The Complete Certified In Cybersecurity By Isc2 Course 2023
Published 7/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.66 GB | Duration: 5h 46m
Published 7/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.66 GB | Duration: 5h 46m
Become a Cybersecurity Professional: The Ultimate CC by ISC2 Course for 2023 - Succeed on Your First Try!
What you'll learn
Students will learn the fundamental principles of security, including confidentiality, integrity, and availability
Students will learn how to respond to security incidents, including how to identify, contain, and mitigate threats to a system or network.
Students will learn how to develop and implement business continuity plans, including strategies for maintaining essential business function.
Students will learn the principles of disaster recovery, including backup and recovery strategies and techniques for minimizing data
Students will learn how to implement access control policies and techniques, including authentication, authorization, and accounting (IAAA).
Students will learn how to secure network devices and protocols, including firewalls, VPNs, and intrusion detection and prevention systems (IDS/IPS)
Students will learn how to manage security operations, including security monitoring, incident response, and risk management.
Students will learn about security compliance frameworks and regulations, such as HIPAA, PCI-DSS, and GDPR, and how to ensure compliance.
Students will learn the basics of cybersecurity and how important it is for businesses
Students will learn the importance of cybersecurity to their personal lives
Requirements
There are no prerequisites or requirements for taking my ISC2 Certified in Cybersecurity (CC) Exam Prep Course.
You do not need any prior knowledge of Cybersecurity, IT, or Networks.
Description
Prepare to Ace Your CC Exam and Launch Your Cybersecurity Career with Our Premium Certified in Cybersecurity (CC) by ISC2 Course - 2023 Edition!Are you an aspiring cybersecurity professional, eagerly studying for your upcoming CC exam? Or perhaps you're a newcomer, fascinated by the world of cybersecurity, and dreaming of a rewarding career in this fast-paced industry? We've got your back! Introducing our top-tier "Certified in Cybersecurity (CC) by ISC2" course, created with your aspirations in mind.Our all-encompassing course is your golden ticket to mastering the practical and theoretical aspects of cybersecurity. Navigate key areas like network security, threat management, security governance, and risk management like a pro. Be ready to tackle real-world situations and defend businesses against the ever-evolving digital threats of our time.The course also includes a comprehensive 100-page study guide created by me. This powerful tool is specifically designed to enhance your understanding, solidify your knowledge, and make revision a breeze. It's like having a personal tutor at your disposal, available whenever and wherever you need!The "Certified in Cybersecurity (CC) by ISC2" course isn't just another course; it's a launchpad for your success. We've tailor-made the program to ensure you not only pass your CC exam at the very first attempt but also graduate as a competent cybersecurity professional ready to make a significant impact in the field.So, why wait when your successful future in cybersecurity is just a click away? Join us today and give your career the boost it deserves. Let's conquer the world of cybersecurity together, one lesson at a time.Enrol in the "Certified in Cybersecurity (CC) by ISC2" course today. It's time to turn your cybersecurity dreams into reality. Your journey to greatness starts right here, right now!The course covers all 5 domains of the certification, which are:DOMAIN 1 - Security Principles:Understanding the CIA triad (Confidentiality, Integrity, Availability)Identifying and analysing various types of security risks and threatsUnderstanding the importance of security policies and proceduresDOMAIN 2 - Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts:Understanding the difference between business continuity and disaster recoveryDeveloping an incident response planImplementing backup and recovery proceduresDOMAIN 3 - Access Control Concepts:Understanding different types of access controls such as physical, technical and administrativeImplementing access control policies and proceduresManaging user accounts and passwordsDOMAIN 4 - Network Security:Understanding the OSI model and TCP/IP protocolsConfiguring firewalls and intrusion detection/prevention systemsIdentifying and mitigating network-based attacks such as DoS/DDoS and phishing attacksDOMAIN 5 - Security OperationsImplementing security awareness training programsUnderstanding the different types of security controls such as preventive, detective, and corrective controlsAnalysing security logs and events to identify potential security incidentsAdding to our course's exceptional design, each video tutorial is meticulously labeled with a number corresponding to a specific section of the certification syllabus. This unique feature is crafted to optimize your study experience and focus. Whether you're revisiting concepts or strengthening specific areas, this tailored numbering system allows you to navigate through the course content with ease and precision. Make your study sessions more productive, targeted, and effective with our thoughtfully structured video tutorials. Your path to mastering the cybersecurity certification just got a whole lot simpler!WHAT IS THE CERTIFIED IN CYBERSECURITY BY (ISC)² CERTIFICATION?The ISC2 CC certification is widely recognized all over the world and certifies the foundations of cybersecurity knowledge. Our practice tests have helped over 100+ students get certified and are an excellent tool for anyone looking to pursue a career in cybersecurity.EXAM DETAILS:Our Practice Tests are designed to give you a real-life experience of what the actual ISC2 CC exam will be like. The only thing that is different from the official exam is that during the exam, you won't be able to go back and review a question you previously answered as the 'back navigation' feature will be disabled.The ISC2 CC exam duration is 120 minutes, and it consists of 100 multiple-choice questions, each worth one point. You will need to score a minimum of 70 out of 100 points to pass the exam.IMPORTANT INFORMATIONOnce you pass the exam, you will need to pay an annual fee of $50 to (ISC)² to obtain your certification.If you need to retake the exam, there is a fee of $50.You can only take the exam at an authorized Pearson Vue centre.The (ISC)² training material will be accessible for a period of 180 days.Make sure to take all necessary ID with you to the examination centre, as otherwise you will not be allowed to sit the exam.Once your exam is booked, you will receive a confirmation email with details of your booking. On the day of your exam, be sure to arrive at the testing centre early with the required identification documents. Good luck!
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Important Links
Section 2: Domain 1 - Security Principles
Lecture 3 1.1 - Security Concepts
Lecture 4 1.1.2,.3.4.5 The CIA Triad
Lecture 5 1.1.6,1.1.7 - Authentication, IAAA
Lecture 6 1.1.8 Non-Repudiation
Lecture 7 1.1.9 Privacy
Lecture 8 1.2.1 Understanding Risk Management
Lecture 9 1.2.2 Understanding Risk Identification
Lecture 10 1.2.3 Understanding Risk Assessment
Lecture 11 1.2.4 Understanding Risk Treatment
Lecture 12 1.2.5 Configuration Management
Lecture 13 1.3.1 Security Controls
Lecture 14 1.3.2 Technical Controls
Lecture 15 1.3.3 Administrative Controls
Lecture 16 1.3.4 Physical Controls
Lecture 17 1.4.1 ISC2 Code of Ethics
Lecture 18 1.5.0 Governance Process
Lecture 19 1.5.1 Policies
Lecture 20 1.5.2 Procedures
Lecture 21 1.5.3 Standards
Lecture 22 1.5.4 Regulation and laws
Lecture 23 1.5.5 Best practice security policies
Section 3: Domain 2 - BC & DR & Incident Response Concepts
Lecture 24 2.1.1 Domain 2 objectives
Lecture 25 2.1.2 What is Business Continuity
Lecture 26 2.1.3 Business Continuity Planning
Lecture 27 2.1.4 Business Continuity Controls
Lecture 28 2.1.5 What is high availability
Lecture 29 2.1.6 What is fault tolerance
Lecture 30 2.2.1 What is disaster recovery
Lecture 31 2.2.2 Disaster recovery planning
Lecture 32 2.2.3 Data backup
Lecture 33 2.2.4 Types of disaster recovery sites
Lecture 34 2.3.1 What is incident response
Lecture 35 2.3.2 Create a incident response program
Lecture 36 2.3.3 Create an incident response team
Lecture 37 2.3.4 Incident communication planning
Lecture 38 2.3.5 Identify incidents
Section 4: Domain 3 - Access Control Concepts
Lecture 39 3.1.1 Domain 3 objectives
Lecture 40 3.1.2 Physical security controls types
Lecture 41 3.1.3 Monitoring physical access
Lecture 42 3.1.4 Visitors management
Lecture 43 3.1.5 Differences between Authorised and Non-authorised personnel
Lecture 44 3.2.1 What is logical access controls
Lecture 45 3.2.2 What is principle of least privilge
Lecture 46 3.2.3 What is segregation of duties
Lecture 47 3.2.4 What is DAC
Lecture 48 3.2.5 What is MAC
Lecture 49 3.2.6 What is RBAC
Section 5: Domain 4 - Network Security
Lecture 50 4.1.1 Domain Objectives
Lecture 51 4.1.2 Network types
Lecture 52 4.1.3 Introducing TCP IP
Lecture 53 4.1.4 The OSI Model
Lecture 54 4.1.5 IP Addresses and DHCP
Lecture 55 4.1.6 Network Ports
Lecture 56 4.1.7 Network Cables
Lecture 57 4.1.8 WiFi
Lecture 58 4.1.9 VLANs
Lecture 59 4.1.10 VPNs
Lecture 60 4.2.1 Types of threats
Lecture 61 4.2.2 Intrusion Detection and Prevention Systems
Lecture 62 4.2.3 Malware Preventions
Lecture 63 4.2.4 Port Scanners
Lecture 64 4.2.5 Vulnerability Scanners
Lecture 65 4.2.6 Firewalls
Lecture 66 4.2.7 Honeynets and Honeypots
Lecture 67 4.2.8 SIEM and SOAR systems
Lecture 68 4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid
Lecture 69 4.3.2 Data center protection
Lecture 70 4.3.3 Security Zones
Lecture 71 4.3.4 Routers and Switches
Lecture 72 4.3.5 VLANs and Network segmentation
Lecture 73 4.3.6 Firewalls
Lecture 74 4.3.7 VPNs and VPN Concentrator
Lecture 75 4.3.8 Internet of Things (IoT)
Lecture 76 4.3.9 Security IoT devices
Lecture 77 4.3.10 Network Security for Smart devices
Section 6: Domain 5 - Security Operations
Lecture 78 5.1.1 Domain Objectives
Lecture 79 5.1.2 What is Data and Data Security
Lecture 80 5.1.3 Understanding Encryption
Lecture 81 5.1.4 Differences between symmetric vs asymmetric cryptography
Lecture 82 5.1.5 Hashing
Lecture 83 5.1.6 Data Handling
Lecture 84 5.1.7 Data Classification
Lecture 85 5.1.8 Logging and Monitoring Security Events
Lecture 86 5.2.1 What is Configuration Management
Lecture 87 5.2.2 Patch Management
Lecture 88 5.3.1 Data Handling Policiess
Lecture 89 5.3.2 Password Policies
Lecture 90 5.3.3 Acceptable Use Policy (AUP)
Lecture 91 5.3.4 Bring Your Own Device (BYOD) Policy
Lecture 92 5.3.5 Change management
Lecture 93 5.3.6 Privacy Policy
Lecture 94 5.4.1 Social Engineering
Lecture 95 5.4.2 Security Awareness Training
Section 7: Practice Exam Questions
This course is designed for individuals who are interested in cybersecurity and are seeking to advance their knowledge and skills in this field. Specifically, this course is suitable for:,Students preparing to take the ISC2 Certified in Cybersecurity (CC) exam: This course covers the key concepts and topics that are tested on the CC exam, making it an excellent resource for students who are getting ready to take the exam.,Professionals from non-IT backgrounds: This course is also suitable for professionals from non-IT backgrounds who want to become familiar with the kind of questions on the CC exam. The course covers the basic principles and concepts of cybersecurity in a clear and concise manner, making it accessible to those without a technical background.,Anyone seeking a career in cybersecurity: This course is an excellent starting point for individuals who are interested in pursuing a career in cybersecurity. It provides a solid foundation in cybersecurity concepts and can help assess their knowledge level in the field.