Welcome to Expert Training The Online Course Shop!
-50%

(ISC)2 Certified in Cybersecurity (CC) Cert Prep Course & PDF Guides

$5.00

Price:  $ 5.00 USD | Size: 1.96 GB | Duration : 4+ Hours | 16 Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND : Expert TRAINING | ENGLISH | Bonus : CISSP PDF Guides |  INSTANT DOWNLOAD 

SKU: ISC-2-CRT-IN Category:

OR

Add to Wishlist
Add to Wishlist

Description

Price:  $ 5.00 USD | Size: 1.96 GB | Duration : 4+ Hours | 16 Modules | ⭐️⭐️⭐️⭐️⭐️ 4.9

BRAND : Expert TRAINING | ENGLISH | Bonus : CISSP PDF Guides |  INSTANT DOWNLOAD 

(ISC)2 Certified in Cybersecurity (CC) Cert Prep Course & PDF Guides

Course details

Considering a career in cybersecurity? The good news is that almost every company today has a need for more cybersecurity staff, and the (ISC)² Certified in Cybersecurity (CC) exam is an excellent starting point for a career in cybersecurity. In this course, instructor Mike Chapple shares all the cybersecurity knowledge you need to know to pass the exam, gives you an insider’s view of the test, and covers topics like the value of the certification and career tracks in cybersecurity.

Introduction

Cybersecurity

What you should know

1. Certified in Cybersecurity (CC) Certification

The CC exam

Careers in information security

The value of certification

2. Security Concepts

Confidentiality

Integrity

Availability

Authentication and authorization

Password security

Multifactor authentication

Non-repudiation

Privacy

3. Risk Management

Understanding risks

Risk assessment

Risk treatment

Selecting security controls

Configuration management

4. Security Governance

Regulations and laws

Security policy framework

Best practice security policies

5. Business Continuity

Business continuity planning

Business continuity controls

High availability and fault tolerance

6. Incident Response

Build an incident response program

Create an incident response team

Incident communications plan

Incident identification

7. Disaster Recovery

Disaster recovery planning

Backups

Disaster recovery sites

Test BC/DR plans

8. Physical Access Controls

Control physical access

Design for physical security

Visitor management

Physical security personnel

9. Logical Access Controls

Account and privilege management

Account monitoring

Provisioning and deprovisioning

Authorization

10. Computer Networking

Network types

Introducing TCP/IP

IP addresses and DHCP

Network ports

Securing wireless networks

Wireless encryption

Ping and traceroute

11. Network Threats

Viruses, worms, and trojans

Botnets

Eavesdropping attacks

Implementation attacks

12. Threat Identification and Prevention

Intrusion detection and prevention

Malware prevention

Port scanners

Vulnerability scanners

13. Network Security Infrastructure

Data center protection

Security zones

Routers and switches

VLANs and network segmentation

2m 19s

VPNs and VPN concentrators

Network access control

Internet of Things

Securing IoT devices

Network security for smart devices

14. Cloud Computing

What is the cloud?

Cloud service categories

Cloud deployment models

Managed security service providers

Manage vendor relationships

Vendor agreements

15. Data Security

Understanding encryption

Symmetric vs. asymmetric cryptography

Hash functions

The data lifecycle

Data classification

Logging and monitoring

16. Security Awareness and Training

Social engineering

Impersonation attacks

Security awareness training

Conclusion

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Quick Navigation
×
×

Cart