(ISC)2 Certified in Cybersecurity (CC) Cert Prep Course & PDF Guides
$5.00
Price: $ 5.00 USD | Size: 1.96 GB | Duration : 4+ Hours | 16 Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : CISSP PDF Guides | INSTANT DOWNLOAD
Description
Price: $ 5.00 USD | Size: 1.96 GB | Duration : 4+ Hours | 16 Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9
BRAND : Expert TRAINING | ENGLISH | Bonus : CISSP PDF Guides | INSTANT DOWNLOAD
(ISC)2 Certified in Cybersecurity (CC) Cert Prep Course & PDF Guides
Course details
Considering a career in cybersecurity? The good news is that almost every company today has a need for more cybersecurity staff, and the (ISC)² Certified in Cybersecurity (CC) exam is an excellent starting point for a career in cybersecurity. In this course, instructor Mike Chapple shares all the cybersecurity knowledge you need to know to pass the exam, gives you an insider’s view of the test, and covers topics like the value of the certification and career tracks in cybersecurity.
Introduction
Cybersecurity
What you should know
1. Certified in Cybersecurity (CC) Certification
The CC exam
Careers in information security
The value of certification
2. Security Concepts
Confidentiality
Integrity
Availability
Authentication and authorization
Password security
Multifactor authentication
Non-repudiation
Privacy
3. Risk Management
Understanding risks
Risk assessment
Risk treatment
Selecting security controls
Configuration management
4. Security Governance
Regulations and laws
Security policy framework
Best practice security policies
5. Business Continuity
Business continuity planning
Business continuity controls
High availability and fault tolerance
6. Incident Response
Build an incident response program
Create an incident response team
Incident communications plan
Incident identification
7. Disaster Recovery
Disaster recovery planning
Backups
Disaster recovery sites
Test BC/DR plans
8. Physical Access Controls
Control physical access
Design for physical security
Visitor management
Physical security personnel
9. Logical Access Controls
Account and privilege management
Account monitoring
Provisioning and deprovisioning
Authorization
10. Computer Networking
Network types
Introducing TCP/IP
IP addresses and DHCP
Network ports
Securing wireless networks
Wireless encryption
Ping and traceroute
11. Network Threats
Viruses, worms, and trojans
Botnets
Eavesdropping attacks
Implementation attacks
12. Threat Identification and Prevention
Intrusion detection and prevention
Malware prevention
Port scanners
Vulnerability scanners
13. Network Security Infrastructure
Data center protection
Security zones
Routers and switches
VLANs and network segmentation
2m 19s
VPNs and VPN concentrators
Network access control
Internet of Things
Securing IoT devices
Network security for smart devices
14. Cloud Computing
What is the cloud?
Cloud service categories
Cloud deployment models
Managed security service providers
Manage vendor relationships
Vendor agreements
15. Data Security
Understanding encryption
Symmetric vs. asymmetric cryptography
Hash functions
The data lifecycle
Data classification
Logging and monitoring
16. Security Awareness and Training
Social engineering
Impersonation attacks
Security awareness training
Conclusion
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.