Cert Prep: (ISC)2 Certified in Cybersecurity
Offered By: LinkedIn Learning
Course Description
Overview
Learn the topics needed to pass the (ICS)2 Certified in Cybersecurity (CC) exam.
Syllabus
Introduction
- Cybersecurity
- What you should know
- The CC exam
- Careers in information security
- The value of certification
- (ISC)2 code of ethics
- Confidentiality
- Integrity
- Availability
- Authentication and authorization
- Password security
- Multifactor authentication
- Non-repudiation
- Privacy
- Understanding risks
- Risk assessment
- Risk treatment
- Selecting security controls
- Configuration management
- Regulations and laws
- Security policy framework
- Best practice security policies
- Business continuity planning
- Business continuity controls
- High availability and fault tolerance
- Build an incident response program
- Create an incident response team
- Incident communications plan
- Incident identification
- Disaster recovery planning
- Backups
- Disaster recovery sites
- Test BC/DR plans
- Control physical access
- Design for physical security
- Visitor management
- Physical security personnel
- Account and privilege management
- Account monitoring
- Provisioning and deprovisioning
- Authorization
- Network types
- Introducing TCP/IP
- IP addresses and DHCP
- Network ports
- Securing wireless networks
- Wireless encryption
- Ping and traceroute
- Viruses, worms, and trojans
- Botnets
- Eavesdropping attacks
- Implementation attacks
- Intrusion detection and prevention
- Malware prevention
- Port scanners
- Vulnerability scanners
- Data center protection
- Security zones
- Routers and switches
- VLANs and network segmentation
- Firewalls
- VPNs and VPN concentrators
- Network access control
- Internet of Things
- Securing IoT devices
- Network security for smart devices
- What is the cloud?
- Cloud service categories
- Cloud deployment models
- Managed security service providers
- Manage vendor relationships
- Vendor agreements
- Understanding encryption
- Symmetric vs. asymmetric cryptography
- Hash functions
- The data lifecycle
- Data classification
- Logging and monitoring
- Social engineering
- Impersonation attacks
- Security awareness training
- Get ready for the exam!
Taught by
Mike Chapple
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network