ISC2 • SSCP
The SSCP validates advanced technical skills and practical knowledge to implement, monitor, and administer IT infrastructure using security best practices. It demonstrates a practitioner's ability to ensure data confidentiality, integrity, and availability across operational IT roles.
Questions
849
Duration
120 minutes
Passing Score
700/1000
Difficulty
AssociateLast Updated
Mar 2026
The Systems Security Certified Practitioner (SSCP) is an intermediate-level cybersecurity certification awarded by ISC2 that validates the advanced technical skills and practical knowledge required to implement, monitor, and administer IT infrastructure using security best practices. It specifically targets hands-on operational security roles, testing a practitioner's ability to safeguard data confidentiality, integrity, and availability across seven core domains: Security Concepts and Practices, Access Controls, Risk Identification, Incident Response and Recovery, Cryptography, Network and Communications Security, and Systems and Application Security.
As of October 1, 2025, the SSCP transitioned to Computerized Adaptive Testing (CAT) — the same format used by the CISSP — meaning each exam session is uniquely tailored to the candidate's demonstrated proficiency. The certification is ANAB accredited under ISO/IEC Standard 17024, approved under U.S. DoD Directive DoDM 8140.03 (successor to DoD 8570), and recognized by global bodies including AISA, SFIA, and ENISA. It satisfies DoD IAT Level II and IAM Level I position requirements, making it particularly valuable for government and defense sector professionals.
The SSCP is designed for IT professionals in hands-on, operational security roles who are responsible for the day-to-day implementation and monitoring of security controls. Ideal candidates include systems administrators, network security engineers, security analysts, security consultants, database administrators, and health information managers. It is well-suited for professionals with at least one year of direct work experience in one or more of the seven SSCP domains.
Candidates who have not yet accumulated the required experience can still sit for the exam and, upon passing, become an Associate of ISC2 — a recognized credential that allows up to two years to fulfill the one-year experience requirement. The SSCP is also commonly pursued by professionals working toward the CISSP who want to validate their operational security competencies along the way.
Candidates must have a minimum of one year of cumulative, paid, full-time work experience in one or more of the seven domains covered by the SSCP Exam Outline. This experience must be in a hands-on technical or administrative security role; general IT experience does not automatically qualify. There are no mandatory prior certifications required, though familiarity with networking fundamentals, operating systems, and basic security principles is strongly recommended.
Candidates who pass the exam without meeting the experience requirement are designated as an Associate of ISC2 and have two years to earn and document the required experience before full certification is granted. Once certified, SSCPs must maintain their credential through annual submission of 60 Continuing Professional Education (CPE) credits over a three-year cycle and payment of an Annual Maintenance Fee (AMF) of $135.
The SSCP exam uses Computerized Adaptive Testing (CAT), a format in which the exam dynamically adjusts the difficulty of questions based on the candidate's performance, resulting in a session uniquely tailored to each individual. The exam consists of 100 to 125 items, which include multiple-choice questions and advanced item types (such as drag-and-drop or hotspot questions). The total testing time is 2 hours (120 minutes).
The exam is scored on a scale of 0 to 1,000 points, with a passing score of 700. It is administered at Pearson VUE testing centers and is available in English, Japanese, and Spanish. Because CAT adjusts in real time, the number of scored questions seen by each candidate may vary within the 100–125 range, and the exam concludes either when the system has sufficient statistical confidence in the candidate's proficiency or when the maximum item count or time limit is reached.
The SSCP is a recognized credential for entry- to mid-level cybersecurity professionals targeting hands-on technical roles. Common job titles held by SSCP-certified practitioners include Security Analyst, Systems Administrator, Network Security Engineer, Security Consultant, and IT Security Administrator. The certification is particularly impactful in government and defense contracting sectors, where DoD DoDM 8140.03 compliance is mandatory for IAT Level II and IAM Level I roles. Demand for SSCP-certified professionals spans finance, healthcare, technology, and government — industries with the highest compensation for cybersecurity roles.
According to PayScale data, SSCP holders report average base salaries around $84,000 in the U.S., with experienced professionals in roles such as Security Engineer reaching $122,000 and IT Security Administrators up to $110,000. Top-paying states for information security roles include New York, California, Maryland, and Virginia. The SSCP also serves as a recognized stepping stone toward the CISSP, ISC2's flagship certification for senior security practitioners and managers, making it a strategically valuable credential for long-term career progression in cybersecurity.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 849 questions.
1. Contoso Financial's incident response team has just contained a ransomware outbreak that affected 50 workstations. The malware has been isolated and the team has confirmed no further spread. According to the NIST SP 800-61 incident response lifecycle, which phase should the team execute next? (Select one!)
Explanation
After containment, the next phase in NIST SP 800-61 is eradication, which involves removing malware from all affected systems, closing backdoors, patching exploited vulnerabilities, and performing root cause analysis. The NIST model combines Containment, Eradication, and Recovery into a single phase, but eradication logically follows containment. Preparation is the first phase and occurs before any incident. Detection and Analysis is the second phase that has already been completed since the incident was identified and contained. Post-Incident Activity is the final phase that occurs after recovery, involving lessons learned and process improvements.
2. Litware is migrating their on-premises application infrastructure to a public cloud IaaS deployment. The security team needs to understand which security responsibilities transfer to the cloud service provider and which remain with Litware. In an IaaS shared responsibility model, which layers remain the customer's responsibility? (Select two!)
Multiple correct answersExplanation
In an IaaS shared responsibility model, the customer retains responsibility for operating system patching and hardening, and for application security and data classification. The cloud service provider secures the infrastructure of the cloud, including physical facilities, network infrastructure, and the hypervisor layer. The customer secures everything in the cloud, including operating systems, middleware, applications, and data. Physical data center security, power management, hardware procurement, and firmware updates are all the cloud provider's responsibility in any cloud service model. Data classification always remains the customer's responsibility regardless of the service model because only the data owner can determine the sensitivity and appropriate handling requirements for their data.
3. Adatum Corp's security operations center is configuring their SIEM system to prioritize alerts. An analyst receives a syslog message with severity level 2. Which severity classification does this represent, and what response priority should it receive? (Select one!)
Explanation
Syslog severity level 2 corresponds to Critical, indicating a critical condition that requires immediate attention. The syslog severity scale ranges from 0 (Emergency, system unusable) through 1 (Alert, immediate action needed), 2 (Critical), 3 (Error), 4 (Warning), 5 (Notice), 6 (Informational), to 7 (Debug). A Critical severity means the system has a serious condition but is not completely unusable like an Emergency. Warning is severity level 4, not 2. Error is severity level 3. Emergency is severity level 0, which represents the most severe condition where the system is completely unusable.
4. Tailspin Toys' IT team is implementing IPSec to secure communications between their headquarters and a remote branch office. The solution must encrypt all traffic between the two sites, including the original IP headers, and create a secure tunnel over the public internet. Which IPSec configuration should be used? (Select one!)
Explanation
ESP in tunnel mode is the correct configuration for site-to-site VPN connections over the public internet. ESP (protocol 50) provides encryption, integrity, and authentication for the entire original IP packet including the original IP headers. Tunnel mode encapsulates the entire original packet within a new IP packet with new outer headers, creating a secure tunnel between the two sites. AH in transport mode provides only integrity and authentication without any encryption, failing to meet the encryption requirement. AH in tunnel mode still provides no encryption, only integrity verification and authentication of the outer and inner packet headers. ESP in transport mode encrypts only the payload of the original packet but leaves the original IP headers unprotected and visible, which does not meet the requirement to encrypt original IP headers. Tunnel mode is the default and recommended mode for site-to-site VPN implementations.
5. Contoso Corporation's development team is implementing a secure software development lifecycle for a new healthcare application. They need to identify security vulnerabilities in the source code during the implementation phase before the application is compiled and deployed. Which testing approach should they integrate into their CI/CD pipeline at this stage? (Select one!)
Explanation
Static Application Security Testing (SAST) analyzes source code, bytecode, or binaries without executing the application, making it ideal for the implementation phase during code development. SAST integrates directly into CI/CD pipelines to identify vulnerabilities such as buffer overflows, SQL injection patterns, and insecure coding practices before compilation. DAST requires a running application and is used later in the SDLC during the testing phase. Penetration testing is performed against deployed applications and is not practical during active code development. Fuzzing also requires a running application to receive malformed inputs and detect runtime crashes.
One-time access to this exam