Companies Home Search Profile

(ISC)2 Certified in Cybersecurity (CC) Cert Prep

Focused View

Mike Chapple

4:52:38

122 View
  • 01 - Cybersecurity.mp4
    01:46
  • 02 - What you should know.mp4
    00:34
  • 01 - The ELCC exam.mp4
    02:19
  • 02 - Careers in information security.mp4
    03:45
  • 03 - The value of certification.mp4
    03:13
  • 04 - (ISC)2 Code of ethics.mp4
    01:44
  • 01 - Confidentiality.mp4
    04:17
  • 02 - Integrity.mp4
    03:03
  • 03 - Availability.mp4
    02:58
  • 04 - Authentication and authorization.mp4
    03:38
  • 05 - Password security.mp4
    03:21
  • 06 - Multifactor authentication.mp4
    04:21
  • 07 - Non-repudiation.mp4
    01:29
  • 08 - Privacy.mp4
    03:59
  • 01 - Understanding risks.mp4
    02:55
  • 02 - Risk assessment.mp4
    05:17
  • 03 - Risk treatment.mp4
    04:19
  • 04 - Selecting security controls.mp4
    05:17
  • 05 - Configuration management.mp4
    02:32
  • 01 - Regulations and laws.mp4
    02:00
  • 02 - Security policy framework.mp4
    03:50
  • 03 - Best practice security policies.mp4
    03:16
  • 01 - Business continuity planning.mp4
    03:18
  • 02 - Business continuity controls.mp4
    03:40
  • 03 - High availability and fault tolerance.mp4
    05:33
  • 01 - Build an incident response program.mp4
    04:21
  • 02 - Create an incident response team.mp4
    02:15
  • 03 - Incident communications plan.mp4
    02:35
  • 04 - Incident identification.mp4
    04:00
  • 01 - Disaster recovery planning.mp4
    04:36
  • 02 - Backups.mp4
    04:17
  • 03 - Disaster recovery sites.mp4
    03:30
  • 04 - Test BCDR plans.mp4
    03:09
  • 01 - Control physical access.mp4
    02:54
  • 02 - Design for physical security.mp4
    02:20
  • 03 - Visitor management.mp4
    01:33
  • 04 - Physical security personnel.mp4
    02:16
  • 01 - Account and privilege management.mp4
    02:48
  • 02 - Account monitoring.mp4
    03:27
  • 03 - Provisioning and deprovisioning.mp4
    03:44
  • 04 - Authorization.mp4
    04:08
  • 01 - Network types.mp4
    04:01
  • 02 - Introducing TCPIP.mp4
    06:08
  • 03 - IP addresses and DHCP.mp4
    04:06
  • 04 - Network ports.mp4
    03:28
  • 05 - Securing wireless networks.mp4
    04:02
  • 06 - Wireless encryption.mp4
    02:57
  • 07 - Ping and traceroute.mp4
    06:06
  • 01 - Viruses, worms, and trojans.mp4
    04:14
  • 02 - Botnets.mp4
    02:56
  • 03 - Eavesdropping attacks.mp4
    04:07
  • 04 - Implementation attacks.mp4
    01:38
  • 01 - Intrusion detection and prevention.mp4
    05:14
  • 02 - Malware prevention.mp4
    03:15
  • 03 - Port scanners.mp4
    02:59
  • 04 - Vulnerability scanners.mp4
    02:11
  • 01 - Data center protection.mp4
    05:16
  • 02 - Security zones.mp4
    03:54
  • 03 - Routers and switches.mp4
    02:56
  • 04 - VLANs and network segmentation.mp4
    02:19
  • 05 - Firewalls.mp4
    06:20
  • 06 - VPNs and VPN concentrators.mp4
    04:41
  • 07 - Network access control.mp4
    04:36
  • 08 - Internet of Things.mp4
    03:05
  • 09 - Securing IoT devices.mp4
    03:08
  • 10 - Network security for smart devices.mp4
    01:58
  • 01 - What is the cloud.mp4
    03:52
  • 02 - Cloud service categories.mp4
    03:04
  • 03 - Cloud deployment models.mp4
    02:58
  • 04 - Managed security service providers.mp4
    02:36
  • 05 - Manage vendor relationships.mp4
    04:20
  • 06 - Vendor agreements.mp4
    04:17
  • 01 - Understanding encryption.mp4
    03:11
  • 02 - Symmetric vs. asymmetric cryptography.mp4
    03:50
  • 03 - Hash functions.mp4
    07:34
  • 04 - The data lifecycle.mp4
    04:42
  • 05 - Data classification.mp4
    02:41
  • 06 - Logging and monitoring.mp4
    03:34
  • 01 - Social engineering.mp4
    05:36
  • 02 - Impersonation attacks.mp4
    05:06
  • 03 - Security awareness training.mp4
    04:41
  • 01 - Get ready for the exam.mp4
    00:44
  • Description


    Considering a career in cybersecurity? The good news is that almost every company today has a need for more cybersecurity staff, and the (ISC)² Certified in Cybersecurity (CC) exam is an excellent starting point for a career in cybersecurity. In this course, instructor Mike Chapple shares all the cybersecurity knowledge you need to know to pass the exam, gives you an insider’s view of the test, and covers topics like the value of the certification and career tracks in cybersecurity.

    Note: This course was created by Mike Chapple. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 82
    • duration 4:52:38
    • Release Date 2023/01/04