Companies Home Search Profile

(ISC)² CC Online Training

Focused View

Bob Salmans

8:24:23

95 View
  • 1. Understanding Information Assurance - .mp4
    16:17
  • 2. Methods of Authentication - .mp4
    11:01
  • 3. Multi-Factor Authentication (MFA) - .mp4
    06:31
  • 4. Biometrics Factors - .mp4
    04:54
  • 5. Data Privacy - -1.mp4
    07:43
  • 1. Risk Management - .mp4
    08:31
  • 2. Risk Treatment - .mp4
    06:17
  • 3. Security Controls - .mp4
    08:18
  • 4. Security Control Categories - -1.mp4
    07:24
  • 5. ISC2 Code of Ethics - .mp4
    04:57
  • 6. Policies and Procedures - .mp4
    07:31
  • 7. Standards, Regulations and Laws - .mp4
    05:34
  • 1. Intro - .mp4
    03:31
  • 2. Business Continuity - .mp4
    03:45
  • 3. Business Continuity Planning - .mp4
    09:34
  • 4. Disaster Recovery - .mp4
    04:14
  • 5. Disaster Recovery Planning - .mp4
    08:15
  • 6. Incident Response - .mp4
    11:20
  • 7. After Action and Training - .mp4
    06:01
  • 1. Physical Security Controls - .mp4
    05:34
  • 2. Monitoring Controls - .mp4
    07:44
  • 3. Authorized Personnel vs Unauthorized Personnel - .mp4
    05:33
  • 4. Principle of Least Privilege - .mp4
    06:26
  • 5. Segregation of Duties - -1.mp4
    05:53
  • 6. Types of Access Control - .mp4
    09:24
  • 7. Data and Media Access Control - .mp4
    09:02
  • 1. Data Handling Policy - .mp4
    07:12
  • 2. Password Policy - .mp4
    05:06
  • 3. Acceptable Use Policy - .mp4
    05:58
  • 4. Bring Your Own Device (BYOD) Policy - .mp4
    06:47
  • 5. Change Management Policy - .mp4
    05:45
  • 6. Privacy Policy - .mp4
    08:32
  • 7. Security Awareness Training - .mp4
    11:56
  • 1. Encryption Basics - .mp4
    03:30
  • 2. Types of Encryption - .mp4
    11:21
  • 3. Data Hashing with Encryption - .mp4
    06:49
  • 4. Digital Signatures with Hashing - .mp4
    04:47
  • 5. Data Handling - .mp4
    08:53
  • 6. Data Logging - .mp4
    06:19
  • 7. Configuration Management - .mp4
    10:28
  • 1. Network Segmentation - -1.mp4
    11:38
  • 2. Embedded System Security - .mp4
    06:59
  • 3. Virtual Private Networks (VPNs) - .mp4
    05:26
  • 4. Defense In Depth and Zero Trust - -1.mp4
    06:48
  • 5. Network Access Control (NAC) - .mp4
    03:50
  • 6. SLAs and MSPs - .mp4
    07:26
  • 7. The Cloud - .mp4
    09:27
  • 1. Types of Threats - DoS, DDoS and Malware - .mp4
    08:07
  • 2. Types of Threats - Main-in-the-middle and Side Channel - .mp4
    04:34
  • 3. Intrusion Detection Prevention Systems (IDSIPS) - .mp4
    12:48
  • 4. Endpoint Protection and Management - .mp4
    06:57
  • 5. Vulnerability Scanning - .mp4
    11:14
  • 6. Firewalls - .mp4
    11:42
  • 1. Computer Networking Basics - .mp4
    06:51
  • 2. OSI Model - .mp4
    05:00
  • 3. TCPIP Model - .mp4
    09:20
  • 4. IP Addresses - .mp4
    10:44
  • 5. Wireless Networking - .mp4
    03:54
  • 6. Networking Ports - .mp4
    09:29
  • 7. Common Applications - .mp4
    07:36
  • 1. Power - .mp4
    14:41
  • 2. Data Centers and Closets - .mp4
    06:51
  • 3. Heating, Ventilation and Air Conditioning (HVAC).mp4
    09:45
  • 4. Dealing with Fire - .mp4
    06:21
  • 5. Redundancy - .mp4
    09:17
  • 6. Working with 3rd Parties - .mp4
    03:01
  • Description


    This entry-level (ISC)² CC training prepares learners to perform the basic and essential tasks of an entry-level cybersecurity analyst without supervision or guidance.

    (ISC)2 is already one of the most respected professional organizations in the IT training world for cybersecurity professionals who need to demonstrate their competency with advanced security techniques and technologies. Their new Certified in Cybersecurity certification is an ideal starting point for someone early in their career.

    More details


    This Certified in Cybersecurity training prepares you for the foundational (ISC)2 certification, which is a valuable tool for proving your general familiarity with the tech you'll often use on a daily basis.

    Once you're done with this (ISC)² training, you'll know how to perform the basic and essential tasks of an entry-level cybersecurity analyst without supervision or guidance.

    For anyone who manages cybersecurity specialists, this (ISC)² training can be used to onboard new cybersecurity specialists, curated into individual or team training plans, or as a (ISC)² reference resource.

    (ISC)² CC: What You Need to Know

    This (ISC)² CC training covers cybersecurity topics including:

    • Foundational cybersecurity principles
    • Basics of cybersecurity technologies and devices
    • Steps of incident response and disaster recovery
    • The role cybersecurity plays in business continuity

    Who Should Take (ISC)² CC Training?

    This (ISC)² CC training is considered foundational-level (ISC)² training, which means it was designed for cybersecurity specialists. This cybersecurity skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced cybersecurity specialists looking to validate their (ISC)² skills.

    New or aspiring cybersecurity specialists. Every brand new cybersecurity specialist needs somewhere to start. The Certified in Cybersecurity cert from (ISC)2 strives to be the ground-floor, entry-level introduction that can prove to employers that although you don't have a lot of experience, you do have the knowledge and familiarity you need to get started in your first position.

    Experienced cybersecurity specialists. A cybersecurity specialist who already has several years of experience may be overqualified to try for the Certified in Cybersecurity certification. However, if you've struggled to land a new, more advanced job, earning this certification from (ISC)2 could validate your experience and knowledge and prove your readiness for a new position.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    I love seeing and helping people advance through life. It's my small part in contributing to the advancement of the security community.

    Bob got his start in IT after enlisting in the United States Navy and being assigned to a network engineer role. He brings seven years of IT training experience to CBT Nuggets along with over 20 years of IT experience. Bob was a security team lead for a managed services provider before joining CBTN. In his spare time, he enjoys spending time with his family, cooking, and metal and woodworking.

    Certifications: Microsoft MCSE, Cisco CCNP, Cisco CCDP, Cisco CCNA Security, CISSP, CCSP, GPEN, CISA, CISM, CompTIA Security+, CompTIA CySA+, CompTIA Pentest+

    Areas of expertise: Information security, networking, active directory, Linux

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 66
    • duration 8:24:23
    • Release Date 2023/08/01