09-05-2023, 09:33 AM
Certified In Cybersecurity 2023 - Isc2-Cc Complete Training
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.18 GB | Duration: 6h 6m
The most complete and holisitc CC Training
What you'll learn
Security Principles
Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
Access Controls Concepts
Network Security
Security Operations
Requirements
No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
Description
At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectivesWhy training with us is ideal for you?- Excellent quality video content- High courses quality- Organized materials- Real life scenarios and examples- Practice questions and questions ideas- Up to date content- Instructor is available to answer all questions you might get- Reasonable pricingAbout this courseThe CC training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:The course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.Additional NotesCourse Requirements:No requirements Certification:Upon completion of the course, you will be eligible to sit for the CC certification exam. The exam is administered by ISC2 Enroll in the CC training course today and take the first step towards becoming a certified in cybersecurity!
Overview
Section 1: Course Introduction
Lecture 1 About Instructor
Lecture 2 How to Ask Questions
Lecture 3 Rating the Course
Section 2: Domain 1 : Security Principles - 26% - 20 Questions in the Exam
Lecture 4 CIA Triad and Security Objectives
Lecture 5 Privacy
Lecture 6 Risk Management Overview
Lecture 7 Risk Analaysis
Lecture 8 Types of Risk
Lecture 9 Risk Response
Lecture 10 Risk Monitoring
Lecture 11 Security Controls
Lecture 12 Security Controls Examples
Lecture 13 Defense in Depth
Lecture 14 ISC2 Code of Ethics
Lecture 15 Governance Overview
Lecture 16 Information Security Governance
Lecture 17 Policies
Lecture 18 Policies Examples
Lecture 19 Acceptable use policy
Lecture 20 Clear Desk Policy
Lecture 21 Standards
Lecture 22 Procedures and Guidelines
Lecture 23 Laws and Regulations in Cybersecurity
Section 3: Domain 2 : Business Continuity (BC), Disaster Recovery (DR) & Incident Response
Lecture 24 Cyber Threats
Lecture 25 Cyber Attacks 1
Lecture 26 Cyber Attacks 2
Lecture 27 Cyber Kill Chain
Lecture 28 Incident Response Overview
Lecture 29 Forensic Investigation
Lecture 30 Incident Response Testing
Lecture 31 Disasters and Business Impact Assessment
Lecture 32 Disaster Recovery Plan
Lecture 33 Business Continuity Plan
Lecture 34 Considerations for Effective DRP and BCP
Lecture 35 RPO and RTO
Lecture 36 AIW, SDO, MTO
Lecture 37 Relations between RPO, RTO, AIW and SDO
Lecture 38 Recovery Sites
Lecture 39 Testing and evaluating the continuity Plan
Lecture 40 Backup and Recovery
Lecture 41 Types of Data Backup and Buidling Backup Strategy
Lecture 42 Database resillency
Lecture 43 Types of Storage Devices
Lecture 44 Storage resillency
Lecture 45 IT System Basic Components
Lecture 46 Application Architecture overview
Security analysts and Managers,Students who need to gain understanding,People who are interested in pursuing this certification,IT Manager, and Analysts,Auditors and Risk practitioners,Anyone interested in the subject of the training
KatFile Link(s)
RapidGator Link(s)