Leader in the cybersecurity training sector.

ISC 2 Certified in Cybersecurity (CC)

Catégorie
Satisfaction rate
4.7
Success rate
4.7

Description

As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.


That's where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what's next.

Target group

CC training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites.

Program

Chapter 1: Security Principles
  • Module 1: Understanding the Security Concepts of Information Assurance
  • Module 2: Understanding the Risk Management Processes
  • Module 3: Understanding Security Controls
  • Module 4: Understanding Governance Elements
  • Module 5: Understanding ISC2 Code of Ethics
  • Module 1: Understanding Incident Response
  • Module 2: Understanding Business Continuity
  • Module 3: Understand Disaster Recovery
  • Module 1: Understanding Access Control Concepts
  • Module 2: Understanding Physical Access Controls
  • Module 3: Understand Logical Access controls
  • Module 1: Understanding Computer Networking
  • Module 2: Understand Network (Cyber) Threats and AttacksModule 3: Understand
  • Network Security Infrastructure
  • Module 1: Understanding Data Security
  • Module 2: Understand System Hardening
  • Module 3: Understanding Best Practice Security Policies
  • Module 4: Understand Security Awareness Training
  • Module 1: Certification Requirements
  • Module 2: Scheduling the Exam
  • Module 3: Before the Exam
  • Module 4: Day of Exam
  • Module 5: Tips for Reading the Questions
  • Module 6: After the Exam

Please note: Course materials are organized by chapter, not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline. The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.

Goal

After completing this course, learners will be able to:

  • Discuss the foundational concepts of cybersecurity principles.
  • Recognize foundational security concepts of information assurance.
  • Define risk management terminology and summarise the process.
  • Relate risk management to personal or professional practices.
  • Classify types of security controls.
  • Distinguish between policies, procedures, standards, regulations and laws.
  • Demonstrate the relationship among governance elements.
  • Analyse appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples.
  • Practice the terminology of and review security policies.
  • Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
  • Recall the terms and components of incident response.
  • Summarize the components of a business continuity plan.
  • Identify the components of disaster recovery.
  • Practice the terminology and review concepts of business continuity, disaster recovery and incident response.
  • Select access controls that are appropriate in a given scenario.
  • Relate access control concepts and processes to given scenarios.
  • various physical access controls.
  • Describe logical access controls.Practice the terminology and review concepts of access controls.
  • Explain the concepts of network security.
  • Recognize common networking terms and models.
  • Identify common protocols and port and their secure counterparts.
  • Identify types of network (cyber) threats and attacks.
  • Discuss common tools used to identify and prevent threats.
  • Identify common data centre terminology.
  • Recognize common cloud service terminology.
  • Identify secure network design terminology.
  • Practice the terminology and review concepts of network security.
  • Explain concepts of security operations.
  • Discuss data handling best practices.
  • Identify key concepts of logging and monitoring.
  • Summarize the different types of encryption and their common uses.
  • Describe the concepts of configuration management.
  • Explain the application of common security policies.
  • Discuss the importance of security awareness training.
  • Practice the terminology and review concepts of network operations.

Recommended

None. No prior work experience or formal degree required. You only need to become an ISC2 Candidate.

Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
1 personne
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "1 personne" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.