Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

The Complete Certified In Cybersecurity By Isc2 Course 2023

Posted By: ELK1nG
The Complete Certified In Cybersecurity By Isc2 Course 2023

The Complete Certified In Cybersecurity By Isc2 Course 2023
Published 7/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.66 GB | Duration: 5h 46m

Become a Cybersecurity Professional: The Ultimate CC by ISC2 Course for 2023 - Succeed on Your First Try!

What you'll learn

Students will learn the fundamental principles of security, including confidentiality, integrity, and availability

Students will learn how to respond to security incidents, including how to identify, contain, and mitigate threats to a system or network.

Students will learn how to develop and implement business continuity plans, including strategies for maintaining essential business function.

Students will learn the principles of disaster recovery, including backup and recovery strategies and techniques for minimizing data

Students will learn how to implement access control policies and techniques, including authentication, authorization, and accounting (IAAA).

Students will learn how to secure network devices and protocols, including firewalls, VPNs, and intrusion detection and prevention systems (IDS/IPS)

Students will learn how to manage security operations, including security monitoring, incident response, and risk management.

Students will learn about security compliance frameworks and regulations, such as HIPAA, PCI-DSS, and GDPR, and how to ensure compliance.

Students will learn the basics of cybersecurity and how important it is for businesses

Students will learn the importance of cybersecurity to their personal lives

Requirements

There are no prerequisites or requirements for taking my ISC2 Certified in Cybersecurity (CC) Exam Prep Course.

You do not need any prior knowledge of Cybersecurity, IT, or Networks.

Description

Prepare to Ace Your CC Exam and Launch Your Cybersecurity Career with Our Premium Certified in Cybersecurity (CC) by ISC2 Course - 2023 Edition!Are you an aspiring cybersecurity professional, eagerly studying for your upcoming CC exam? Or perhaps you're a newcomer, fascinated by the world of cybersecurity, and dreaming of a rewarding career in this fast-paced industry? We've got your back! Introducing our top-tier "Certified in Cybersecurity (CC) by ISC2" course, created with your aspirations in mind.Our all-encompassing course is your golden ticket to mastering the practical and theoretical aspects of cybersecurity. Navigate key areas like network security, threat management, security governance, and risk management like a pro. Be ready to tackle real-world situations and defend businesses against the ever-evolving digital threats of our time.The course also includes a comprehensive 100-page study guide created by me. This powerful tool is specifically designed to enhance your understanding, solidify your knowledge, and make revision a breeze. It's like having a personal tutor at your disposal, available whenever and wherever you need!The "Certified in Cybersecurity (CC) by ISC2" course isn't just another course; it's a launchpad for your success. We've tailor-made the program to ensure you not only pass your CC exam at the very first attempt but also graduate as a competent cybersecurity professional ready to make a significant impact in the field.So, why wait when your successful future in cybersecurity is just a click away? Join us today and give your career the boost it deserves. Let's conquer the world of cybersecurity together, one lesson at a time.Enrol in the "Certified in Cybersecurity (CC) by ISC2" course today. It's time to turn your cybersecurity dreams into reality. Your journey to greatness starts right here, right now!The course covers all 5 domains of the certification, which are:DOMAIN 1 - Security Principles:Understanding the CIA triad (Confidentiality, Integrity, Availability)Identifying and analysing various types of security risks and threatsUnderstanding the importance of security policies and proceduresDOMAIN 2 - Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts:Understanding the difference between business continuity and disaster recoveryDeveloping an incident response planImplementing backup and recovery proceduresDOMAIN 3 - Access Control Concepts:Understanding different types of access controls such as physical, technical and administrativeImplementing access control policies and proceduresManaging user accounts and passwordsDOMAIN 4 - Network Security:Understanding the OSI model and TCP/IP protocolsConfiguring firewalls and intrusion detection/prevention systemsIdentifying and mitigating network-based attacks such as DoS/DDoS and phishing attacksDOMAIN 5 - Security OperationsImplementing security awareness training programsUnderstanding the different types of security controls such as preventive, detective, and corrective controlsAnalysing security logs and events to identify potential security incidentsAdding to our course's exceptional design, each video tutorial is meticulously labeled with a number corresponding to a specific section of the certification syllabus. This unique feature is crafted to optimize your study experience and focus. Whether you're revisiting concepts or strengthening specific areas, this tailored numbering system allows you to navigate through the course content with ease and precision. Make your study sessions more productive, targeted, and effective with our thoughtfully structured video tutorials. Your path to mastering the cybersecurity certification just got a whole lot simpler!WHAT IS THE CERTIFIED IN CYBERSECURITY BY (ISC)² CERTIFICATION?The ISC2 CC certification is widely recognized all over the world and certifies the foundations of cybersecurity knowledge. Our practice tests have helped over 100+ students get certified and are an excellent tool for anyone looking to pursue a career in cybersecurity.EXAM DETAILS:Our Practice Tests are designed to give you a real-life experience of what the actual ISC2 CC exam will be like. The only thing that is different from the official exam is that during the exam, you won't be able to go back and review a question you previously answered as the 'back navigation' feature will be disabled.The ISC2 CC exam duration is 120 minutes, and it consists of 100 multiple-choice questions, each worth one point. You will need to score a minimum of 70 out of 100 points to pass the exam.IMPORTANT INFORMATIONOnce you pass the exam, you will need to pay an annual fee of $50 to (ISC)² to obtain your certification.If you need to retake the exam, there is a fee of $50.You can only take the exam at an authorized Pearson Vue centre.The (ISC)² training material will be accessible for a period of 180 days.Make sure to take all necessary ID with you to the examination centre, as otherwise you will not be allowed to sit the exam.Once your exam is booked, you will receive a confirmation email with details of your booking. On the day of your exam, be sure to arrive at the testing centre early with the required identification documents. Good luck!

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Important Links

Section 2: Domain 1 - Security Principles

Lecture 3 1.1 - Security Concepts

Lecture 4 1.1.2,.3.4.5 The CIA Triad

Lecture 5 1.1.6,1.1.7 - Authentication, IAAA

Lecture 6 1.1.8 Non-Repudiation

Lecture 7 1.1.9 Privacy

Lecture 8 1.2.1 Understanding Risk Management

Lecture 9 1.2.2 Understanding Risk Identification

Lecture 10 1.2.3 Understanding Risk Assessment

Lecture 11 1.2.4 Understanding Risk Treatment

Lecture 12 1.2.5 Configuration Management

Lecture 13 1.3.1 Security Controls

Lecture 14 1.3.2 Technical Controls

Lecture 15 1.3.3 Administrative Controls

Lecture 16 1.3.4 Physical Controls

Lecture 17 1.4.1 ISC2 Code of Ethics

Lecture 18 1.5.0 Governance Process

Lecture 19 1.5.1 Policies

Lecture 20 1.5.2 Procedures

Lecture 21 1.5.3 Standards

Lecture 22 1.5.4 Regulation and laws

Lecture 23 1.5.5 Best practice security policies

Section 3: Domain 2 - BC & DR & Incident Response Concepts

Lecture 24 2.1.1 Domain 2 objectives

Lecture 25 2.1.2 What is Business Continuity

Lecture 26 2.1.3 Business Continuity Planning

Lecture 27 2.1.4 Business Continuity Controls

Lecture 28 2.1.5 What is high availability

Lecture 29 2.1.6 What is fault tolerance

Lecture 30 2.2.1 What is disaster recovery

Lecture 31 2.2.2 Disaster recovery planning

Lecture 32 2.2.3 Data backup

Lecture 33 2.2.4 Types of disaster recovery sites

Lecture 34 2.3.1 What is incident response

Lecture 35 2.3.2 Create a incident response program

Lecture 36 2.3.3 Create an incident response team

Lecture 37 2.3.4 Incident communication planning

Lecture 38 2.3.5 Identify incidents

Section 4: Domain 3 - Access Control Concepts

Lecture 39 3.1.1 Domain 3 objectives

Lecture 40 3.1.2 Physical security controls types

Lecture 41 3.1.3 Monitoring physical access

Lecture 42 3.1.4 Visitors management

Lecture 43 3.1.5 Differences between Authorised and Non-authorised personnel

Lecture 44 3.2.1 What is logical access controls

Lecture 45 3.2.2 What is principle of least privilge

Lecture 46 3.2.3 What is segregation of duties

Lecture 47 3.2.4 What is DAC

Lecture 48 3.2.5 What is MAC

Lecture 49 3.2.6 What is RBAC

Section 5: Domain 4 - Network Security

Lecture 50 4.1.1 Domain Objectives

Lecture 51 4.1.2 Network types

Lecture 52 4.1.3 Introducing TCP IP

Lecture 53 4.1.4 The OSI Model

Lecture 54 4.1.5 IP Addresses and DHCP

Lecture 55 4.1.6 Network Ports

Lecture 56 4.1.7 Network Cables

Lecture 57 4.1.8 WiFi

Lecture 58 4.1.9 VLANs

Lecture 59 4.1.10 VPNs

Lecture 60 4.2.1 Types of threats

Lecture 61 4.2.2 Intrusion Detection and Prevention Systems

Lecture 62 4.2.3 Malware Preventions

Lecture 63 4.2.4 Port Scanners

Lecture 64 4.2.5 Vulnerability Scanners

Lecture 65 4.2.6 Firewalls

Lecture 66 4.2.7 Honeynets and Honeypots

Lecture 67 4.2.8 SIEM and SOAR systems

Lecture 68 4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid

Lecture 69 4.3.2 Data center protection

Lecture 70 4.3.3 Security Zones

Lecture 71 4.3.4 Routers and Switches

Lecture 72 4.3.5 VLANs and Network segmentation

Lecture 73 4.3.6 Firewalls

Lecture 74 4.3.7 VPNs and VPN Concentrator

Lecture 75 4.3.8 Internet of Things (IoT)

Lecture 76 4.3.9 Security IoT devices

Lecture 77 4.3.10 Network Security for Smart devices

Section 6: Domain 5 - Security Operations

Lecture 78 5.1.1 Domain Objectives

Lecture 79 5.1.2 What is Data and Data Security

Lecture 80 5.1.3 Understanding Encryption

Lecture 81 5.1.4 Differences between symmetric vs asymmetric cryptography

Lecture 82 5.1.5 Hashing

Lecture 83 5.1.6 Data Handling

Lecture 84 5.1.7 Data Classification

Lecture 85 5.1.8 Logging and Monitoring Security Events

Lecture 86 5.2.1 What is Configuration Management

Lecture 87 5.2.2 Patch Management

Lecture 88 5.3.1 Data Handling Policiess

Lecture 89 5.3.2 Password Policies

Lecture 90 5.3.3 Acceptable Use Policy (AUP)

Lecture 91 5.3.4 Bring Your Own Device (BYOD) Policy

Lecture 92 5.3.5 Change management

Lecture 93 5.3.6 Privacy Policy

Lecture 94 5.4.1 Social Engineering

Lecture 95 5.4.2 Security Awareness Training

Section 7: Practice Exam Questions

This course is designed for individuals who are interested in cybersecurity and are seeking to advance their knowledge and skills in this field. Specifically, this course is suitable for:,Students preparing to take the ISC2 Certified in Cybersecurity (CC) exam: This course covers the key concepts and topics that are tested on the CC exam, making it an excellent resource for students who are getting ready to take the exam.,Professionals from non-IT backgrounds: This course is also suitable for professionals from non-IT backgrounds who want to become familiar with the kind of questions on the CC exam. The course covers the basic principles and concepts of cybersecurity in a clear and concise manner, making it accessible to those without a technical background.,Anyone seeking a career in cybersecurity: This course is an excellent starting point for individuals who are interested in pursuing a career in cybersecurity. It provides a solid foundation in cybersecurity concepts and can help assess their knowledge level in the field.