ISC² – Certified In Cybersecurity

Course Level: Beginner
Duration: 5 Hrs 36 Min
Total Videos: 87 On-demand Videos

Gain an in-depth understanding of cybersecurity principles and practices with the ISC² Certified in Cybersecurity course. Perfect for aspiring cybersecurity professionals or IT experts looking to expand their knowledge, this course provides comprehensive, real-world training in risk management, network security, incident response and more, preparing you for the ISC² CC certification exam and a rewarding career in cybersecurity.

Learning Objectives

01

Understand fundamental security concepts, risk management processes, and the ISC2 Code of Ethics.

02

Distinguish between different types of security controls: technical, administrative, and physical.

03

Grasp Business Continuity and Disaster Recovery concepts, and learn how to construct response plans.

04

Identify key components of a Business Continuity Plan and understand the importance of RTO-RPO.

05

Understand and apply physical and logical access control concepts, including Defense in Depth.

06

Comprehend computer networking and network security design, with an emphasis on identifying threats.

07

Explore Data Security fundamentals, including encryption, data handling best practices, and compliance.

08

Learn about System Hardening, Configuration Management, and the implementation of effective security policies.

Course Description

Embark on an enlightening journey into the world of cybersecurity with our comprehensive ISC(2) Certified in Cybersecurity (CC) course. This course is meticulously designed to equip you with the knowledge and skills you need to excel in the cybersecurity field and pass the ISC(2) CC certification exam with flying colors. Dive headfirst into key areas of cybersecurity, including risk management, incident response, access control, network security, and security operations, all presented through practical real-world examples and demonstrations. Our in-depth training leverages the power of AWS, providing you with a hands-on understanding of how to implement cybersecurity measures in various environments.

This course is perfect for both beginners venturing into the world of cybersecurity and seasoned IT professionals looking to bolster their skills and knowledge. As you learn to master security controls, understand the risk management process, implement password security, and explore multifactor authentication (MFA), you’ll be building a solid foundation for a rewarding career in cybersecurity. Network security design, protocols, and cloud architecture are just some of the advanced topics you’ll delve into, preparing you to face and overcome the challenges of today’s dynamic cybersecurity landscape. By the end of this course, you’ll not only be ready to pass the ISC(2) CC certification exam, but you’ll also possess a practical, applicable understanding of cybersecurity principles and practices.

Enroll in our ISC(2) Certified in Cybersecurity (CC) course today and open doors to a wide range of career opportunities in the rapidly growing field of cybersecurity. With the knowledge and skills you acquire, job roles such as Cybersecurity Analyst, Information Security Specialist, Network Security Administrator, Incident Response Coordinator, and Risk Management Analyst will all be within your reach. Equip yourself with the power of knowledge and skill and step into the future of cybersecurity with confidence.

Who Benefits From This Course

  • IT professionals interested in enhancing their knowledge in cybersecurity
  • Individuals aspiring to become certified cybersecurity specialists
  • System administrators seeking to understand and implement advanced security measures
  • Network engineers focused on secure network design and threat prevention
  • Business continuity and disaster recovery professionals
  • Data management professionals interested in data security best practices
  • Enterprise architects working with cloud infrastructure and services
  • Security consultants interested in understanding the ISC2 Code of Ethics
  • Individuals responsible for enforcing security policies within their organizations
  • Professionals involved in security awareness training

Frequently Asked Questions

What is the ISC² CC certification and what is its relevance in the field of cybersecurity?
The ISC² Certified in Cybersecurity (CC) certification is a globally recognized credential that validates an individual's ability and knowledge in the field of cybersecurity. The certification demonstrates that the individual is capable of managing and mitigating cyber threats using the latest cybersecurity techniques and strategies. It covers key areas like risk management, incident response, access control, network security, and security operations. This certification is highly respected in the industry, and professionals with this credential are often considered more desirable by employers.
What job roles can I pursue after earning the ISC² CC certification?
After earning the ISC² CC certification, you can pursue a variety of job roles in the rapidly growing field of cybersecurity. Potential job roles include Cybersecurity Analyst, Information Security Specialist, Network Security Administrator, Incident Response Coordinator, Security Operations Center (SOC) Analyst, Risk Management Analyst, and more. The certification not only validates your cybersecurity knowledge and skills but also enhances your credibility in the industry.
What skills will I acquire from the ISC² CC certification course?
The ISC² CC certification course equips learners with a comprehensive understanding of cybersecurity principles and practices. You will learn about the risk management process, how to assess and treat risks, and master security controls, including technical, administrative, and physical controls. The course also covers implementing password security and multifactor authentication (MFA), incident response, business continuity, and disaster recovery strategies. You'll gain a solid understanding of data security fundamentals, encryption techniques, and compliance measures too.
What is the importance of risk management in cybersecurity?
Risk management is a critical aspect of cybersecurity. It involves identifying, evaluating, and prioritizing potential risks that could impact an organization's information and systems. Effective risk management helps organizations anticipate and mitigate cyber threats, thus reducing the likelihood of data breaches and system disruptions. The ISC² CC certification course covers the risk management process in-depth, equipping learners with the skills to assess and treat risks effectively.
How does the ISC² CC certification course prepare me for real-world cybersecurity challenges?
The ISC² CC certification course is designed to equip learners with practical skills that are highly applicable in the real world. The training uses real-world examples and demonstrations, specifically leveraging AWS, to provide a practical understanding of how to apply cybersecurity measures in various environments. By the end of the course, learners will be able to develop security policies, harden systems, understand data security fundamentals, encryption, and compliance measures, and apply these skills in real-world scenarios.

Included In This Course

Module 1 - Introduction and Security Concepts

  •    Certification Overview
  •    Exam Objectives
  •    Instructor Introduction
  •    ISC CiC Course Intro
  •    1.0 Module 1 Overview
  •    1.1.5 Password Security
  •    1.1.6 Whiteboard - Multifactor Authentication (MFA)
  •    1.2 Understand the risk management process
  •    1.2.1 Risk Management
  •    1.2.2 Risk Identification assessment and treatment
  •    1.3 Understand security controls
  •    1.3.1 Technical Controls
  •    1.3.2 Administrative Controls
  •    1.3.3 Physical Controls
  •    1.3.4 Whiteboard Discussion - Controls-
  •    1.3.5 Demonstration - AWS Access Controls
  •    1.4 - Understand ISC2 Code of Ethics
  •    1.4.1 Professional Code of Ethics
  •    1.5 Understand Governance processes
  •    1.5.1 Standards, Regulations, etc
  •    1.5.2 Security Policies
  •    1.5.3 Module Summary Review
  •    1.5.4 Module Review Questions

Module 2 - Incident Response, Business Continuity and Disaster Recovery Concepts

  •    2.0 Module 2 Overview
  •    2.1 Understand Business Continuity
  •    2.1.1 Business Continuity
  •    2.1.2 Components of a Business Continuity Plan
  •    2.2.1 Disaster Recovery
  •    2.2.2 RTO-RPO
  •    2.3 Understand Business Response
  •    2.3.1 Incident Response
  •    2.3.2 Post Incident Review
  •    2.3.3 Module Summary Review
  •    2.3.4 Module Review Questions

Module 3 - Access Control Concepts

  •    3.0 Module 3 Overview
  •    3.1 Understand physical access controls
  •    3.1.1 Defense In Depth
  •    3.1.2 Compare Physical Control Types
  •    3.1.3 Monitoring Controls
  •    3.2 Describe logical access controls
  •    3.2.1 Logical Access controls
  •    3.2.2 Principle of least privilege
  •    3.2.3 Segregation of duties
  •    3.2.4 Whiteboard - Access Control
  •    3.2.5 Demonstration - Cloud IAM Sequence 32
  •    3.2.6 Module Summary Review
  •    3.2.7 Module Review Questions

Module 4- Network Security

  •    4.0 Module 4 Overview
  •    4.1 Understanding computer networking
  •    4.1.1 Network Security Design
  •    4.1.2 Whiteboard - Networking Concepts
  •    4.1.3 Networking protocols and ports
  •    4.1.4 Demonstration - AWS VPC
  •    4.2 Understand Network Threats
  •    4.2.1 Types of network (cyber) threats and attacks
  •    4.2.2 Threat Actors
  •    4.2.3 Tools used to identify and prevent threats
  •    4.2.4 Whiteboard Discussion - DDoS attacks
  •    4.3 Network Security Infrastructure
  •    4.3.1 On Premises Architecture
  •    4.3.2 Data Center Design Discussion
  •    4.3.3 Cloud Architecture Service and Deployment Models
  •    4.3.4 Managed Service Providers
  •    4.3.5 Service Level Agreements (SLA)
  •    4.3.6 Shared Security Model
  •    4.3.7 Zero Trust
  •    4.3.8 Module Summary Review
  •    4.3.9 Module Review Questions

Module 5 - Security Operations

  •    5.0 Module 5 Overview
  •    5.1 Understand Data Security
  •    5.1.1 Data Security Fundamentals
  •    5.1.2 Data Handling Best Practices
  •    5.1.3 Encryption
  •    5.1.4 Data Security Compliance
  •    5.2 Understand System Hardening
  •    5.2.1 System Hardening
  •    5.2.2 Configuration Management
  •    5.3 Understanding Best Practice Security Policies
  •    5.3.1 Common Security Policies
  •    5.3.2 Demonstration - AUP
  •    5.3.3 Demonstration - Privacy Policy
  •    5.4 Security Awareness Training
  •    5.4.1 Importance of Security Awareness Training
  •    5.4.2 Social Engineering
  •    5.4.3 Module Summary Review
  •    5.4.4 Module Review Questions
  •    5.4.5 Next Steps and Course Closeout