I'm a Copywriter in a Digital Agency, I was searching for courses that'll help me broaden my skill set. Before signing up for Rob's.
(ISC)2 Cyber Security Certified (CC)
- Main courses, Programs
- 2 (Registered)
-
OBJECTIVE
The global cyber security skills gap has now grown beyond in millions. Whether you are new to cyber security or have several years in the industry, this is a field where continuing education is critical to staying relevant and to keeping your career progressing forward.
Course Outline:
This course provides detail and comprehensive review of information systems security concepts, security information governance, best practices and terminology, covering the five domains included in the CC Exam Outline
- Security Principles
- Incident Response, Business Continuity and Disaster Recovery Concepts
- Access Control Concepts
- Network Security
- Security Operations
This instructor based course will help you transition into the cyber security profession by laying the foundation of your information security knowledge.
(ISC)² Cyber Security Exam Deep drive
Domain 1: Security Principles
- Understand the security concepts of information assurance
- Confidentiality
- Integrity
- Availability
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
- Non-repudiation
- Privacy
- Understand the risk management process
- Risk management (e.g., risk priorities, risk tolerance)
- Understand security controls
- Technical controls
- Administrative control
- Physical controls
- Understand the (ISC)² Code of Ethics
- Professional code of conduct
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
- Understand governance processes
- Policies
- Procedures
- Standards
- Regulations and laws
Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
- 1.Understand business continuity (BC)
- Purpose
- Importance
- Components
- 2.Understand disaster recovery (DR)
- Purpose
- Importance
- Components
- 3.Understand incident response
- Purpose
- Importance
- Components
Domain 3: Access Control Concepts
- Understand physical access controls
- Physical security controls (e.g., badge systems, gate entry, environmental design)
- Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
- Authorized versus unauthorized personnel
- Understand logical access controls
- Principle of least privilege
- Segregation of duties
- Discretionary access control (DAC)
- Mandatory access control (MAC)
- Role-based access control (RBAC)
Domain 4: Network Security
- Understand computer networking
- Networks (e.g. Open Systems Interconnection(OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model,Internet Protocol version 4(IPv4), Internet Protocol version 6 (IPv6),Wi-Fi)
- Ports
- Applications
- Understand network (cyber) threats and attacks
- Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, on-path
- Identification (e.g., intrusion detection system(IDS), host- based intrusion detection system (HIDS), network intrusion detection system(NIDS))
- Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
- Understand network security infrastructure
- On-premises (e.g., power, data center/closets, Heating,Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding(MOU) / memorandum of agreement (MOA))
- Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
- Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
Domain 5: Security Operations
- Understand data security
- Encryption (e.g., symmetric, asymmetric, hashing)
- Data handling (e.g., destruction, retention, classification, labeling)
- Logging and monitoring security events
- Understand system hardening
- Configuration management (e.g., baselines, updates, patches)
- Understand best practice security policies
- Data handling policy
- Password policy
- Acceptable Use Policy (AUP)
- Bring your own device (BYOD) policy
- Change management policy (e.g., documentation, approval, rollback)
- Privacy policy
- Understand security awareness training
- Purpose/concepts (e.g., social engineering, password protection)
- Importance
Domain 6: Mock Test
Instructor
0 rating
Related Courses
– Mary Kate McDevitt, Skillshare teacher with 50,000 students
Join our community of students around,the world helping you succeed.