Certified in Cybersecurity – CC Training
This credential is for newcomers to the field, to recognize the growing trend of people entering the cybersecurity workforce without direct IT experience. Getting Certified in Cybersecurity provides employers with the confidence that you have a solid grasp of the right technical concepts, and a demonstrated aptitude to learn on the job.
Why Earn the CC?
If you’re looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team. This certification is ideal for:
- IT professionals
- Career changers looking to transition into cybersecurity
- College students or recent graduates
Course Content:
Module1: Security Principles
Understand the security concepts of information assurance
- Confidentiality
- Integrity
- Availability
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
- Non-repudiation
- Privacy
1.2 – Understand the risk management process
- Risk management (e.g., risk priorities, risk tolerance)
- Risk identification, assessment and treatment
1.3 – Understand security controls
- Technical controls
- Administrative controls
- Physical controls
1.4 – Understand ISC2 Code of Ethics
- Professional code of conduct
1.5 – Understand governance processes
- Policies
- Procedures
- Standards
- Regulations and laws
Module2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
2.1 – Understand business continuity (BC)
- Purpose
- Importance
- Components
2.2 – Understand disaster recovery (DR)
- Purpose
- Importance
- Components
2.3 – Understand incident response
- Purpose
- Importance
- Components
Module3: Access Control Concepts:
3.1 – Understand physical access controls
- Physical security controls (e.g., badge systems, gate entry, environmental design)
- Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
- Authorized versus unauthorized personnel
3.2 – Understand logical access controls
- Principle of least privilege
- Segregation of duties
- Discretionary access control (DAC)
- Mandatory access control (MAC)
- Role-based access control (RBAC)
Module4: Network securirty
4.1 – Understand computer networking
- Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi)
- Ports
- Applications
4.2 – Understand network threats and attacks
- Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
- Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
- Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
4.3 – Understand network security infrastructure
- On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
- Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
- Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
Module5: Security Operations:
5.1 – Understand data security
- Encryption (e.g., symmetric, asymmetric, hashing)
- Data handling (e.g., destruction, retention, classification, labeling)
- Logging and monitoring security events
5.2 – Understand system hardening
- Configuration management (e.g., baselines, updates, patches)
5.3 – Understand best practice security policies
- Data handling policy
- Password policy
- Acceptable Use Policy (AUP)
- Bring your own device (BYOD) policy
- Change management policy (e.g., documentation, approval, rollback)
- Privacy policy
5.4 – Understand security awareness training
- Purpose/concepts (e.g., social engineering, password protection)
- Importance
Certified in Cybersecurity Examination Information
Length of exam | 2 hours |
Number of items | 100 |
Item format | Multiple choice |
Passing grade | 700 out of 1000 points |
Exam language availability | English, Chinese, Japanese, Korean, German, Spanish |
Testing center | Pearson VUE Testing Center |
Internattional Student Fees: USD 500$
Stay connected even when you’re apart
Join our WhatsApp Channel – Get discount offers
500+ Free Certification Exam Practice Question and Answers
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
Join Internships and Referral Program (click for details)
Work as Freelancer or Full-Time Employee (click for details)
Flexible Classes
- Online Classes – Live Virtual Class (L.V.C), Online Training
- Corporate Workshops | Fast-Track with One-on-One Classes
- Week End Classes For Professionals SAT/ SUN Classes
- International Students for Assistance Call/WhatsApp +92-312-2169325
Popular Courses (Online Class Available)
Certified Information Security Manager (CISM)
Offensive Security Certified Professional (OSCP)
Ethical Hacking Course Basic to Advance
ISO 27001 Information Security Management Systems – ISMS
Advanced Diploma of Cyber Security