Certified In Cybersecurity
- Description
- Reviews
CERTIFIED IN CYBERSECURITY
COURSE DESCRIPTION
To help close the workforce gap, (ISC)2 recently launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers and IT professionals. CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP and future leadership roles.
COURSE OBJECTIVES
After completing this course, learners will be able to:
- Discuss the foundational concepts of cybersecurity principles.
- Recognize foundational security concepts of information assurance.
- Define risk management terminology and summarize the process.
- Relate risk management to personal or professional practices.
- Classify types of security controls.
- Distinguish between policies, procedures, standards, regulations and laws.
- Demonstrate the relationship among governance elements.
- Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples.
- Practice the terminology of and review security policies.
- Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
INTENDED AUDIENCE:
CC training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites.
COURSE OUTLINE
Chapter 1: Security Principles
- Module 1: Understand the Security Concepts of Information Assurance
- Module 2: Understand the Risk Management Processes
- Module 3: Understand Security Controls
- Module 4: Understand Governance Elements
- Module 5: Understand (ISC)2Â Code of Ethics
Chapter 2: Incident Response, Business Continuity and Disaster Recovery
- Module 1: Understand Incident Response
- Module 2: Understand Business Continuity
- Module 3: Understand Disaster Recovery
Chapter 3: Access Controls Concepts
- Module 1: Understand Access Control Concepts
- Module 2: Understand Physical Access Controls
- Module 3: Understand Logical Access controls
- Module 1: Understand Computer Networking
- Module 2: Understand Network (Cyber) Threats and Attacks
- Module 3: Understand Network Security Infrastructure
For FULL COURSE OUTLINE, please contact us. Please contact us for the full course outline, schedules and for booking a private class.
Popular Courses
Archive
Working hours
Monday | 9:00 am - 6.00 pm |
Tuesday | 9:00 am - 6.00 pm |
Wednesday | 9:00 am - 6.00 pm |
Thursday | 9:00 am - 6.00 pm |
Friday | 9:00 am - 6.00 pm |
Saturday | Closed |
Sunday | Closed |