Companies Home Search Profile

The Complete Certified in Cybersecurity (CC) course ISC2 '23

Focused View

Thor Pedersen | 370,000+ Enrollments Worldwide,ThorTeaches.com LLC

5:45:27

45 View
  • 1.1 CC Study Guide by TechSerks.pdf
  • 1. Introduction.mp4
    05:15
  • 2. Important Links.html
  • 1. 1.1 - Security Concepts.mp4
    01:07
  • 2. 1.1.2,.3.4.5 The CIA Triad.mp4
    07:15
  • 3. 1.1.6,1.1.7 - Authentication, IAAA.mp4
    11:34
  • 4. 1.1.8 Non-Repudiation.mp4
    04:51
  • 5. 1.1.9 Privacy.mp4
    04:40
  • 6. 1.2.1 Understanding Risk Management.mp4
    02:09
  • 7. 1.2.2 Understanding Risk Identification.mp4
    02:44
  • 8. 1.2.3 Understanding Risk Assessment.mp4
    03:20
  • 9. 1.2.4 Understanding Risk Treatment.mp4
    02:02
  • 10. 1.2.5 Configuration Management.mp4
    03:03
  • 11. 1.3.1 Security Controls.mp4
    02:17
  • 12. 1.3.2 Technical Controls.mp4
    03:06
  • 13. 1.3.3 Administrative Controls.mp4
    02:49
  • 14. 1.3.4 Physical Controls.mp4
    02:48
  • 15. 1.4.1 ISC2 Code of Ethics.mp4
    02:18
  • 16. 1.5.0 Governance Process.mp4
    02:58
  • 17. 1.5.1 Policies.mp4
    02:55
  • 18. 1.5.2 Procedures.mp4
    02:11
  • 19. 1.5.3 Standards.mp4
    03:41
  • 20. 1.5.4 Regulation and laws.mp4
    02:44
  • 21. 1.5.5 Best practice security policies.mp4
    02:41
  • 1. 2.1.1 Domain 2 objectives.mp4
    01:31
  • 2. 2.1.2 What is Business Continuity.mp4
    01:30
  • 3. 2.1.3 Business Continuity Planning.mp4
    02:28
  • 4. 2.1.4 Business Continuity Controls.mp4
    02:07
  • 5. 2.1.5 What is high availability.mp4
    05:42
  • 6. 2.1.6 What is fault tolerance.mp4
    02:03
  • 7. 2.2.1 What is disaster recovery.mp4
    01:43
  • 8. 2.2.2 Disaster recovery planning.mp4
    02:43
  • 9. 2.2.3 Data backup.mp4
    09:25
  • 10. 2.2.4 Types of disaster recovery sites.mp4
    04:59
  • 11. 2.3.1 What is incident response.mp4
    02:24
  • 12. 2.3.2 Create a incident response program.mp4
    03:42
  • 13. 2.3.3 Create an incident response team.mp4
    05:18
  • 14. 2.3.4 Incident communication planning.mp4
    03:52
  • 15. 2.3.5 Identify incidents.mp4
    04:58
  • 1. 3.1.1 Domain 3 objectives.mp4
    01:12
  • 2. 3.1.2 Physical security controls types.mp4
    03:53
  • 3. 3.1.3 Monitoring physical access.mp4
    03:26
  • 4. 3.1.4 Visitors management.mp4
    02:25
  • 5. 3.1.5 Differences between Authorised and Non-authorised personnel.mp4
    05:21
  • 6. 3.2.1 What is logical access controls.mp4
    02:29
  • 7. 3.2.2 What is principle of least privilge.mp4
    01:51
  • 8. 3.2.3 What is segregation of duties.mp4
    02:17
  • 9. 3.2.4 What is DAC.mp4
    01:44
  • 10. 3.2.5 What is MAC.mp4
    02:13
  • 11. 3.2.6 What is RBAC.mp4
    02:19
  • 1. 4.1.1 Domain Objectives.mp4
    04:00
  • 2. 4.1.2 Network types.mp4
    02:58
  • 3. 4.1.3 Introducing TCP IP.mp4
    03:31
  • 4. 4.1.4 The OSI Model.mp4
    14:33
  • 5. 4.1.5 IP Addresses and DHCP.mp4
    05:19
  • 6. 4.1.6 Network Ports.mp4
    03:57
  • 7. 4.1.7 Network Cables.mp4
    04:58
  • 8. 4.1.8 WiFi.mp4
    03:30
  • 9. 4.1.9 VLANs.mp4
    02:35
  • 10. 4.1.10 VPNs.mp4
    08:44
  • 11. 4.2.1 Types of threats.mp4
    04:16
  • 12. 4.2.2 Intrusion Detection and Prevention Systems.mp4
    05:29
  • 13. 4.2.3 Malware Preventions.mp4
    02:03
  • 14. 4.2.4 Port Scanners.mp4
    02:59
  • 15. 4.2.5 Vulnerability Scanners.mp4
    06:35
  • 16. 4.2.6 Firewalls.mp4
    06:17
  • 17. 4.2.7 Honeynets and Honeypots.mp4
    05:12
  • 18. 4.2.8 SIEM and SOAR systems.mp4
    05:18
  • 19. 4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid.mp4
    05:13
  • 20. 4.3.2 Data center protection.mp4
    03:18
  • 21. 4.3.3 Security Zones.mp4
    04:09
  • 22. 4.3.4 Routers and Switches.mp4
    07:06
  • 23. 4.3.5 VLANs and Network segmentation.mp4
    05:48
  • 24. 4.3.6 Firewalls.mp4
    06:17
  • 25. 4.3.7 VPNs and VPN Concentrator.mp4
    03:10
  • 26. 4.3.8 Internet of Things (IoT).mp4
    02:14
  • 27. 4.3.9 Security IoT devices.mp4
    02:52
  • 28. 4.3.10 Network Security for Smart devices.mp4
    02:05
  • 1. 5.1.1 Domain Objectives.mp4
    01:10
  • 2. 5.1.2 What is Data and Data Security.mp4
    06:03
  • 3. 5.1.3 Understanding Encryption.mp4
    02:26
  • 4. 5.1.4 Differences between symmetric vs asymmetric cryptography.mp4
    02:43
  • 5. 5.1.5 Hashing.mp4
    03:33
  • 6. 5.1.6 Data Handling.mp4
    02:10
  • 7. 5.1.7 Data Classification.mp4
    02:06
  • 8. 5.1.8 Logging and Monitoring Security Events.mp4
    02:17
  • 9. 5.2.1 What is Configuration Management.mp4
    03:46
  • 10. 5.2.2 Patch Management.mp4
    02:28
  • 11. 5.3.1 Data Handling Policiess.mp4
    01:55
  • 12. 5.3.2 Password Policies.mp4
    01:38
  • 13. 5.3.3 Acceptable Use Policy (AUP).mp4
    01:49
  • 14. 5.3.4 Bring Your Own Device (BYOD) Policy.mp4
    02:03
  • 15. 5.3.5 Change management.mp4
    02:16
  • 16. 5.3.6 Privacy Policy.mp4
    02:07
  • 17. 5.4.1 Social Engineering.mp4
    04:59
  • 18. 5.4.2 Security Awareness Training.mp4
    03:29
  • 1. Practice Exam 1.html
  • 2. Practice Exam 2.html
  • Description


    Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023

    What You'll Learn?


    • Gain the knowledge for entry level IT, Cyber Security, roles and job interviews.
    • Prepare for in-demand Cyber Security entry level certifications like Certified in Cybersecurity (CC), CSX-P, or ITCA.
    • Get started on or take your Cyber Security career to the next level! Get the tools to start or grow your Cyber Security career.
    • Understand and be able to explain: Security Principle, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) and Incident Response Concepts.
    • Understand and be able to explain: Access Controls Concepts, Network Security, Security Operations, and much more.
    • Understand and be able to explain: The CIA triad, IAAA, Risk Management, Organizational/IT/Cyber Security Governance.
    • Understand and be able to explain: Physical/logical access control, Disaster planning/recovery, Cryptography, Network Security, Malware, and much more.
    • Understand and be able to explain: Cyber Security, Information, and IT Security.

    Who is this for?


  • People wanting to get the knowledge for their first job in Cyber Security.
  • Anyone who wants to begin a career as a Cyber Security professional.
  • Business & IT Managers needing or wanting to learn about Cyber Security.
  • Anyone who wants to learn the basics of computer and Cyber Security.
  • Entry or Mid level professionals looking to gain or renew the Fundamentals of Cyber Security for their job or certifications.
  • Anyone wanting to pass their Certified in Cybersecurity (CC), CSX-P or ITCA exams.
  • Systems, Security and Cyber Security analysts, engineers, managers, administrators, consultants or auditors.
  • What You Need to Know?


  • Wanting to learn about Entry Level Cyber Security.
  • Potentially wanting to pass your Certified in Cybersecurity (CC) exam.
  • More details


    Description

    Welcome, I am Thor Pedersen, and I am here to help you get that critical entry level Cyber security knowledge, so you can get your first job in Cyber security and/or pass your Certified in Cybersecurity (CC) certification by (ISC)².

    My courses on Udemy have over 440,000 enrollments from 190+ countries, and my courses Certified in Cybersecurity (CC), CISSP, PMP, and CISM are the “Best Selling” and “Highest Rated”.


    Why should you buy this course?
    Getting into Cyber security and (if you want) earning your Certified in Cybersecurity Certification (CC) by (ISC)² RIGHT now is a very smart career move.

    1. You could make an awesome salary: 

      1. Certified Cyber security professionals in North America makes earn an average salary of USD119,000.

      2. Entry Level Cyber security Analysts earn on average USD82,000 in the US.

      3. Worldwide certified individuals earn on average USD91,000, where their non-certified colleagues earn less than USD60,000 a year.

    2. There are a ton of open job: 

      1. There is a global gap in the Cyber security workforce of over 2.7 million open jobs we can't fill.
        769,000 of those jobs are in the US. There is 0% unemployment in Cyber security.

      2. 35% of ALL Cyber security jobs are unfilled, there are simply not enough Cyber security professionals to hire.

      3. Cyber security job growth is expected to be 33% in the next 10 years, the average for all occupations is 7.7%.

    3. Very high job satisfaction: 

      1. 77% of Cyber security professionals reported they are satisfied or extremely satisfied with their jobs, with Gen Z/Millennials experiencing the highest satisfaction rate at 79%.

      2. “Information Security Analyst” is the #1 job in the "U.S. News & World Report 2022 Best Jobs" list. The list ranks the 100 best jobs across 17 sectors including business, healthcare, and technology, taking into account factors such as growth potential, salary and work-life balance.

    4. A TON of directions you can expand your career:

      1. Cyber security is such a vast field, you can specialize in what sounds exciting to you and you can work in almost any sector. They all need Cyber security professionals. You get to work in an amazing meaningful field.


    # Course updates – The next curriculum update is expected in 2025 #

    • 2023: Added updates/new videos: Scheduling your exam and what to expect, What to expect on exam day and after, I passed the exam, now what?, Domain 5 recap, Domain 2 recap, How to approach certification studying, Why you should want to get Certified in Cybersecurity.

    • 2022: Course release for the completely new CC – Certified in Cybersecurity certification from (ISC)².


    This course includes ALL of this:

    • 17.5 hours of Entry level Cyber security videos.

    • 175+ page downloadable Certified in Cybersecurity (CC) study guides: Made from my lecture slides.

    • 260+ Certified in Cybersecurity (CC) practice questions, 60+ chapter completion questions and 2x 100 question practice tests.

    • 200+ website links: Additional resources for you to delve deeper into entry level Cyber security.

    • An automatic certificate of completion: To hang on your wall, use for your resume, or for CEUs/PDUs.

    • 30-day money-back guaranteed by Udemy.

    • Lifetime Access to the course videos and questions and all future updates to my Certified in Cybersecurity (CC) course.

    • Offline video viewing on the Udemy mobile apps.


    I think my courses are fantastic but don't just take my word for it. Here's what some of my other students have to say about them:

    • This course has been fantastic! I passed the exam on the first attempt. Thanks, Thor! (Anne 5-stars)

    • Great! Passed my exam today and this course really helped me understand how ISC² certifications work. (Lucas 5-stars)

    • One Shot one GOAL, Got my provisional passed within one week only by reviewing this course. Excellent and amazing thorough training provided., thanks Thor.. next is CISSP with you! (Will 5-stars)

    • I was able to pass the CC certification using this course. I would recommend this to anyone looking to take and pass the CC certification exam. This course was well laid out and easy to understand. Thor gives you what you need to know and puts it in an understandable way. Thank You! (John 5-stars)

    • I recently passed my CC exam and this course has been an amazing resource to be prepared for the certification exam. The lessons are very well covered, the material and questions get you into a right mindset that's needed on exam day. I highly recommend Thor's courses and I look forward to using them for my next certifications. (Valdet 5-stars)



    In Domain 1: Security Principles we cover:

    1.1 Understand the security concepts of information assurance

    1.2 Understand the risk management process

    1.3 Understand security controls

    1.4 Understand (ISC)² Code of Ethics

    1.5 Understand governance processes


    In Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts we cover:

    2.1 Understand business continuity (BC)

    2.2 Understand disaster recovery (DR)

    2.3 Understand incident response


    In Domain 3: Access Controls Concepts we cover: 

    3.1 Understand physical access controls

    3.2 Understand logical access controls


    In Domain 4: Network Security we cover: 

    4.1 Understand computer networking

    4.2 Understand network threats and attacks

    4.3 Understand network security infrastructure


    In Domain 5: Security Operations we cover: 

    5.1 Understand data security

    5.2 Understand system hardening

    5.3 Understand best practice security policies

    5.4 Understand security awareness training


    * This course was made for the 2022 version of the Certified in Cybersecurity entry-level certification (CC) exam by ISC2 *

    The next curriculum update is expected in 2025.



    Start your certification journey today, let me help YOU get certified.

    Thor Pedersen

    Who this course is for:

    • People wanting to get the knowledge for their first job in Cyber Security.
    • Anyone who wants to begin a career as a Cyber Security professional.
    • Business & IT Managers needing or wanting to learn about Cyber Security.
    • Anyone who wants to learn the basics of computer and Cyber Security.
    • Entry or Mid level professionals looking to gain or renew the Fundamentals of Cyber Security for their job or certifications.
    • Anyone wanting to pass their Certified in Cybersecurity (CC), CSX-P or ITCA exams.
    • Systems, Security and Cyber Security analysts, engineers, managers, administrators, consultants or auditors.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Thor Pedersen | 370,000+ Enrollments Worldwide
    Thor Pedersen | 370,000+ Enrollments Worldwide
    Instructor's Courses
    Who are you Thor?Hi, my name is Thor Pedersen and I teach CISSP, CISM, CC, PMP,  IT, Cyber Security, and Project Management.In 1987, when I was 13, I bought my first computer, it was a Commodore 64.What started as just hobbies, playing games and programming, evolved into an incredible career in Cyber Security, networking, data centers, programming, project management, and more.Why should I get certified?Getting certified is really a smart career move, it can help you advance your career and get ahead in life.There are over 760,000 open jobs in Cyber Security in the US.Just in 2020 and 2021, 263,000 new people joined the cybersecurity workforce and the open jobs still increased by 17,000     •  CISSP: The average CISSP salary in the US is $125,000 a year and there are 140,000 open CISSP jobs in the US.     •  CISM: The average CISM salary in the US is $137,000 a year and there are 58,000 open CISM jobs in the US.     •  CC: The average Certified Cyber security professionals salary in the US is $119,000 a year and there are 760,000 open jobs in cybersecurity in the US.     •  PMP: The average PMP salary in the US is $120,000 a year and there are 200,000 open PMP jobs in the US.Why should I use your courses for my certification studying?Passing your certification exams, in my opinion, is all about having the right approach and materials. I will teach you both.My CISSP, CC, and CISM courses are both the “Best Selling” and “Highest Rated” courses on Udemy, with over 370,000 enrollments from 190+ countries.I think my courses are fantastic but don't just take my word for it. Here's what some of my other students have to say about them:· Thor's videos played a major factor in my ability to pass I cannot recommend them enough. (Blair, 5-stars).· I passed the CISSP with the ISC Book and Thor's lectures and practice questions. Enough said (Warren, 5-stars).· This content helped me pass my CISSP first time. It was the main material I used for studying. Very helpful. (Duncan, 5-stars).· This course assisted me in successfully passing the CISSP Exam. Highly recommend. (Patrick, 5-stars).· Hi Thor, I used your test and videos and passed the exam at first attempt. (Shan, 5-stars)How should I start my certification studying?1. Find the materials you need.     •  CISSP: I normally recommend 1-2 good video courses, 1-2 good books, 1,500-3,500 easy/mid questions and 1,000-1,500 hard questions. **     •   CISM: I recommend 1 good video course, the CISM AIO book, and the ISACA CISM QAE questions.     •  PMP: I recommend 1 good video course, Rita’s PMP book, the PMBOK, and 1,000-2,000 practice questions.     •  CC: I recommend 1 good video course and a 2-400 practice questions.2.   Build a study plan and commit to it. **3.  Learn to deconstruct questions and find the keywords and indicators. **4.  Time management on the exam. **** I cover these in my free CISSP study course.Let me help YOU get certified.Thor PedersenCISSP | PMP | CISM | CC | CDPSE | CompTIA Security+ | CCNP R/S | CCNP Enterprise | CCNA R/S | CCNA Enterprise | CCNA-Security | KCBS Certified Barbecue Judge | Et. Al.
    ThorTeaches.com LLC
    ThorTeaches.com LLC
    Instructor's Courses
    What is Thor Teaches?Thor Teaches is an online training company founded by Thor Pedersen.We are focused on teaching IT, Cyber Security, and Project management certificationsWhy should I get certified?Getting certified is really a smart career move, it can help you advance your career and get ahead in life.     •  CISSP: The average CISSP salary in the US is $129,000 a year and there are over 116,000 open CISSP jobs in the US.     •  CISM: The average CISM salary in the US is $137,000 a year and there are over 45,000 open CISM jobs in the US.     •  PMP: The average PMP salary in the US is $120,000 a year and there are over 200,000 open PMP jobs in the US.Why should I use your courses for my certification studying?Passing your certification exams, we believe, is all about having the right approach and materials. We will teach you both.Our CISSP and CISM courses are the “Best Selling” and “Highest Rated” CISSP and CISM courses on Udemy, with over 360,000 enrollments from 190+ countries.We think our courses are fantastic but don't just take our word for it. Here's what some of our other students have to say about them:· Thor's videos played a major factor in my ability to pass I cannot recommend them enough. (Blair, 5-stars).· I passed the CISSP with the ISC Book and Thor's lectures and practice questions. Enough said (Warren, 5-stars).· This content helped me pass my CISSP first time. It was the main material I used for studying. Very helpful. (Duncan, 5-stars).· This course assisted me in successfully passing the CISSP Exam. Highly recommend. (Patrick, 5-stars).· Hi Thor, I used your test and videos and passed the exam at first attempt. (Shan, 5-stars)How should I start my certification studying?#1 Find the materials you need.     For the CISSP: We normally recommend 1-2 good video courses, 1-2 good books, 1,500-3,500 easy/mid questions and 1,000-1,500 hard questions. **     For the CISM: We recommend 1 good video course, the CISM AIO book, and the ISACA CISM QAE questions.     For the PMP: We recommend 1 good video course, Rita’s PMP book, the PMBOK, and 1,000-2,000 practice questions.#2  Build a study plan and commit to it. **#3  Learn to deconstruct questions and find the keywords and indicators. **#4  Time management on the exam. **        ** We cover these in our free CISSP study course. **Let us help YOU get certified.Thor Teaches
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 94
    • duration 5:45:27
    • English subtitles has
    • Release Date 2023/08/25

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Subtitle
    SC-200: Microsoft Security Operations Analyst
    Subtitle
    Securing IIS Websites
    Pluralsight Jeremy Morgan
    Jeremy Morgan
    Securing IIS Websites
    2:41:00
    English subtitles
    10/13/2023

    Courses related to Cyber Security Awareness