Description
Price: 10.00 USD | Size: 1.97 GB | Duration : 8.24 Hours | 66 Video Lessons | Bonus : Risk Management PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 5.0
(ISC)² CC Online Training
This entry-level (ISC)² CC training prepares learners to perform the basic and essential tasks of an entry-level cybersecurity analyst without supervision or guidance.
(ISC)2 is already one of the most respected professional organizations in the IT training world for cybersecurity professionals who need to demonstrate their competency with advanced security techniques and technologies. Their new Certified in Cybersecurity certification is an ideal starting point for someone early in their career.
This Certified in Cybersecurity training prepares you for the foundational (ISC)2 certification, which is a valuable tool for proving your general familiarity with the tech you’ll often use on a daily basis.
Once you’re done with this (ISC)² training, you’ll know how to perform the basic and essential tasks of an entry-level cybersecurity analyst without supervision or guidance.
For anyone who manages cybersecurity specialists, this (ISC)² training can be used to onboard new cybersecurity specialists, curated into individual or team training plans, or as a (ISC)² reference resource.
(ISC)² CC: What You Need to Know
This (ISC)² CC training covers cybersecurity topics including:
- Foundational cybersecurity principles
- Basics of cybersecurity technologies and devices
- Steps of incident response and disaster recovery
- The role cybersecurity plays in business continuity
Who Should Take (ISC)² CC Training?
This (ISC)² CC training is considered foundational-level (ISC)² training, which means it was designed for cybersecurity specialists. This cybersecurity skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced cybersecurity specialists looking to validate their (ISC)² skills.
New or aspiring cybersecurity specialists. Every brand new cybersecurity specialist needs somewhere to start. The Certified in Cybersecurity cert from (ISC)2 strives to be the ground-floor, entry-level introduction that can prove to employers that although you don’t have a lot of experience, you do have the knowledge and familiarity you need to get started in your first position.
Experienced cybersecurity specialists. A cybersecurity specialist who already has several years of experience may be overqualified to try for the Certified in Cybersecurity certification. However, if you’ve struggled to land a new, more advanced job, earning this certification from (ISC)2 could validate your experience and knowledge and prove your readiness for a new position.
Understanding Information Assurance
1. The CIA Triad and Nonrepudiation
16 mins
2. Methods of Authentication
11 mins
3. Multi-Factor Authentication (MFA)
6 mins
4. Biometrics Factors
4 mins
5. Data Privacy
7 mins
Discussing Risk Management, Controls, Ethics and Governance
1. Risk Management
8 mins
2. Risk Treatment
6 mins
3. Security Controls
8 mins
4. Security Control Categories
7 mins
5. ISC2 Code of Ethics
4 mins
6. Policies and Procedures
7 mins
7. Standards, Regulations and Laws
5 mins
Exploring BC, DR & IR Concepts
1. Intro
3 mins
2. Business Continuity
3 mins
3. Business Continuity Planning
9 mins
4. Disaster Recovery
4 mins
5. Disaster Recovery Planning
8 mins
6. Incident Response
11 mins
7. After Action and Training
6 mins
Reviewing Access Control Concepts
1. Physical Security Controls
5 mins
2. Monitoring Controls
7 mins
3. Authorized Personnel vs Unauthorized Personnel
5 mins
4. Principle of Least Privilege
6 mins
5. Segregation of Duties
5 mins
6. Types of Access Control
9 mins
7. Data and Media Access Control
9 mins
Exploring Security Policies and Training
1. Data Handling Policy
7 mins
2. Password Policy
5 mins
3. Acceptable Use Policy
5 mins
4. Bring Your Own Device (BYOD) Policy
6 mins
5. Change Management Policy
5 mins
6. Privacy Policy
8 mins
7. Security Awareness Training
11 mins
Understanding Data Security and System Hardening
1. Encryption Basics
3 mins
2. Types of Encryption
11 mins
3. Data Hashing with Encryption
6 mins
4. Digital Signatures with Hashing
4 mins
5. Data Handling
8 mins
6. Data Logging
6 mins
7. Configuration Management
10 mins
Discussing Network Security Infrastructure
1. Network Segmentation
11 mins
2. Embedded System Security
7 mins
3. Virtual Private Networks (VPNs)
5 mins
4. Defense In Depth and Zero Trust
6 mins
5. Network Access Control (NAC)
3 mins
6. SLAs and MSPs
7 mins
7. The Cloud
9 mins
Exploring Network Threats and Attacks
1. Types of Threats – DoS, DDoS and Malware
8 mins
2. Types of Threats – Main-in-the-middle and Side Channel
4 mins
3. Intrusion Detection / Prevention Systems (IDS/IPS)
12 mins
4. Endpoint Protection and Management
6 mins
5. Vulnerability Scanning
11 mins
6. Firewalls
11 mins
Understanding Computer Networking
1. Computer Networking Basics
6 mins
2. OSI Model
5 mins
3. TCP/IP Model
9 mins
4. IP Addresses
10 mins
5. Wireless Networking
3 mins
6. Networking Ports
9 mins
7. Common Applications
7 mins
Exploring On-Premise Network Infrastructure
1. Power
14 mins
2. Data Centers and Closets
6 mins
3. Heating, Ventilation and Air Conditioning (HVAC)
9 mins
4. Dealing with Fire
6 mins
5. Redundancy
9 mins
6. Working with 3rd Parties
3 mins
Reviews
There are no reviews yet.