Certified in Cybersecurity
Tech skills for tomorrow, start today. Our CC Certified in Cybersecurity course has got you covered!
About This Course
Prepare for the ISC2 Certified in Cybersecurity certification and launch your career with an interactive and engaging training program.
Through clear, bite-sized lessons and practice tests, you’ll explore risk management strategies, learn to implement security controls and understand the ethical responsibilities of cybersecurity professionals.
The online cybersecurity course covers business continuity, disaster recovery, and incident response to ensure you’re prepared for any security event.
So, gear up because a lot of things in the cybersecurity landscape await you!
Skills You’ll Get
- Understand the CIA Triad and its role in cybersecurity.
- Implement authentication and authorization processes to control access to systems.
- Develop and enforce privacy management frameworks to protect sensitive data.
- Identify, assess, and mitigate risks using risk management strategies.
- Apply security controls to safeguard systems and networks.
- Navigate ethical guidelines and corporate ethics codes in cybersecurity.
- Design business continuity and disaster recovery plans to ensure operational resilience.
- Respond to and manage security incidents effectively.
- Secure physical and logical access to facilities and systems.
- Protect networks from threats like malware, eavesdropping, and DoS attacks.
- Implement encryption and data handling best practices to secure information.
- Monitor and log activities to detect and respond to security breaches.
- Develop and enforce security policies to maintain a secure environment.
- Conduct security awareness training to combat social engineering and other attacks
Interactive Lessons
26+ Interactive Lessons | 149+ Exercises | 46+ Quizzes | 100+ Flashcards |
Gamified TestPrep
1+ Full Length Tests | 100+ Practice Test Questions
Introduction
- CC Certification
- Taking the CC Exam
- Computer-Based Testing Environment
- Exam Retake Policy
- Recertification Requirements
Confidentiality, Integrity, Availability, and Non-repudiation
- Understand the Security Concepts of Information Assurance
- The CIA Triad
- Non-Repudiation
Authentication and Authorization
- Understand the Security Concepts of Information Assurance
- Access Control Process
- Password Policies
- Authentication Factors
Privacy
- Understand the Security Concepts of Information Assurance
- Privacy
- Privacy Management Framework
Risk Management
- Understand the Risk Management Process
- Risk Types
- Risk Identification and Assessment
- Risk Treatment Strategies
- Risk Profile and Tolerance
Security Controls
- Understand Security Controls
- What are Security Controls?
- Categorizing Security Controls
Ethics
- Understand ISC2 Code of Ethics
- Corporate Ethics Codes
- ISC2 Code of Ethics
- Ethics Complaint Procedure
Security Governance Processes
- Understand Governance Processes
- Security Policies and Procedures
- Laws and Regulations
Business Continuity
- Understand Business Continuity (BC)
- Business Continuity Planning
- Business Continuity Controls
- High Availability and Fault Tolerance
Disaster Recovery
- Understand Disaster Recovery (DR)
- Disaster Recovery Planning
- Backups
- Disaster Recovery Sites
- Testing Disaster Recovery Plans
Incident Response
- Understand Incident Response
- Creating an Incident Response Program
- Building an Incident Response Team
- Incident Communications Plan
- Incident Identification and Response
Physical Access Controls
- Understand Physical Access Controls
- Physical Facilities
- Designing for Security
- Visitor Management
- Physical Security Personnel
Logical Access Controls
- Understand Logical Access Controls
- Authorization
- Account Types
- Non-Repudiation
Computer Networking
- Understand Computer Networking
- Network Types
- TCP/IP Networking
- IP Addressing
- Network Ports and Applications
- Securing Wi-Fi Networks
Network Threats and Attacks
- Understand Network Threats and Attacks
- Malware
- Eavesdropping Attacks
- Denial-of-Service Attacks
- Side-Channel Attacks
Threat Identification and Prevention
- Understand Network Threats and Attacks
- Antivirus Software
- Intrusion Detection and Prevention
- Firewalls
- Vulnerability Scanning
Network Security Infrastructure
- Understand Network Security Infrastructure
- Data Center Protection
- Network Security Zones
- Switches, WAPs, and Routers
- Network Segmentation
- Virtual Private Networks
- Network Access Control
- Internet of Things
Cloud Computing
- Understand Network Security Infrastructure
- Cloud Computing
- Cloud Deployment Models
- Cloud Service Categories
- Security and the Shared Responsibility Model
- Automation and Orchestration
- Vendor Relationships
Encryption
- Understand Data Security
- Cryptography
- Encryption Algorithms
- Uses of Encryption
- Hash Functions
Data Handling
- Understand Data Security
- Data Life Cycle
- Data Classification
Logging and Monitoring
- Understand Data Security
- Logging
- Log Monitoring
Configuration Management
- Understand System Hardening
- Configuration Management
- Configuration Vulnerabilities
Best Practice Security Policies
- Understand Best Practice Security Policies
- Acceptable Use Policy
- Data Handling Policy
- Password Policy
- Bring Your Own Device Policy
- Privacy Policy
- Change Management Policy
Security Awareness Training
- Understand Security Awareness Training
- Social Engineering
- Security Education
Practice Test
Flashcard
Confidentiality, Integrity, Availability, and Non-repudiation
Authentication and Authorization
Privacy
Risk Management
Security Controls
Ethics
Security Governance Processes
Business Continuity
Disaster Recovery
Incident Response
Physical Access Controls
Logical Access Controls
Computer Networking
Network Threats and Attacks
Threat Identification and Prevention
Network Security Infrastructure
Cloud Computing
Encryption
Data Handling
Logging and Monitoring
Configuration Management
Best Practice Security Policies
Security Awareness Training
Yes, obtaining the ISC2 Certified in Cybersecurity CC certification can be valuable, especially for those starting a career in cybersecurity. It demonstrates a foundational understanding of cybersecurity principles and practices, which can:
- Enhance employability
- Provide a competitive edge in the job market
This cybersecurity training course is ideal for students, recent graduates, and IT professionals transitioning into cybersecurity.
There are no formal prerequisites for this cybersecurity certification. However, a basic understanding of IT concepts and security principles can be beneficial.
The ISC2 Certified in Cybersecurity online course itself provides a certificate of completion once you’ve completed all the course components and achieved the desired mastery level.