{"id":18075,"date":"2025-08-22T11:51:55","date_gmt":"2025-08-22T09:51:55","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=18075"},"modified":"2025-11-19T11:56:39","modified_gmt":"2025-11-19T10:56:39","slug":"isc2-certified-in-cybersecurity-cc","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-in-cybersecurity-cc\/","title":{"rendered":"ISC2 Certified in Cybersecurity (CC)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"18075\" class=\"elementor elementor-18075\" wpc-filter-elementor-widget=\"1\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b99ee8c e-flex e-con-boxed e-con e-child\" data-id=\"b99ee8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d279bf9 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"d279bf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-931587f e-con-full e-flex e-con e-child\" data-id=\"931587f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1860b4b elementor-widget elementor-widget-image\" data-id=\"1860b4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"295\" height=\"300\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-295x300.png\" class=\"attachment-medium size-medium wp-image-17024\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-295x300.png 295w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-1007x1024.png 1007w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-768x781.png 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1-12x12.png 12w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/03\/ISC2_OTP-1180x1200-1.png 1180w\" sizes=\"(max-width: 295px) 100vw, 295px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6f5d69 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"c6f5d69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ff66f2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4ff66f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1920\" height=\"760\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline.jpg\" class=\"attachment-2048x2048 size-2048x2048 wp-image-18038\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline.jpg 1920w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline-300x119.jpg 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline-1024x405.jpg 1024w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline-768x304.jpg 768w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline-1536x608.jpg 1536w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__horiz_inline-18x7.jpg 18w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c01782 elementor-widget elementor-widget-spacer\" data-id=\"9c01782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22ef86e e-flex e-con-boxed e-con e-parent\" data-id=\"22ef86e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4aab0ce elementor-widget elementor-widget-heading\" data-id=\"4aab0ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dff747 e-flex e-con-boxed e-con e-parent\" data-id=\"9dff747\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bb5be08 e-con-full e-flex e-con e-child\" data-id=\"bb5be08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e365bc elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3e365bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand.<\/p><p><br \/>That's where the <b>ISC2 Certified in Cybersecurity (CC)<\/b> certification comes in. From the global leader in information security credentials, this new certification creates a clear pathway to an exciting and rewarding career in cybersecurity. It breaks down traditional barriers to entry, enabling you to build confidence and enter your first cybersecurity role ready for what's next.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-707ab1e e-flex e-con-boxed e-con e-parent\" data-id=\"707ab1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8fb9d0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b8fb9d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02e73f7 elementor-widget elementor-widget-text-editor\" data-id=\"02e73f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"course-section course-section--hidden\" data-section=\"3\"><div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><div class=\"su-list\"><p>CC training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be4cb66 elementor-widget elementor-widget-spacer\" data-id=\"be4cb66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d8d86e5 e-flex e-con-boxed e-con e-parent\" data-id=\"d8d86e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-262e53e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"262e53e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Program<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4b75d9 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b4b75d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration : 2 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed58d23 elementor-widget elementor-widget-n-accordion\" data-id=\"ed58d23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Module 1: Fundamentals of System and Network Security\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2480\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2480\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 1: Security Principles <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2480\" class=\"elementor-element elementor-element-fa6ae60 e-con-full e-flex e-con e-child\" data-id=\"fa6ae60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2480\" class=\"elementor-element elementor-element-470234a e-flex e-con-boxed e-con e-child\" data-id=\"470234a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a54496 elementor-widget elementor-widget-text-editor\" data-id=\"0a54496\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Understanding the Security Concepts of Information Assurance<\/li><li>Module 2: Understanding the Risk Management Processes<\/li><li>Module 3: Understanding Security Controls<\/li><li>Module 4: Understanding Governance Elements<\/li><li>Module 5: Understanding ISC2 Code of Ethics<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2481\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2481\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 2: Incident Response, Business Continuity and Disaster Recovery <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2481\" class=\"elementor-element elementor-element-b57845f e-con-full e-flex e-con e-child\" data-id=\"b57845f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27e1c93 elementor-widget elementor-widget-text-editor\" data-id=\"27e1c93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Understanding Incident Response<\/li><li>Module 2: Understanding Business Continuity<\/li><li>Module 3: Understand Disaster Recovery<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2482\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2482\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 3: Access Controls Concepts <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2482\" class=\"elementor-element elementor-element-19c3991 e-con-full e-flex e-con e-child\" data-id=\"19c3991\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b3b368 elementor-widget elementor-widget-text-editor\" data-id=\"7b3b368\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Understanding Access Control Concepts<\/li><li>Module 2: Understanding Physical Access Controls<\/li><li>Module 3: Understand Logical Access controls<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2483\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2483\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 4 : Network Security <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2483\" class=\"elementor-element elementor-element-21b6e28 e-flex e-con-boxed e-con e-child\" data-id=\"21b6e28\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7571705 elementor-widget elementor-widget-text-editor\" data-id=\"7571705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Understanding Computer Networking<\/li><li>Module 2: Understand Network (Cyber) Threats and AttacksModule 3: Understand<\/li><li>Network Security Infrastructure<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2484\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2484\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 5 : Security Operations <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2484\" class=\"elementor-element elementor-element-4cd8ca3 e-flex e-con-boxed e-con e-child\" data-id=\"4cd8ca3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fe7ae6 elementor-widget elementor-widget-text-editor\" data-id=\"0fe7ae6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Understanding Data Security<\/li><li>Module 2: Understand System Hardening<\/li><li>Module 3: Understanding Best Practice Security Policies<\/li><li>Module 4: Understand Security Awareness Training<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2485\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2485\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Chapter 6 : Course Summary and Test Preparation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2485\" class=\"elementor-element elementor-element-73077a6 e-flex e-con-boxed e-con e-child\" data-id=\"73077a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53c02a5 elementor-widget elementor-widget-text-editor\" data-id=\"53c02a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module 1: Certification Requirements<\/li><li>Module 2: Scheduling the Exam<\/li><li>Module 3: Before the Exam<\/li><li>Module 4: Day of Exam<\/li><li>Module 5: Tips for Reading the Questions<\/li><li>Module 6: After the Exam<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a06966 elementor-widget elementor-widget-text-editor\" data-id=\"2a06966\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Please note:<\/strong> Course materials are organized by chapter, not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline. The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b2320c e-con-full e-flex e-con e-child\" data-id=\"9b2320c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3900a77 e-flex e-con-boxed e-con e-child\" data-id=\"3900a77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc07ceb elementor-widget elementor-widget-heading\" data-id=\"fc07ceb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b84162f elementor-widget elementor-widget-text-editor\" data-id=\"b84162f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After completing this course, learners will be able to:<\/p>\n<ul>\n<li>Discuss the foundational concepts of cybersecurity principles.<\/li>\n<li>Recognize foundational security concepts of information assurance.<\/li>\n<li>Define risk management terminology and summarise the process.<\/li>\n<li>Relate risk management to personal or professional practices.<\/li>\n<li>Classify types of security controls.<\/li>\n<li>Distinguish between policies, procedures, standards, regulations and laws.<\/li>\n<li>Demonstrate the relationship among governance elements.<\/li>\n<li>Analyse appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples.<\/li>\n<li>Practice the terminology of and review security policies.<\/li>\n<li>Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.<\/li>\n<li>Recall the terms and components of incident response.<\/li>\n<li>Summarize the components of a business continuity plan.<\/li>\n<li>Identify the components of disaster recovery.<\/li>\n<li>Practice the terminology and review concepts of business continuity, disaster recovery and incident response.<\/li>\n<li>Select access controls that are appropriate in a given scenario.<\/li>\n<li>Relate access control concepts and processes to given scenarios.<\/li>\n<li>Compare various physical access controls.<\/li>\n<li>Describe logical access controls.<\/li><li>Practice the terminology and review concepts of access controls.<\/li>\n<li>Explain the concepts of network security.<\/li>\n<li>Recognize common networking terms and models.<\/li>\n<li>Identify common protocols and port and their secure counterparts.<\/li>\n<li>Identify types of network (cyber) threats and attacks.<\/li>\n<li>Discuss common tools used to identify and prevent threats.<\/li>\n<li>Identify common data centre terminology.<\/li>\n<li>Recognize common cloud service terminology.<\/li>\n<li>Identify secure network design terminology.<\/li>\n<li>Practice the terminology and review concepts of network security.<\/li>\n<li>Explain concepts of security operations.<\/li>\n<li>Discuss data handling best practices.<\/li>\n<li>Identify key concepts of logging and monitoring.<\/li>\n<li>Summarize the different types of encryption and their common uses.<\/li>\n<li>Describe the concepts of configuration management.<\/li>\n<li>Explain the application of common security policies.<\/li>\n<li>Discuss the importance of security awareness training.<\/li>\n<li>Practice the terminology and review concepts of network operations.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f314416 e-flex e-con-boxed e-con e-child\" data-id=\"f314416\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46c9681 elementor-widget elementor-widget-heading\" data-id=\"46c9681\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dcedd1 elementor-widget elementor-widget-text-editor\" data-id=\"3dcedd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>None. No prior work experience or formal degree required. You only need to become an ISC2 Candidate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-326dcd2 e-con-full e-flex e-con e-child\" data-id=\"326dcd2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc6e5c elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"1bc6e5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2478d96 e-con-full e-flex e-con e-child\" data-id=\"2478d96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-860d23f e-con-full e-flex e-con e-child\" data-id=\"860d23f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81467c4 elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"81467c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/MAR-CC-Ultimate-Guide.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"> View the ISC2 Ultimate Guide<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baeb1d7 e-con-full e-flex e-con e-child\" data-id=\"baeb1d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ee1f8a elementor-button-info elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"6ee1f8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/SALES-CC_Course_Outline-3-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the ISC2 Course Outlines<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Description As cyberthreats continue to escalate worldwide, the need for security experts is at an all-time high. Yet talent is scarce. Research shows the cybersecurity workforce needs an influx of 3.4 million professionals to meet global demand. That\u2019s where the ISC2 Certified in Cybersecurity (CC) certification comes in. From the global leader in information security [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":18078,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[154],"examen":[146],"langue":[144],"niveau":[85],"formateur":[234],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-18075","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","duree-2-jours","examen-oui","langue-francais","niveau-avance","formateur-isc2","mec_category-cybersecurite"],"acf":{"taux_davis_etoile":4.7,"taux_de_reussite":4.7,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":2},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-in-cybersecurity-cc\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-in-cybersecurity-cc\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T10:56:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__mark.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1083\" \/>\n\t<meta property=\"og:image:height\" content=\"1083\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/\",\"name\":\"ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/ISC2_CC_RGB__mark.jpg\",\"datePublished\":\"2025-08-22T09:51:55+00:00\",\"dateModified\":\"2025-11-19T10:56:39+00:00\",\"description\":\"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/ISC2_CC_RGB__mark.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/ISC2_CC_RGB__mark.jpg\",\"width\":1083,\"height\":1083,\"caption\":\"Renforcez vos comp\u00e9tences en cybers\u00e9curit\u00e9 avec la formation certifiante ISC2 CC propos\u00e9e par ACG CyberAcademy.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/isc2-certified-in-cybersecurity-cc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ISC2 Certified in Cybersecurity (CC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy","description":"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-in-cybersecurity-cc\/","og_locale":"en_GB","og_type":"article","og_title":"ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy","og_description":"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/isc2-certified-in-cybersecurity-cc\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-19T10:56:39+00:00","og_image":[{"width":1083,"height":1083,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__mark.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/","url":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/","name":"ISC2 Certified in Cybersecurity (CC) - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__mark.jpg","datePublished":"2025-08-22T09:51:55+00:00","dateModified":"2025-11-19T10:56:39+00:00","description":"ISC2 Certified in Cybersecurity \u2013 Launch your cybersecurity career, gain essential skills, and prepare to tackle global cyber threats with confidence and expertise","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__mark.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/08\/ISC2_CC_RGB__mark.jpg","width":1083,"height":1083,"caption":"Renforcez vos comp\u00e9tences en cybers\u00e9curit\u00e9 avec la formation certifiante ISC2 CC propos\u00e9e par ACG CyberAcademy."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/isc2-certified-in-cybersecurity-cc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"ISC2 Certified in Cybersecurity (CC)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=18075"}],"version-history":[{"count":21,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18075\/revisions"}],"predecessor-version":[{"id":18366,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/18075\/revisions\/18366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/18078"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=18075"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=18075"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=18075"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=18075"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=18075"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=18075"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=18075"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=18075"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=18075"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=18075"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=18075"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=18075"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=18075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}