Course Overview
Target audiences
- A Certified in Cybersecurity training program is best suited for any individual or organization looking to understand the risks of a cyber-attack, interpret existing cybersecurity regulations and policies, and fortify their system security.
- The training is helpful to those responsible for managing sensitive company, customer, or customer data, and to those who need to know the scope of their organization’s vulnerabilities and how to protect against them.
- The training will also appeal to security architects, forensic analysts, malware analysts, compliance technologists, IT auditors, and software developers.
- Persons looking to pursue their CISSP (Certified Information Systems Security Professional) certification may also benefit from this training as a refresher and as a way to gain up-to-date knowledge about current security best practices and threats.
Schedule Dates
Curriculum
-
1.1 Understand the security concepts of information assurance
Domain 1: Security Principles (26%, 20 items)
-
1.2 Understand the risk management process
-
1.3 Understand security controls
-
1.4 Understand (ISC)² Code of Ethics
-
1.5 Understand governance processes
-
2.1 Understand business continuity (BC)
Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%, 7 items)
-
2.2 Understand disaster recovery (DR)
-
2.3 Understand incident response
-
3.1 Understand physical access controls
Domain 3: Access Controls Concepts (22%, 17 items)
-
3.2 Understand logical access controls
-
4.1 Understand computer networking
Domain 4: Network Security (24%, 18 items)
-
4.2 Understand network threats and attacks
- Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
- Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
- Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
-
4.3 Understand network security infrastructure
- On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
- Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
- Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
-
5.1 Understand data security
Domain 5: Security Operations (18%, 13 items)
-
5.2 Understand system hardening
-
5.3 Understand best practice security policies
-
5.4 Understand security awareness training
The CC – Certified in Cybersecurity course is designed for individuals who want to pursue a career in cybersecurity or enhance their existing cybersecurity skills. The target audience for this course is IT professionals, Security professionals, Students, and Individuals who want to transition to a career in cybersecurity: This course is also suitable for those who want to transition to a career in cybersecurity. The course covers a range of topics related to cybersecurity, which can help students develop a foundational understanding of this field.
The course is designed to provide learners with a comprehensive understanding of cybersecurity, which can be valuable for pursuing a career in this field or enhancing existing cybersecurity skills.
Participants can benefit in several ways from taking the CC – Certified in Cybersecurity course such as developing a comprehensive knowledge of the field of cybersecurity, which can be valuable for pursuing a career in this field. Participants can enhance their existing cybersecurity skills or develop new skills related to cybersecurity. This can help them become more effective in their current job or prepare them for a new career in cybersecurity. The course covers the latest cybersecurity trends and developments, which can help participants stay up-to-date with the latest industry practices. This can be valuable for IT professionals and security professionals who need to stay ahead of the curve. The certification earned upon completion of the course can be valuable for boosting career prospects. Finally, the course provides opportunities for participants to network with other professionals in the field of cybersecurity. This can help them build relationships and connect with potential employers.
Participants who complete the CC - Certified in Cybersecurity course will receive a certificate of completion, which is recognized by the industry as a symbol of their proficiency in cybersecurity. The CC certification demonstrates the participant's knowledge and skills in cybersecurity, including risk management, network security, and incident response. The certification is widely recognized and respected by employers in the cybersecurity industry, and it can help participants advance their careers in this field.
The CC - Certified in Cybersecurity course covers a wide range of topics related to cybersecurity. Some of the key topics that are covered in the course include:
Cybersecurity fundamentals
Security risk management
Network security
Cloud Security
Application Security
Incident response and recovery
Cryptography and encryption
Threat intelligence and analysis
Vulnerability assessment and management
Cybersecurity governance and compliance
The course is designed to provide participants with and to prepare them for the CC certification exam.
Cybersecurity fundamentals
Security risk management
Network security
Cloud Security
Application Security
Incident response and recovery
Cryptography and encryption
Threat intelligence and analysis
Vulnerability assessment and management
Cybersecurity governance and compliance
The course is designed to provide participants with and to prepare them for the CC certification exam.