0% found this document useful (0 votes)
10 views2 pages

01 Introduction

Uploaded by

Tomiwa Osameyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

01 Introduction

Uploaded by

Tomiwa Osameyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

(ISC)2 Certified in Cybersecurity

Introduction
The content in this repo is based on the self-paced course called Certified in Cybersecurity from
(ISC)2, which is a preparation for (ISC)2 Certified in Cybersecurity.

In this entry-level cybersecurity certification, the domains included are: Security Principles, Business
Continuity, Disaster Recovery & Incident Response Concepts, Access Controls Concepts, Network
Security and Security Operations.

This Official (ISC)² Certified in Cybersecurity (CC) self-paced course provides a comprehensive
review of information systems security concepts, industry best practices and terminology. The goal
of this content is to provide students with the core knowledge necessary to be a successful entry-
level cybersecurity practitioner in today’s world and review concepts outlined in the Official (ISC)²
Certified in Cybersecurity (CC) Exam Outline.

Course objectives
1. Discuss the foundational concepts of cybersecurity principles.
2. Recognize foundational security concepts of information assurance.
3. Define risk management terminology and summarize the process.
4. Relate risk management to personal or professional practices.
5. Classify types of security controls.
6. Distinguish between policies, procedures, standards, regulations and laws.
7. Demonstrate the relationship among governance elements.
8. Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given
examples.
9. Practice the terminology of and review security policies.
10. Explain how organizations respond to, recover from and continue to operate during unplanned
disruptions.
11. Recall the terms and components of incident response.
12. Summarize the components of a business continuity plan.
13. Identify the components of disaster recovery.
14. Practice the terminology and review concepts of business continuity, disaster recovery and
incident response.
15. Select access controls that are appropriate in a given scenario.
16. Relate access control concepts and processes to given scenarios.
17. Compare various physical access controls.
18. Describe logical access controls.
19. Practice the terminology and review concepts of access controls.
20. Explain the concepts of network security.
21. Recognize common networking terms and models.
22. Identify common protocols and port and their secure counterparts.
23. Identify types of network (cyber) threats and attacks.
24. Discuss common tools used to identify and prevent threats.
25. Identify common data center terminology.
26. Recognize common cloud service terminology.
27. Identify secure network design terminology.
28. Practice the terminology and review concepts of network security.
29. Explain concepts of security operations.
30. Discuss data handling best practices.
31. Identify key concepts of logging and monitoring.
32. Summarize the different types of encryption and their common uses.
33. Describe the concepts of configuration management.
34. Explain the application of common security policies.
35. Discuss the importance of security awareness training.
36. Practice the terminology and review concepts of network operations.

Files
1. Important PDFs

https://github.com/cyberfascinate/ISC2-CC-Study-Material/tree/main/Important%20PDFs

2. Notes

https://github.com/cyberfascinate/ISC2-CC-Study-Material/tree/main/Notes

3. Flash Card

https://github.com/cyberfascinate/ISC2-CC-Study-Material/blob/main/Flash%20Card.md

4. Quiz

https://github.com/cyberfascinate/ISC2-CC-Study-Material/blob/main/Quiz.md

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy