Course

Certified in Cybersecurity

(ISC)²

Certified in Cybersecurity (CC) equips you with foundational knowledge essential for an entry- or junior-level cybersecurity role. The course covers cybersecurity principles, incident response, business continuity, disaster recovery, access control, network security, and security operations. Taught by industry experts, this comprehensive program ensures you understand fundamental security best practices, policies, and procedures.

Upon completing the course, you will possess a solid understanding of industry terminology, network security, security operations, and policies and procedures, signaling your readiness to take on cybersecurity responsibilities.

  • Gain foundational knowledge of industry terminology and security principles
  • Understand incident response, business continuity, and disaster recovery concepts
  • Learn about access control and its importance in strengthening organizational security
  • Explore network security, common threats, and methods to secure networks
  • Master security operations, including data security, encryption, and security awareness

Certificate Available ✔

Get Started / More Info
Certified in Cybersecurity
Course Modules

The Certified in Cybersecurity (CC) course comprises five modules that cover cybersecurity principles, incident response, access control, network security, and security operations. These modules provide essential knowledge and skills for those looking to enter the cybersecurity field.

Security Principles

Welcome to the Security Principles module. This segment introduces foundational concepts of cybersecurity principles, information assurance, risk management, security controls, and governance elements. Participants will gain an understanding of (ISC)2 Code of Ethics and its application, preparing them for the Certified in Cybersecurity entry-level exam.

Incident Response, BC, and DR Concepts

Join the Incident Response, BC, and DR Concepts module to explore the significance of incident response, business continuity, and disaster recovery plans. Learn how organizations respond to unplanned disruptions and maintain operational continuity. This module equips participants with critical knowledge for handling cybersecurity incidents and ensuring organizational resilience.

Access Control Concepts

Access Control Concepts delves into the types of access control, including physical and logical controls, essential for strengthening organizational security. Participants will learn to select and apply appropriate access controls in various scenarios, enhancing their ability to contribute effectively to cybersecurity efforts.

Network Security

The Network Security module focuses on securing computer networking, understanding common threats and attacks, and identifying tools to prevent network vulnerabilities. Participants will gain insight into network security infrastructure, terminology, and secure design principles, vital for safeguarding organizational networks from cyber threats.

Security Operations

Explore Security Operations to understand day-to-day security controls, data handling best practices, encryption, configuration management, and security awareness training. This module emphasizes the active use of security controls and risk mitigation strategies, preparing participants for effective cybersecurity operations.

More Security Courses

Splunk Knowledge Manager

Splunk Inc.

The Splunk Knowledge Manager course equips learners with the skills to create and manage knowledge objects, interpret data, and build dashboards for enhanced data...

Implementing a Risk Management Framework

University System of Georgia

This course explores the career path and responsibilities of a Chief Information Security Officer. It covers the journey from entry-level IT or security roles to...

Planning, Auditing and Maintaining Enterprise Systems

University of Colorado System

Planning, Auditing and Maintaining Enterprise Systems equips learners with the skills to design and construct organizational policies based on requirements, audit...

Laravel: Configure, Validate, Authenticate and Authorize

Infosec

Laravel: Configure, Validate, Authenticate and Authorize equips you with essential skills to secure your Laravel application through proper configuration, validation,...