Acumen IT Training, Inc.

CERTIFIED IN CYBERSECURITY

COURSE DESCRIPTION

To help close the workforce gap, (ISC)2 recently launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers and IT professionals. CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP and future leadership roles.

COURSE OBJECTIVES

After completing this course, learners will be able to:  

  • Discuss the foundational concepts of cybersecurity principles. 
  • Recognize foundational security concepts of information assurance. 
  • Define risk management terminology and summarize the process. 
  • Relate risk management to personal or professional practices. 
  • Classify types of security controls. 
  • Distinguish between policies, procedures, standards, regulations and laws. 
  • Demonstrate the relationship among governance elements. 
  • Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples. 
  • Practice the terminology of and review security policies. 
  • Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.

INTENDED AUDIENCE:

CC training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites.

COURSE OUTLINE

  • Module 1: Understand the Security Concepts of Information Assurance
  • Module 2: Understand the Risk Management Processes
  • Module 3: Understand Security Controls
  • Module 4: Understand Governance Elements
  • Module 5: Understand (ISC)2 Code of Ethics
  • Module 1: Understand Incident Response
  • Module 2: Understand Business Continuity
  • Module 3: Understand Disaster Recovery
  • Module 1: Understand Access Control Concepts
  • Module 2: Understand Physical Access Controls
  • Module 3: Understand Logical Access controls
  • Module 1: Understand Computer Networking
  • Module 2: Understand Network (Cyber) Threats and Attacks
  • Module 3: Understand Network Security Infrastructure

For FULL COURSE OUTLINE, please contact us.

Please contact us for the full course outline, schedules and for booking a private class.

;