We use cookies to ensure you get the best experience on our website. Please review our cookie policy for details.

Certified in Cybersecurity

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

  • CC Certification
  • Taking the CC Exam
  • Computer-Based Testing Environment
  • Exam Retake Policy
  • Recertification Requirements
2

Confidentiality, Integrity, Availability, and Non-repudiation:

  • Understand the Security Concepts of Information Assurance
  • The CIA Triad
  • Non-Repudiation
3

Authentication and Authorization

  • Understand the Security Concepts of Information Assurance
  • Access Control Process
  • Password Policies
  • Authentication Factors
4

Privacy

  • Understand the Security Concepts of Information Assurance
  • Privacy
  • Privacy Management Framework
5

Risk Management

  • Understand the Risk Management Process
  • Risk Types
  • Risk Identification and Assessment
  • Risk Treatment Strategies
  • Risk Profile and Tolerance
6

Security Controls

  • Understand Security Controls
  • What are Security Controls?
  • Categorizing Security Controls
7

Ethics

  • Understand ISC2 Code of Ethics
  • Corporate Ethics Codes
  • ISC2 Code of Ethics
  • Ethics Complaint Procedure
8

Security Governance Processes

  • Understand Governance Processes
  • Security Policies and Procedures
  • Laws and Regulations
9

Business Continuity

  • Understand Business Continuity (BC)
  • Business Continuity Planning
  • Business Continuity Controls
  • High Availability and Fault Tolerance
10

Disaster Recovery

  • Understand Disaster Recovery (DR)
  • Disaster Recovery Planning
  • Backups
  • Disaster Recovery Sites
  • Testing Disaster Recovery Plans
11

Incident Response

  • Understand Incident Response
  • Creating an Incident Response Program
  • Building an Incident Response Team
  • Incident Communications Plan
  • Incident Identification and Response
12

Physical Access Controls

  • Understand Physical Access Controls
  • Physical Facilities
  • Designing for Security
  • Visitor Management
  • Physical Security Personnel
13

 Logical Access Controls

  • Understand Logical Access Controls
  • Authorization
  • Account Types
  • Non-Repudiation
14

Computer Networking

  • Understand Computer Networking
  • Network Types
  • TCP/IP Networking
  • IP Addressing
  • Network Ports and Applications
  • Securing Wi-Fi Networks
15

Network Threats and Attacks

  • Understand Network Threats and Attacks
  • Malware
  • Eavesdropping Attacks
  • Denial-of-Service Attacks
  • Side-Channel Attacks
16

Threat Identification and Prevention

  • Understand Network Threats and Attacks
  • Antivirus Software
  • Intrusion Detection and Prevention
  • Firewalls
  • Vulnerability Scanning
17

Network Security Infrastructure

  • Understand Network Security Infrastructure
  • Data Center Protection
  • Network Security Zones
  • Switches, WAPs, and Routers
  • Network Segmentation
  • Virtual Private Networks
  • Network Access Control
  • Internet of Things
18

Cloud Computing

  • Understand Network Security Infrastructure
  • Cloud Computing
  • Cloud Deployment Models
  • Cloud Service Categories
  • Security and the Shared Responsibility Model
  • Automation and Orchestration
  • Vendor Relationships
19

Encryption

  • Understand Data Security
  • Cryptography
  • Encryption Algorithms
  • Uses of Encryption
  • Hash Functions
20

Data Handling

  • Understand Data Security
  • Data Life Cycle
  • Data Classification
21

Logging and Monitoring

  • Understand Data Security
  • Logging
  • Log Monitoring
22

Configuration Management

  • Understand System Hardening
  • Configuration Management
  • Configuration Vulnerabilities
23

Best Practice Security Policies

  • Understand Best Practice Security Policies
  • Acceptable Use Policy
  • Data Handling Policy
  • Password Policy
  • Bring Your Own Device Policy
  • Privacy Policy
  • Change Management Policy
24

Security Awareness Training

  • Understand Security Awareness Training
  • Social Engineering
  • Security Education
25

Practice Test

26

Flashcard

1

Confidentiality, Integrity, Availability, and Non-repudiation:

2

Authentication and Authorization

3

Privacy

4

Risk Management

5

Security Controls

6

Ethics

7

Security Governance Processes

8

Business Continuity

9

Disaster Recovery

10

Incident Response

11

Physical Access Controls

12

 Logical Access Controls

13

Computer Networking

14

Network Threats and Attacks

15

Threat Identification and Prevention

16

Network Security Infrastructure

17

Cloud Computing

18

Encryption

19

Data Handling

20

Logging and Monitoring

21

Configuration Management

22

Best Practice Security Policies

23

Security Awareness Training

scroll to top