Course Overview
To help close the workforce gap, ISC2 launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers, and IT (Information Technology) professionals. In addition, CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP (Certified Information Systems Security Professional), CompTIA Security+, and other future leadership roles.
U.S. DoDM 8140.03 APPROVED BY DEPARTMENT OF DEFENSE
Prerequisites
None.
Course Objectives
In this course, you will:
- Understand Cybersecurity Fundamentals.
- Identify Common Cyber Threats and Vulnerabilities.
- Comprehend Cybersecurity Principles and Frameworks.
- Implement Basic Security Controls.
- Explore Governance, Risk, and Compliance (GRC).
- Apply Security Operations Practices.
- Prepare for the ISC2 Certified in Cybersecurity Exam.
- Develop a Strong Cybersecurity Foundation for Future Growth.
Outline: Certified in Cybersecurity (CC)
Chapter 1: Define fundamental security concepts
- Module 1: Understand the Security Concepts of Information Assurance
- Module 2: Understand the Risk Management Processes
- Module 3: Understand Security Controls
- Module 4: Understand Governance Elements
- Module 5: Understand ISC2 Code of Ethics
Chapter 2: Describe Incident Response, Business Continuity and Disaster Recovery
- Module 1: Understand Incident Response
- Module 2: Understand Business Continuity
- Module 3: Understand Disaster Recovery
Chapter 3: Identify the components of several Access Controls Concepts
- Module 1: Understand Access Control Concepts
- Module 2: Understand Physical Access Controls
- Module 3: Understand Logical Access Controls
Chapter 4: Practice the terminology and review concepts of network security
- Module 1: Understand Computer Networking
- Module 2: Understand Network (Cyber) Threats and Attacks
- Module 3: Understand Network Security Infrastructure
Chapter 5: Practice the terminology and review concepts of network defense
- Module 1: Understand Data Security
- Module 2: Understand System Hardening
- Module 3: Understand Best Practice Security Policies
- Module 4: Understand Security Awareness Training
Chapter 6: Understand the layout of the exam and prepare to take the exam
- Module 1: Certification Requirements
- Module 2: Scheduling the Exam
- Module 3: Before the Exam
- Module 4: Day of Exam
- Module 5: Tips for Reading the Questions
- Module 6: After the Exam