We use cookies to ensure you get the best experience on our website. Please review our cookie policy for details.

Certified in Cybersecurity

Tech skills for tomorrow, start today. Our CC Certified in Cybersecurity course has got you covered!

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Prepare for the ISC2 Certified in Cybersecurity certification and launch your career with an interactive and engaging training program. 

Through clear, bite-sized lessons and practice tests, you’ll explore risk management strategies, learn to implement security controls and understand the ethical responsibilities of cybersecurity professionals. 

The online cybersecurity course covers business continuity, disaster recovery, and incident response to ensure you’re prepared for any security event. 

So, gear up because a lot of things in the cybersecurity landscape await you! 

Skills You’ll Get

  • Understand the CIA Triad and its role in cybersecurity.
  • Implement authentication and authorization processes to control access to systems.
  • Develop and enforce privacy management frameworks to protect sensitive data.
  • Identify, assess, and mitigate risks using risk management strategies.
  • Apply security controls to safeguard systems and networks.
  • Navigate ethical guidelines and corporate ethics codes in cybersecurity.
  • Design business continuity and disaster recovery plans to ensure operational resilience.
  • Respond to and manage security incidents effectively.
  • Secure physical and logical access to facilities and systems.
  • Protect networks from threats like malware, eavesdropping, and DoS attacks.
  • Implement encryption and data handling best practices to secure information.
  • Monitor and log activities to detect and respond to security breaches
  • Develop and enforce security policies to maintain a secure environment.
  • Conduct security awareness training to combat social engineering and other attacks

1

Introduction

  • CC Certification
  • Taking the CC Exam
  • Computer-Based Testing Environment
  • Exam Retake Policy
  • Recertification Requirements
2

Confidentiality, Integrity, Availability, and Non-repudiation

  • Understand the Security Concepts of Information Assurance
  • The CIA Triad
  • Non-Repudiation
3

Authentication and Authorization

  • Understand the Security Concepts of Information Assurance
  • Access Control Process
  • Password Policies
  • Authentication Factors
4

Privacy

  • Understand the Security Concepts of Information Assurance
  • Privacy
  • Privacy Management Framework
5

Risk Management

  • Understand the Risk Management Process
  • Risk Types
  • Risk Identification and Assessment
  • Risk Treatment Strategies
  • Risk Profile and Tolerance
6

Security Controls

  • Understand Security Controls
  • What are Security Controls?
  • Categorizing Security Controls
7

Ethics

  • Understand ISC2 Code of Ethics
  • Corporate Ethics Codes
  • ISC2 Code of Ethics
  • Ethics Complaint Procedure
8

Security Governance Processes

  • Understand Governance Processes
  • Security Policies and Procedures
  • Laws and Regulations
9

Business Continuity

  • Understand Business Continuity (BC)
  • Business Continuity Planning
  • Business Continuity Controls
  • High Availability and Fault Tolerance
10

Disaster Recovery

  • Understand Disaster Recovery (DR)
  • Disaster Recovery Planning
  • Backups
  • Disaster Recovery Sites
  • Testing Disaster Recovery Plans
11

Incident Response

  • Understand Incident Response
  • Creating an Incident Response Program
  • Building an Incident Response Team
  • Incident Communications Plan
  • Incident Identification and Response
12

Physical Access Controls

  • Understand Physical Access Controls
  • Physical Facilities
  • Designing for Security
  • Visitor Management
  • Physical Security Personnel
13

 Logical Access Controls

  • Understand Logical Access Controls
  • Authorization
  • Account Types
  • Non-Repudiation
14

Computer Networking

  • Understand Computer Networking
  • Network Types
  • TCP/IP Networking
  • IP Addressing
  • Network Ports and Applications
  • Securing Wi-Fi Networks
15

Network Threats and Attacks

  • Understand Network Threats and Attacks
  • Malware
  • Eavesdropping Attacks
  • Denial-of-Service Attacks
  • Side-Channel Attacks
16

Threat Identification and Prevention

  • Understand Network Threats and Attacks
  • Antivirus Software
  • Intrusion Detection and Prevention
  • Firewalls
  • Vulnerability Scanning
17

Network Security Infrastructure

  • Understand Network Security Infrastructure
  • Data Center Protection
  • Network Security Zones
  • Switches, WAPs, and Routers
  • Network Segmentation
  • Virtual Private Networks
  • Network Access Control
  • Internet of Things
18

Cloud Computing

  • Understand Network Security Infrastructure
  • Cloud Computing
  • Cloud Deployment Models
  • Cloud Service Categories
  • Security and the Shared Responsibility Model
  • Automation and Orchestration
  • Vendor Relationships
19

Encryption

  • Understand Data Security
  • Cryptography
  • Encryption Algorithms
  • Uses of Encryption
  • Hash Functions
20

Data Handling

  • Understand Data Security
  • Data Life Cycle
  • Data Classification
21

Logging and Monitoring

  • Understand Data Security
  • Logging
  • Log Monitoring
22

Configuration Management

  • Understand System Hardening
  • Configuration Management
  • Configuration Vulnerabilities
23

Best Practice Security Policies

  • Understand Best Practice Security Policies
  • Acceptable Use Policy
  • Data Handling Policy
  • Password Policy
  • Bring Your Own Device Policy
  • Privacy Policy
  • Change Management Policy
24

Security Awareness Training

  • Understand Security Awareness Training
  • Social Engineering
  • Security Education
25

Practice Test

26

Flashcard

1

Confidentiality, Integrity, Availability, and Non-repudiation

2

Authentication and Authorization

3

Privacy

4

Risk Management

5

Security Controls

6

Ethics

7

Security Governance Processes

8

Business Continuity

9

Disaster Recovery

10

Incident Response

11

Physical Access Controls

12

 Logical Access Controls

13

Computer Networking

14

Network Threats and Attacks

15

Threat Identification and Prevention

16

Network Security Infrastructure

17

Cloud Computing

18

Encryption

19

Data Handling

20

Logging and Monitoring

21

Configuration Management

22

Best Practice Security Policies

23

Security Awareness Training

Any questions?
Check out the FAQs

Want to Learn More?

Contact Us Now

Yes, obtaining the ISC2 Certified in Cybersecurity CC certification can be valuable, especially for those starting a career in cybersecurity. It demonstrates a foundational understanding of cybersecurity principles and practices, which can: 

  • Enhance employability 
  • Provide a competitive edge in the job market 

This cybersecurity training course is ideal for students, recent graduates, and IT professionals transitioning into cybersecurity. 

There are no formal prerequisites for this cybersecurity certification. However, a basic understanding of IT concepts and security principles can be beneficial. 

The ISC2 Certified in Cybersecurity online course itself provides a certificate of completion once you’ve completed all the course components and achieved the desired mastery level. 

scroll to top