About This Course
Skills You’ll Get
Interactive Lessons
26+ Interactive Lessons | 101+ Exercises | 46+ Quizzes | 100+ Flashcards |
Gamified TestPrep
1+ Full Length Tests | 100+ Practice Test Questions
1
Introduction
- CC Certification
- Taking the CC Exam
- Computer-Based Testing Environment
- Exam Retake Policy
- Recertification Requirements
2
Confidentiality, Integrity, Availability, and Non-repudiation:
- Understand the Security Concepts of Information Assurance
- The CIA Triad
- Non-Repudiation
3
Authentication and Authorization
- Understand the Security Concepts of Information Assurance
- Access Control Process
- Password Policies
- Authentication Factors
4
Privacy
- Understand the Security Concepts of Information Assurance
- Privacy
- Privacy Management Framework
5
Risk Management
- Understand the Risk Management Process
- Risk Types
- Risk Identification and Assessment
- Risk Treatment Strategies
- Risk Profile and Tolerance
6
Security Controls
- Understand Security Controls
- What are Security Controls?
- Categorizing Security Controls
7
Ethics
- Understand ISC2 Code of Ethics
- Corporate Ethics Codes
- ISC2 Code of Ethics
- Ethics Complaint Procedure
8
Security Governance Processes
- Understand Governance Processes
- Security Policies and Procedures
- Laws and Regulations
9
Business Continuity
- Understand Business Continuity (BC)
- Business Continuity Planning
- Business Continuity Controls
- High Availability and Fault Tolerance
10
Disaster Recovery
- Understand Disaster Recovery (DR)
- Disaster Recovery Planning
- Backups
- Disaster Recovery Sites
- Testing Disaster Recovery Plans
11
Incident Response
- Understand Incident Response
- Creating an Incident Response Program
- Building an Incident Response Team
- Incident Communications Plan
- Incident Identification and Response
12
Physical Access Controls
- Understand Physical Access Controls
- Physical Facilities
- Designing for Security
- Visitor Management
- Physical Security Personnel
13
Logical Access Controls
- Understand Logical Access Controls
- Authorization
- Account Types
- Non-Repudiation
14
Computer Networking
- Understand Computer Networking
- Network Types
- TCP/IP Networking
- IP Addressing
- Network Ports and Applications
- Securing Wi-Fi Networks
15
Network Threats and Attacks
- Understand Network Threats and Attacks
- Malware
- Eavesdropping Attacks
- Denial-of-Service Attacks
- Side-Channel Attacks
16
Threat Identification and Prevention
- Understand Network Threats and Attacks
- Antivirus Software
- Intrusion Detection and Prevention
- Firewalls
- Vulnerability Scanning
17
Network Security Infrastructure
- Understand Network Security Infrastructure
- Data Center Protection
- Network Security Zones
- Switches, WAPs, and Routers
- Network Segmentation
- Virtual Private Networks
- Network Access Control
- Internet of Things
18
Cloud Computing
- Understand Network Security Infrastructure
- Cloud Computing
- Cloud Deployment Models
- Cloud Service Categories
- Security and the Shared Responsibility Model
- Automation and Orchestration
- Vendor Relationships
19
Encryption
- Understand Data Security
- Cryptography
- Encryption Algorithms
- Uses of Encryption
- Hash Functions
20
Data Handling
- Understand Data Security
- Data Life Cycle
- Data Classification
21
Logging and Monitoring
- Understand Data Security
- Logging
- Log Monitoring
22
Configuration Management
- Understand System Hardening
- Configuration Management
- Configuration Vulnerabilities
23
Best Practice Security Policies
- Understand Best Practice Security Policies
- Acceptable Use Policy
- Data Handling Policy
- Password Policy
- Bring Your Own Device Policy
- Privacy Policy
- Change Management Policy
24
Security Awareness Training
- Understand Security Awareness Training
- Social Engineering
- Security Education
25
Practice Test
26
Flashcard
1
Confidentiality, Integrity, Availability, and Non-repudiation:
2
Authentication and Authorization
3
Privacy
4
Risk Management
5
Security Controls
6
Ethics
7
Security Governance Processes
8
Business Continuity
9
Disaster Recovery
10
Incident Response
11
Physical Access Controls
12
Logical Access Controls
13
Computer Networking
14
Network Threats and Attacks
15
Threat Identification and Prevention
16
Network Security Infrastructure
17
Cloud Computing
18
Encryption
19
Data Handling
20
Logging and Monitoring
21
Configuration Management
22
Best Practice Security Policies
23