Cert Prep: (ISC)2 Certified in Cybersecurity
Offered By: LinkedIn Learning
Course Description
Overview
Learn the topics needed to pass the (ICS)2 Certified in Cybersecurity (CC) exam.
Syllabus
Introduction
- Cybersecurity
- What you should know
- The CC exam
- Careers in information security
- The value of certification
- (ISC)2 code of ethics
- Confidentiality
- Integrity
- Availability
- Authentication and authorization
- Password security
- Multifactor authentication
- Non-repudiation
- Privacy
- Understanding risks
- Risk assessment
- Risk treatment
- Selecting security controls
- Configuration management
- Regulations and laws
- Security policy framework
- Best practice security policies
- Business continuity planning
- Business continuity controls
- High availability and fault tolerance
- Build an incident response program
- Create an incident response team
- Incident communications plan
- Incident identification
- Disaster recovery planning
- Backups
- Disaster recovery sites
- Test BC/DR plans
- Control physical access
- Design for physical security
- Visitor management
- Physical security personnel
- Account and privilege management
- Account monitoring
- Provisioning and deprovisioning
- Authorization
- Network types
- Introducing TCP/IP
- IP addresses and DHCP
- Network ports
- Securing wireless networks
- Wireless encryption
- Ping and traceroute
- Viruses, worms, and trojans
- Botnets
- Eavesdropping attacks
- Implementation attacks
- Intrusion detection and prevention
- Malware prevention
- Port scanners
- Vulnerability scanners
- Data center protection
- Security zones
- Routers and switches
- VLANs and network segmentation
- Firewalls
- VPNs and VPN concentrators
- Network access control
- Internet of Things
- Securing IoT devices
- Network security for smart devices
- What is the cloud?
- Cloud service categories
- Cloud deployment models
- Managed security service providers
- Manage vendor relationships
- Vendor agreements
- Understanding encryption
- Symmetric vs. asymmetric cryptography
- Hash functions
- The data lifecycle
- Data classification
- Logging and monitoring
- Social engineering
- Impersonation attacks
- Security awareness training
- Get ready for the exam!
Taught by
Mike Chapple
Related Courses
An Introduction to Computer NetworksStanford University via Independent Introduction to Internetworking with TCP/IP
openHPI Computer Networks
University of Washington via Coursera Introduction to Enterprise Computing
Marist College via Independent Introduction to Computer Networking
Stanford University via Stanford OpenEdx