
ISC2 Certified in Cybersecurity
This course helps you get ready for the (ISC)²® CC℠ (Certified in Cybersecurity) exam by covering all 5 areas listed in the CC℠ Certification Exam Outline. This beginner-level certification shows employers you have the basic knowledge and skills needed for a starting position in cybersecurity. It demonstrates your willingness and ability to learn on the job.
-
-
Domain 1 - Course Overview
This is the first course in the certification path, establishing a foundation for future courses. This domain comprises 26% of the exam content.
This is the first course in the certification path, establishing a foundation for future courses. This domain comprises 26% of the exam content.
-
Information Security Concepts and Governance
Learn the key security ideas of information assurance: Confidentiality, Integrity, Availability, Authentication (like multi-factor authentication), Non-repudiation, and Privacy.
Learn the key security ideas of information assurance: Confidentiality, Integrity, Availability, Authentication (like multi-factor authentication), Non-repudiation, and Privacy.
-
Risk Management
Learn about the risk management process which involves prioritizing risks and deciding how much risk is acceptable. It also includes identifying, assessing, and addressing risks.
Learn about the risk management process which involves prioritizing risks and deciding how much risk is acceptable. It also includes identifying, assessing, and addressing risks.
-
Security Controls
Comprehensive risk management is vital for decision-making, involving risk prioritization, tolerance levels, systematic identification, assessment, and treatment strategies to mitigate threats.
Comprehensive risk management is vital for decision-making, involving risk prioritization, tolerance levels, systematic identification, assessment, and treatment strategies to mitigate threats.
-
(ISC)2 Code of Ethics
The ISC2 Code of Ethics is a set of guidelines for certified cybersecurity professionals,. These principles urge professionals to prioritize public safety, behave ethically, offer quality service, and help improve the cybersecurity field.
The ISC2 Code of Ethics is a set of guidelines for certified cybersecurity professionals,. These principles urge professionals to prioritize public safety, behave ethically, offer quality service, and help improve the cybersecurity field.
-
Domain 1 - Course Review
The Security Principles Domain for the Certified in Cybersecurity course emphasizes the importance of integrating security into business processes and aligning security strategies with business operations. Key concepts covered include the CIA triad, risk management, and various types of controls (proactive, reactive, administrative, technical, and physical).
The Security Principles Domain for the Certified in Cybersecurity course emphasizes the importance of integrating security into business processes and aligning security strategies with business operations. Key concepts covered include the CIA triad, risk management, and various types of controls (proactive, reactive, administrative, technical, and physical).
-
-
-
Domain 2 - Course Overview
The Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts domain highlights the need for effective planning and response to disruptions affecting business operations. Key concepts include thorough investigations, continuous monitoring, configuration management, media protection, incident management, and strategic BCP/DRP processes. These elements enhance organizational resilience in a rapidly evolving technological landscape.
The Business Continuity (BC), Disaster Recovery (DR), and Incident Response Concepts domain highlights the need for effective planning and response to disruptions affecting business operations. Key concepts include thorough investigations, continuous monitoring, configuration management, media protection, incident management, and strategic BCP/DRP processes. These elements enhance organizational resilience in a rapidly evolving technological landscape.
-
Incident Response
Incident response and business continuity involve preparing for and handling disruptions. Preparation, prevention, and learning from past incidents are key to building resilient systems.
Incident response and business continuity involve preparing for and handling disruptions. Preparation, prevention, and learning from past incidents are key to building resilient systems.
-
Business Continuity
Incident response, business continuity, and disaster recovery are interconnected processes. Incident response involves immediate action during disruptions, business continuity maintains operations during extended incidents, and disaster recovery, often IT-focused, involves resuming operations at an alternate site. Life safety is paramount.
Incident response, business continuity, and disaster recovery are interconnected processes. Incident response involves immediate action during disruptions, business continuity maintains operations during extended incidents, and disaster recovery, often IT-focused, involves resuming operations at an alternate site. Life safety is paramount.
-
-
-
Domain 3 - Course Overview
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
-
Access Controls Concepts
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
-
Physical Access Controls
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
Introduce your lesson with an optional, short summary. You can edit this excerpt in lesson settings.
-
-
-