title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
CC Certified in Cybersecurity
Course Description
Overview
With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers and IT professionals. CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP and future leadership roles.Official (ISC)² Certified in Cybersecurity (CC) Entry-Level Certification Training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry- or junior-level cybersecurity role.
What makes Certified in Cybersecurity (CC) so unique is that it requires no experience or formal education — only basic knowledge of information technology (IT) is recommended. In that sense, it opens opportunities in cybersecurity to a much broader pool of candidates,
including recent graduates, career changers and IT professionals.
As the true entry point to career excellence, Certified in Cybersecurity starts newcomers on their path to advanced cybersecurity certifications and future leadership roles.
For organizations, it helps develop new talent for their teams to build a stronger line of defense. It gives them the assurance that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles.
Objectives
- Discuss the foundational concepts of cybersecurity principles.?
- Recognize foundational security concepts of information assurance.?
- Define risk management terminology and summarize the process.?
- Relate risk management to personal or professional practices.?
- Classify types of security controls.?
- Distinguish between policies, procedures, standards, regulations and laws.?
- Demonstrate the relationship among governance elements.?
- Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples.?
- Practice the terminology of and review security policies.?
- Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.?
- Recall the terms and components of incident response.?
- Summarize the components of a business continuity plan.?
- Identify the components of disaster recovery.?
- Practice the terminology and review concepts of business continuity, disaster recovery and incident response.?
- Select access controls that are appropriate in a given scenario.?
- Relate access control concepts and processes to given scenarios.?
- Compare various physical access controls.?
- Describe logical access controls.?
- Practice the terminology and review concepts of access controls.?
- Explain the concepts of network security.?
- Recognize common networking terms and models.?
- Identify common protocols and port and their secure counterparts.?
- Identify types of network (cyber) threats and attacks.?
- Discuss common tools used to identify and prevent threats.?
- Identify common data center terminology.?
- Recognize common cloud service terminology.?
- Identify secure network design terminology.?
- Practice the terminology and review concepts of network security.?
- Explain concepts of security operations.?
- Discuss data handling best practices.?
- Identify key concepts of logging and monitoring.?
- Summarize the different types of encryption and their common uses.?
- Describe the concepts of configuration management.?
- Explain the application of common security policies.?
- Discuss the importance of security awareness training.?
- Practice the terminology and review concepts of network operations.??
Audience
- Students
- Recent Graduates
- Young Professionals
- IT Professionals
- Career Changers
Prerequisites
-
There are no specific prerequisites to take the exam.?No work experience in cybersecurity or formal education diploma/degree is required.
Topics
- Understand the Security Concepts of Information Assurance
- Understand the Risk Management Processes
- Understand Security Controls
- Understand Governance Element
- Understand (ISC)2 Code of Ethic
- Understand Incident Response
- Understand Business Continuity
- Understand Disaster Recovery
- Understand Access Control Concept
- Understand Physical Access Control
- Understand Logical Access controls
- Understand Computer Networking
- Understand Network (Cyber) Threats and Attacks
- Understand Network Security Infrastructure
- Understand Data Security
- Understand System Hardening
- Understand Best Practice Security Policies
- Understand Security Awareness Training
- Certification Requirements
- Scheduling the Exam
- Before the Exam
- Day of Exam
- Tips for Reading the Questions
- After the Exam
Related Courses
-
Certified Cloud Security Professional (Online Self-Paced)
ISC2-CCSPsp- Duration: 1 Day
- Delivery Format: Self-Paced Training
- Price: 895.00 USD
-
Certified Cloud Security Professional
ISC2-CCSP- Duration: 5
- Delivery Format: Classroom Training, Online Training
- Price: 2,875.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.

STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.