View Standards

EXAM OVERVIEW

The SSP certification exam evaluates the core competencies required to operate and maintain tactical SATCOM systems. It includes eleven modules with a total of 175 questions. Candidates are allowed a maximum of 43 incorrect answers to pass the exam.

  • Format: Online, proctored exam

  • Duration: 1.5 hours

  • Passing Score: 75% (132/175 correct answers)

The exam assesses candidates on three dimensions of knowledge:

  • Factual (What): Understanding key concepts and definitions.

  • Conceptual (Why): Recognizing the importance and reasoning behind practices.

  • Procedural (How): Applying methods to real-world scenarios.

Exam standards

  • 1.1. Explain the purpose and importance of secure SATCOM links in government and enterprise environments.
    1.2. Identify secure communication protocols used in SATCOM:

    • 1.2.1. IPSec (Internet Protocol Security).

    • 1.2.2. Tactical Common Data Link (TCDL).

    1.3. Describe the implementation of encryption devices in SATCOM systems:

    • 1.3.1. Type 1 encryption devices (e.g., KG-175 TACLANE).

    • 1.3.2. AES-256 encryption standards.

  • 2.1. Differentiate between symmetric and asymmetric encryption in SATCOM applications.
    2.2. Describe key management techniques:

    • 2.2.1. Generation, distribution, and storage of cryptographic keys.

    • 2.2.2. Over-the-Air Rekeying (OTAR) procedures.

    2.3. Explain the role of encryption in preventing data interception and spoofing.
    2.4. Identify challenges in maintaining encryption standards during mission-critical operations.

  • 3.1. Define Electronic Counter-Countermeasures (ECCM) and their importance in SATCOM resilience.
    3.2. Identify common jamming techniques and their effects on SATCOM networks:

    • 3.2.1. Uplink jamming.

    • 3.2.2. Downlink jamming.

    3.3. Describe anti-jamming strategies, including:

    • 3.3.1. Frequency hopping.

    • 3.3.2. Null steering.

    • 3.3.3. Beamforming.

    3.4. Explain the use of spectrum monitoring tools to detect and counteract interference.

  • 4.1. Outline the process for configuring secure SATCOM networks:

    • 4.1.1. Setting up access controls.

    • 4.1.2. Establishing encryption and authentication protocols.

    4.2. Explain the role of network segmentation in enhancing security.
    4.3. Identify and mitigate vulnerabilities in SATCOM hardware and software.

  • 5.1. Identify cybersecurity threats to SATCOM networks, including:

    • 5.1.1. Man-in-the-middle attacks.

    • 5.1.2. Malware targeting ground stations.

    5.2. Describe best practices for securing SATCOM ground infrastructure.
    5.3. Explain the importance of endpoint security in SATCOM networks.
    5.4. Outline incident response protocols for SATCOM-specific cybersecurity breaches.

  • 6.1. Design SATCOM networks for redundancy and failover.
    6.2. Describe the role of diverse frequency bands (e.g., Ku, Ka, X) in enhancing resilience.
    6.3. Explain the integration of SATCOM with terrestrial and cloud-based systems for secure communication.

  • 7.1. Analyze advancements in quantum encryption and their potential application in SATCOM.
    7.2. Explore the role of artificial intelligence in monitoring and mitigating cybersecurity threats.
    7.3. Discuss developments in software-defined networks (SDN) for secure SATCOM configurations.

Previous
Previous

About