Companies Home Search Profile

(ISC)2 Certified in Cybersecurity (CC) Cert Prep

Focused View

Mike Chapple

4:52:39

194 View
  • 01.01-cybersecurity.mp4
    01:46
  • 01.02-what_you_should_know.mp4
    00:34
  • 02.01-the_elcc_exam.mp4
    02:19
  • 02.02-careers_in_information_security.mp4
    03:45
  • 02.03-the_value_of_certification.mp4
    03:13
  • 02.04-(isc)2_code_of_ethics.mp4
    01:44
  • 03.01-confidentiality.mp4
    04:17
  • 03.02-integrity.mp4
    03:03
  • 03.03-availability.mp4
    02:58
  • 03.04-authentication_and_authorization.mp4
    03:38
  • 03.05-password_security.mp4
    03:21
  • 03.06-multifactor_authentication.mp4
    04:21
  • 03.07-non-repudiation.mp4
    01:29
  • 03.08-privacy.mp4
    03:59
  • 04.01-understanding_risks.mp4
    02:55
  • 04.02-risk_assessment.mp4
    05:17
  • 04.03-risk_treatment.mp4
    04:19
  • 04.04-selecting_security_controls.mp4
    05:17
  • 04.05-configuration_management.mp4
    02:32
  • 05.01-regulations_and_laws.mp4
    02:00
  • 05.02-security_policy_framework.mp4
    03:50
  • 05.03-best_practice_security_policies.mp4
    03:16
  • 06.01-business_continuity_planning.mp4
    03:18
  • 06.02-business_continuity_controls.mp4
    03:40
  • 06.03-high_availability_and_fault_tolerance.mp4
    05:33
  • 07.01-build_an_incident_response_program.mp4
    04:21
  • 07.02-create_an_incident_response_team.mp4
    02:15
  • 07.03-incident_communications_plan.mp4
    02:35
  • 07.04-incident_identification.mp4
    04:00
  • 08.01-disaster_recovery_planning.mp4
    04:36
  • 08.02-backups.mp4
    04:17
  • 08.03-disaster_recovery_sites.mp4
    03:30
  • 08.04-test_bcdr_plans.mp4
    03:09
  • 09.01-control_physical_access.mp4
    02:54
  • 09.02-design_for_physical_security.mp4
    02:20
  • 09.03-visitor_management.mp4
    01:33
  • 09.04-physical_security_personnel.mp4
    02:16
  • 10.01-account_and_privilege_management.mp4
    02:48
  • 10.02-account_monitoring.mp4
    03:27
  • 10.03-provisioning_and_deprovisioning.mp4
    03:44
  • 10.04-authorization.mp4
    04:08
  • 11.01-network_types.mp4
    04:01
  • 11.02-introducing_tcpip.mp4
    06:08
  • 11.03-ip_addresses_and_dhcp.mp4
    04:06
  • 11.04-network_ports.mp4
    03:28
  • 11.05-securing_wireless_networks.mp4
    04:02
  • 11.06-wireless_encryption.mp4
    02:57
  • 11.07-ping_and_traceroute.mp4
    06:06
  • 12.01-viruses_worms_and_trojans.mp4
    04:14
  • 12.02-botnets.mp4
    02:56
  • 12.03-eavesdropping_attacks.mp4
    04:07
  • 12.04-implementation_attacks.mp4
    01:38
  • 13.01-intrusion_detection_and_prevention.mp4
    05:14
  • 13.02-malware_prevention.mp4
    03:15
  • 13.03-port_scanners.mp4
    02:59
  • 13.04-vulnerability_scanners.mp4
    02:11
  • 14.01-data_center_protection.mp4
    05:16
  • 14.02-security_zones.mp4
    03:54
  • 14.03-routers_and_switches.mp4
    02:56
  • 14.04-vlans_and_network_segmentation.mp4
    02:19
  • 14.05-firewalls.mp4
    06:20
  • 14.06-vpns_and_vpn_concentrators.mp4
    04:41
  • 14.07-network_access_control.mp4
    04:36
  • 14.08-internet_of_things.mp4
    03:06
  • 14.09-securing_iot_devices.mp4
    03:08
  • 14.10-network_security_for_smart_devices.mp4
    01:58
  • 15.01-what_is_the_cloud.mp4
    03:52
  • 15.02-cloud_service_categories.mp4
    03:04
  • 15.03-cloud_deployment_models.mp4
    02:58
  • 15.04-managed_security_service_providers.mp4
    02:36
  • 15.05-manage_vendor_relationships.mp4
    04:20
  • 15.06-vendor_agreements.mp4
    04:17
  • 16.01-understanding_encryption.mp4
    03:11
  • 16.02-symmetric_vs._asymmetric_cryptography.mp4
    03:50
  • 16.03-hash_functions.mp4
    07:34
  • 16.04-the_data_lifecycle.mp4
    04:42
  • 16.05-data_classification.mp4
    02:41
  • 16.06-logging_and_monitoring.mp4
    03:34
  • 17.01-social_engineering.mp4
    05:36
  • 17.02-impersonation_attacks.mp4
    05:06
  • 17.03-security_awareness_training.mp4
    04:41
  • 18.01-get_ready_for_the_exam.mp4
    00:44
  • Description


    Considering a career in cybersecurity? The good news is that almost every company today has a need for more cybersecurity staff, and the (ISC)² Certified in Cybersecurity (CC) exam is an excellent starting point for a career in cybersecurity. In this course, instructor Mike Chapple shares all the cybersecurity knowledge you need to know to pass the exam, gives you an insider’s view of the test, and covers topics like the value of the certification and career tracks in cybersecurity.

    Note: This course was created by Mike Chapple. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Mike Chapple
    Mike Chapple
    Instructor's Courses
    Cybersecurity and analytics educator and leader with over 20 years of experience in government, the private sector and higher education. Author of over 30 books, including best-selling study guides from Wiley covering the CISSP, Security+, CISM, CySA+, CIPP/US, and PenTest+ exams. Creator of over 100 cybersecurity and business analytics video courses on LinkedIn Learning.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 82
    • duration 4:52:39
    • Release Date 2023/01/31