FREE - Official ISC2 CC Online Self-Paced Training (1 million users)

FREE - Official ISC2 CC Online Self-Paced Training (1 million users)

Course Type:

Online Self-Paced

Complete autonomy to learn on your schedule, at your pace through an engaging learning experience.

Language:

Course content is offered in English.

Course Summary:

Through an engaging self-paced learning experience this course covers the content tested in ISC2’s entry-level Certified in Cybersecurity (CC) exam helping to build a solid foundation of knowledge tested on the exam and needed to be successful in an entry-level cybersecurity role.

  • ? Security Principles
  • ? Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
  • ? Access Control Concepts
  • ? Network Security
  • ? Security Operations

Who Should Take this Course:

Students, prospective employees, entry-level professionals and career-changers wishing to start their path toward cybersecurity leadership by taking the ISC2’s Certified in Cybersecurity (CC) exam. There are no prerequisites for this program.

Course Includes:

  • ? Pre and post course assessments
  • ? Knowledge checks and end of chapter quizzes
  • ? Applied scenario
  • ? Interactive content
  • ? Voices from the Field podcasts
  • ? Chapter by chapter study sheets with key points, terms and definitions
  • ? Email content support
  • ? Online interactive flash cards
  • ? Glossary of Terms
  • ? 24x7x365 chat technical support
  • ? 180 day access

What to Expect:

Learners can expect an engaging and interactive approach to learning that allows the opportunity to learn at their own pace and time. To broaden the understanding of material, content will be taught through a series instructional content, application quizzes, expert perspectives and a recurring scenario-based activity providing real world application of concepts.

Course Learning Objectives:

At the end of this course, learners will be able to:

  • ? Discuss the foundational concepts of cybersecurity principles.?
  • ? Recognize foundational security concepts of information assurance.??
  • ? Define risk management terminology and summarize the process.??
  • ? Relate risk management to personal or professional practices.??
  • ? Classify types of security controls.??
  • ? Distinguish between policies, procedures, standards, regulations and laws.??
  • ? Demonstrate the relationship among governance elements.??
  • ? Analyze appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples.??
  • ? Practice the terminology of and review security policies.??
  • ? Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.??
  • ? Recall the terms and components of incident response.??
  • ? Summarize the components of a business continuity plan.??
  • ? Identify the components of disaster recovery.??
  • ? Practice the terminology and review concepts of business continuity, disaster recovery and incident response.??
  • ? Select access controls that are appropriate in a given scenario.??
  • ? Relate access control concepts and processes to given scenarios.??
  • ? Compare various physical access controls.??
  • ? Describe logical access controls.??
  • ? Practice the terminology and review concepts of access controls.??
  • ? Explain the concepts of network security.??
  • ? Recognize common networking terms and models.??
  • ? Identify common protocols and port and their secure counterparts.??
  • ? Identify types of network (cyber) threats and attacks.??
  • ? Discuss common tools used to identify and prevent threats.??
  • ? Identify common data center terminology.??
  • ? Recognize common cloud service terminology.??
  • ? Identify secure network design terminology.??
  • ? Practice the terminology and review concepts of network security.??
  • ? Explain concepts of security operations.??
  • ? Discuss data handling best practices.??
  • ? Identify key concepts of logging and monitoring.??
  • ? Summarize the different types of encryption and their common uses.??
  • ? Describe the concepts of configuration management.??
  • ? Explain the application of common security policies.??
  • ? Discuss the importance of security awareness training.??
  • ? Practice the terminology and review concepts of network operations.? ?

Note: Chapter learning objectives provided below.

Chapters Covered in this Course:

Chapter 1: Security Principles

  • ? Module 1: Understand the Security Concepts of Information Assurance
  • ? Module 2: Understand the Risk Management Process
  • ? Module 3: Understand Security Controls
  • ? Module 4: Understand Governance Elements and Processes
  • ? Module 5: Understand ISC2 Code of Ethics

Chapter 2: Incident Response, Business Continuity and Disaster Recovery Concepts

  • ? Module 1: Understand Incident Response
  • ? Module 2: Understand Business Continuity
  • ? Module 3: Understand Disaster Recovery

Chapter 3: Access Controls Concepts

  • ? Module 1: Understand Access Control Concepts
  • ? Module 2: Understand Physical Access Controls
  • ? Module 3: Understand Logical Access Controls

Chapter 4: Network Security

  • ? Module 1: Understand Computer Networking
  • ? Module 2: Understand Network (Cyber) Threats and Attacks
  • ? Module 3: Understand Network Security Infrastructure

Chapter 5: Security Operations

  • ? Module 1: Understand Data Security
  • ? Module 2: Understand System Hardening
  • ? Module 3: Understand Best Practice Security Policies
  • ? Module 4: Understand Security Awareness Training

Course Conclusion

Note: Throughout this course, exam domains may be covered in several chapters. Included in the course is a table indicating where the exam outline objectives are covered in this course. Unique icons are also used through the course materials to identify exam outline objectives.

Technology Requirements:

The following are system requirements needed to enhance your overall learning experience.

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.

Hardware Specifications

  • ? Processor 2 GHz +
  • ? RAM 4 GB +
  • ? Monitor minimum resolution (1024 x 768)
  • ? Video Card
  • ? Keyboard and Mouse or other assistive technology

Computer Peripherals

  • ? Speakers/Headphones – (Noise-cancelling headset is recommended)
  • ? Microphone
  • ? Camera (recommended)

Supported Operating Systems

  • ? Macintosh OS X 10.10 to present
  • ? Windows 10 to present

Supported Browsers

  • ? Google Chrome
  • ? Microsoft Edge
  • ? Mozilla Firefox

Application Software

Requirements for Completion:

In order to complete the course, receive a certificate of completion and earn ISC2 continuing professional education (CPE) credits, learners must:

  • ? Complete all learning activities within the course.
  • ? Complete a course evaluation.

Certificate of Completion:

An electronic Certificate of Completion will be provided once you have completed the course by meeting all the requirements. We recommend that you download and retain the certificate of completion as proof of credits earned.

To download a PDF version of the certificate, go to the "Awards" tab of ISC2 Learn (top menu), select the course and then "Generate Certificate."

Cancellation Policy:

Refunds for any ISC2 courses will not be provided.

Access Period:

Access to course content: 180 days.

URL:

https://www.isc2.org/landing/1mcc

ISC2 Candidate Benefits

Exclusive Resources and Discounts

Congratulations on taking this exciting step toward a rewarding career in cybersecurity by becoming an ISC2 Candidate!

As an ISC2 Candidate, you have access to a full spectrum of benefits and resources that enable you to expand your skillset and set you up for career success, including:

  • A digital badge
  • Professional development and training
  • Volunteer opportunities
  • Peer-to-peer networking and exchange of best practices
  • ISC2 Security Congress annual conference

  • Professional recognition and award programs
  • Industry events
  • Discounted learning resources
  • Free education and exam for Certified in Cybersecurity? certification as part of One Million Certified in Cybersecurity initiativePrep for Certified in Cybersecurity certification at your own paceAs part of our commitment to help close the cybersecurity workforce gap and diversify those working in the field, ISC2 is offering FREE Certified in Cybersecurity (CC) Online Self-Paced Training and exams to one million people. Don’t miss out on this opportunity to demonstrate to employers you have the foundational knowledge and skills necessary for an entry- or junior-level cybersecurity role.

Already Enrolled?

If you’ve already enrolled in this free training, simply click on “My Courses” on the top of this screen and you’ll be directed to ISC2 Learn to continue where you left off.

Claim your free Official ISC2 Online Self-Paced CC Training now.

Train at your own pace through an engaging learning experience to build a solid foundation of knowledge tested on the CC exam.

  • 180-day access to course content*
  • 14 hours of content
  • Pre- and post-course assessments
  • Knowledge checks and end-of-chapter study sheets and quizzes
  • Interactive content with applied scenarios and podcasts
  • Online interactive flashcardsPrep for Certified in Cybersecurity certification at your own paceAs part of our commitment to help close the cybersecurity workforce gap and diversify those working in the field, ISC2 is offering FREE Certified in Cybersecurity (CC) Online Self-Paced Training and exams to one million people. Don’t miss out on this opportunity to demonstrate to employers you have the foundational knowledge and skills necessary for an entry- or junior-level cybersecurity role.

Already Enrolled?

If you’ve already enrolled in this free training, simply click on “My Courses” on the top of this screen and you’ll be directed to ISC2 Learn to continue where you left off.



Muhammed Tharique

Cyber security analyst level 1

5 个月

I am interested. so how can I start the traing?

要查看或添加评论,请登录

社区洞察

其他会员也浏览了