounts and Baselines.
Day 82D7Endpoint Security: Antivirus/Antimalware and host-based firewalls.
Day 83D7Endpoint Detection and Response (EDR) concepts.
Day 84D7Virtualization Security: Hypervisor types (Type 1/2) and risks.
Day 85D7Virtualization Security: VM Sprawl and VM Escapes.
Week 18: D7 – Systems and Application Security (Cont.)
Day 86D7Cloud Deployment Models: IaaS, PaaS, and SaaS (Security Responsibility).
Day 87D7Cloud Security: Shared Responsibility Model in detail.
Day 88D7Database Security: Access Control and Least Privilege for queries.
Day 89D7Database Security: Encryption (At Rest and In Transit).
Day 90D7Software Development Life Cycle (SDLC) Security: Integration points.
Week 19: D7 – Systems and Application Security (Cont.)
Day 91D7SDLC: Secure Coding Practices and Input Validation.
Day 92D7SDLC: Testing (Static, Dynamic, and Interactive Analysis).
Day 93D7Malware Analysis Basics: Ransomware, Spyware, Rootkits.
Day 94D7Malware Detection Methods and Indicators of Compromise (IOCs).
Day 95D7Review D7 (Days 80-94) + Practice Questions.
Week 20: Comprehensive Review & Practice Exams
Day 96ReviewFull D1 & D2 Review (Operations & Access Controls).
Day 97ReviewFull D3 & D4 Review (Risk, IR, and Recovery).
Day 98ReviewFull D5 & D6 Review (Crypto & Network Security).
Day 99ReviewFull D7 Review (Systems & Application Security).
Day 100PracticeMini Practice Exam 1 (60 questions) + Review Results.
Week 21: Deep Dive & Targeted Practice
Day 101Deep DiveReview weakest areas identified in Mini-Exam 1 (e.g., Quantitative Risk).
Day 102Deep DiveReview second weakest areas (e.g., Network Segmentation).
Day 103Deep DiveReview ISC2 Code of Ethics and Ethical Scenario Questions.
Day 104Deep DiveFocus on all Authorization Models (MAC, DAC, RBAC).
Day 105Deep DiveFocus on all Recovery Metrics (RTO, RPO, RTO/DRP testing).
Week 22: Full Practice Exams
Day 106PracticeFull Practice Exam 2 (125 questions, timed) – Simulate Exam Day.
Day 107ReviewThorough review of Full Practice Exam 2 results and detailed explanations.
Day 108Deep DiveReview all Cryptography concepts, focusing on application (PKI, Key Management).
Day 109Deep DiveReview all Network Security concepts, focusing on secure protocols (SSH, HTTPS, WPA3).
Day 110PracticeMini Practice Exam 3 (60 questions) + Review Results.
Week 23: Consolidation and Process Review
Day 111ConsolidationFocus on the Change Management Process and the IR Process phases.
Day 112ConsolidationReview all Documentation requirements (Policies, Standards, Procedures).
Day 113ConsolidationReview all Access Control principles (Least Privilege, Need-to-Know).
Day 114ConsolidationReview all Media Protection and Asset Disposal steps.
Day 115PracticeFull Practice Exam 4 (125 questions, timed) – Simulate Exam Day.
Week 24: Final Polish (The Week Before the Exam)
Day 116Final ReviewReview Full Practice Exam 4 results.
Day 117Final ReviewRead through the entire SSCP Study Guide summary one last time.
Day 118Final ReviewReview key acronyms and metrics (RPO, RTO, ALE, MAC/DAC/RBAC).
Day 119Final ReviewLight review. Confirm test center logistics. Rest and relax!
Day 120EXAM DAYPASS THE SSCP!