Companies Home Search Profile

The Complete Certified in Cybersecurity (CC) course ISC2 '23

Focused View

Thor Pedersen | 370,000+ Enrollments Worldwide,ThorTeaches.com LLC

14:33:04

234 View
  • 1.1 2022 ThorTeaches CC Study Guides Chapter 1 v1.2.pdf
  • 1.2 2022 ThorTeaches CC Study Guides Chapter 2 v1.1.pdf
  • 1.3 2022 ThorTeaches CC Study Guides Chapter 3 v1.1.pdf
  • 1.4 2022 ThorTeaches CC Study Guides Chapter 4 v1.1.pdf
  • 1.5 2022 ThorTeaches CC Study Guides Chapter 5 v1.pdf
  • 1.6 2023 CC Mnemonics by ThorTeaches.pdf
  • 1. Introduction and download your free study guides..mp4
    00:40
  • 2. Connect with me on Social media and the Udemy ratings system.mp4
    01:42
  • 3. How to get the most out of my courses and the Udemy interface.mp4
    02:29
  • 4. General Certified in Cybersecurity links.html
  • 1. Domain 1 - What we will be covering..mp4
    00:46
  • 2. The differences between Information Security, IT Security, and Cybersecurity..mp4
    06:04
  • 3. The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4
    06:24
  • 4. The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4
    07:10
  • 5. The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4
    03:33
  • 6. The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4
    08:53
  • 7. The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4
    03:33
  • 8. The CIA Triad - Confidentiality, Integrity, and Availability - Quiz.html
  • 9. IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4
    07:44
  • 10. IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4
    02:54
  • 11. IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4
    07:34
  • 12. IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4
    08:51
  • 13. IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4
    04:07
  • 14. IAAA -Identification, Authentication, Authorization, and Accountability - Quiz.html
  • 15. Privacy.mp4
    05:53
  • 16. Risk Management - part 1.mp4
    04:46
  • 17. Risk Management - part 2.mp4
    07:43
  • 18. Risk Management - part 3.mp4
    09:49
  • 19. Risk Management - part 4.mp4
    08:53
  • 20. Risk Management - part 5.mp4
    08:09
  • 21. Risk Management - part 6.mp4
    05:47
  • 22. Risk Management - Quiz.html
  • 23. Access Control Categories and Types - part 1.mp4
    07:36
  • 24. Access Control Categories and Types - part 2.mp4
    08:52
  • 25. Access Control Categories and Types Quiz.html
  • 26. The Ethics of your organizations and (ISC)2.mp4
    03:51
  • 27. Governance vs. Management.mp4
    07:39
  • 28. Laws and regulations - part 1.mp4
    07:55
  • 29. Laws and regulations - part 2.mp4
    09:01
  • 30. Security governance principles.mp4
    09:34
  • 31. Policies, procedures, standards, laws, and regulations quiz.html
  • 32. What we covered in Domain 1.mp4
    00:37
  • 33. Certified in Cybersecurity Domain 1 links.html
  • 1. Domain 2 - What we will be covering..mp4
    00:42
  • 2. BCP - Business Continuity Planning - Part 1.mp4
    06:00
  • 3. BCP - Business Continuity Planning - Part 2.mp4
    10:20
  • 4. BCP - Business Continuity Planning - Part 3.mp4
    07:54
  • 5. BCP - Business Continuity Planning - Quiz.html
  • 6. DRP - Disaster Recovery Planning - Part 1.mp4
    13:12
  • 7. DRP - Disaster Recovery Planning - Part 2.mp4
    04:46
  • 8. DRP - Disaster Recovery Planning - Part 3.mp4
    07:10
  • 9. DRP - Disaster Recovery Planning - Part 4.mp4
    09:16
  • 10. DRP - Disaster Recovery Planning - Quiz.html
  • 11. Incidents Response - Part 1.mp4
    09:20
  • 12. Incidents Response - Part 2.mp4
    08:30
  • 13. Incidents Response - Part 3.mp4
    06:18
  • 14. Incidents Response - Part 4.mp4
    07:52
  • 15. Incidents Response - Part 5.mp4
    05:05
  • 16. Incidence response Quiz.html
  • 17. What we covered in Domain 2.mp4
    00:33
  • 18. Certified in Cybersecurity Domain 2 links.html
  • 1. Domain 3 - What we will be covering..mp4
    00:38
  • 2. Physical Security - part 1.mp4
    10:20
  • 3. Physical Security - part 2.mp4
    06:40
  • 4. Physical Security - part 3.mp4
    10:27
  • 5. Physical Security - part 5.mp4
    07:36
  • 6. Physical Security - part 4.mp4
    06:27
  • 7. Physical Security Quiz.html
  • 8. Logical Access Control - Part 1.mp4
    07:49
  • 9. Logical Access Control - Part 2.mp4
    06:38
  • 10. Logical Access Control - Part 3.mp4
    10:29
  • 11. Logical Access Control - Part 4.mp4
    06:50
  • 12. Logical Access Control - Part 5.mp4
    10:08
  • 13. Logical Access Control quiz.html
  • 14. What we covered in Domain 3.mp4
    00:37
  • 15. Certified in Cybersecurity Domain 3 links.html
  • 1. Domain 4 - What we will be covering..mp4
    00:34
  • 2. Network Basics and Definitions - Part 1.mp4
    10:25
  • 3. Network Basics and Definitions - Part 2.mp4
    08:49
  • 4. Network Basics and Definitions - Quiz.html
  • 5. The OSI Model - Part 1.mp4
    19:48
  • 6. The OSI Model - Part 2.mp4
    07:14
  • 7. The OSI Model - Part 3.mp4
    07:14
  • 8. The TCPIP model.mp4
    08:05
  • 9. The OSI and TCPIP Model Quiz.html
  • 10. IP addresses, port numbers, and MAC addresses - Part 1.mp4
    10:46
  • 11. IP addresses, port numbers, and MAC addresses - Part 2.mp4
    05:29
  • 12. IP addresses, port numbers, and MAC addresses - Part 3.mp4
    04:38
  • 13. IP addresses, port numbers, and MAC addresses - Quiz.html
  • 14. IP support protocols - Part 1.mp4
    07:13
  • 15. IP support protocols - Part 2.mp4
    05:49
  • 16. Cables - Part 1.mp4
    06:13
  • 17. Cables - Part 2.mp4
    06:42
  • 18. LAN topologies.mp4
    07:35
  • 19. Wi-Fi.mp4
    08:35
  • 20. Wireless networks - Part 1.mp4
    06:07
  • 21. Wireless networks - Part 2.mp4
    05:28
  • 22. VLANs and Routers - Part 1.mp4
    06:23
  • 23. VLANs and Routers - Part 2.mp4
    07:25
  • 24. VPNs, NAC, and third-party connectivity.mp4
    11:39
  • 25. SDN, SD-WAN, and SDX.mp4
    08:18
  • 26. DMZ, VLAN, VPN, Microsegmentation, Defense in depth, NAC IOT Quiz.html
  • 27. Attacks and attackers - Part 1.mp4
    06:48
  • 28. Attacks and attackers - Part 2.mp4
    10:41
  • 29. Attacks and attackers - Part 3.mp4
    08:02
  • 30. Attacks and attackers Quiz.html
  • 31. Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4
    06:07
  • 32. Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4
    07:50
  • 33. Intrusion Detection and Prevention systems quiz.html
  • 34. SIEM and SOAR systems.mp4
    05:27
  • 35. Honeynets and Honeypots.mp4
    02:51
  • 36. Firewalls - Part 1.mp4
    05:01
  • 37. Firewalls - Part 2.mp4
    08:37
  • 38. 0-day attacks and exploits.mp4
    07:18
  • 39. Vulnerability Scanning.mp4
    04:21
  • 40. Virtualization, Cloud, and Distributed Computing - Part 1.mp4
    06:15
  • 41. Virtualization, Cloud, and Distributed Computing - Part 2.mp4
    07:00
  • 42. Virtualization, Cloud, and Distributed Computing - Part 3.mp4
    04:55
  • 43. Virtualization, Cloud, and Distributed Computing - Part 4.mp4
    08:50
  • 44. Virtualization, Cloud, and Distributed Computing - Part 5.mp4
    09:38
  • 45. Virtualization, Cloud, and Distributed Computing - Quiz.html
  • 46. The Internet of Things (IoT).mp4
    05:32
  • 47. Asset tracking and hardware hardening.mp4
    07:30
  • 48. Electricity.mp4
    09:26
  • 49. Backups - Part 1.mp4
    09:28
  • 50. Backups - Part 2.mp4
    07:07
  • 51. Fault tolerance, redundancy, and resiliency - Part 1.mp4
    05:35
  • 52. Fault tolerance, redundancy, and resiliency - Part 2.mp4
    08:21
  • 53. Fault tolerance, redundancy, and resiliency - Part 3.mp4
    05:30
  • 54. Fire suppression - Part 1.mp4
    05:14
  • 55. Fire suppression - Part 2.mp4
    07:16
  • 56. Data Centers Quiz.html
  • 57. Secure design principles - Part 1.mp4
    07:23
  • 58. Secure design principles - Part 2.mp4
    08:37
  • 59. What we covered in Domain 4.mp4
    00:38
  • 60. Certified in Cybersecurity Domain 4 links.html
  • 1. Domain 5 - What we will be covering..mp4
    00:30
  • 2. Configuration Management.mp4
    05:39
  • 3. Patch Management..mp4
    10:44
  • 4. Change Management.mp4
    10:21
  • 5. Change, patch, configuration management - Quiz.html
  • 6. Cryptography - Part 1.mp4
    07:34
  • 7. Cryptography - Part 2.mp4
    06:09
  • 8. Cryptography - Part 3.mp4
    05:28
  • 9. Hashing.mp4
    05:23
  • 10. Attacks on our cryptography.mp4
    07:56
  • 11. Encryption Quiz.html
  • 12. Data handling, data storage and data retention - Part 1.mp4
    07:56
  • 13. Data handling, data storage and data retention - Part 2.mp4
    08:37
  • 14. Data handling, data storage and data retention - Part 3.mp4
    04:38
  • 15. Retention, classification, labeling quiz.html
  • 16. Administrative (Directive) Controls.mp4
    13:35
  • 17. Training and awareness.mp4
    07:11
  • 18. Social Engineering attacks - Part 1.mp4
    08:36
  • 19. Social Engineering attacks - Part 2.mp4
    09:17
  • 20. Training. awareness and social engineering quiz.html
  • 21. What we covered in Domain 5.mp4
    00:46
  • 22. Certified in Cybersecurity Domain 5 links.html
  • 1. How to approach practice questions.mp4
    11:15
  • 2. CC Exam emulation - FULL practice test #1.html
  • 3. CC Exam emulation - FULL practice test #2.html
  • 4. How to design your career and certification path..mp4
    13:36
  • Description


    Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023

    What You'll Learn?


    • Gain the knowledge for entry level IT, Cyber Security, roles and job interviews.
    • Prepare for in-demand Cyber Security entry level certifications like Certified in Cybersecurity (CC), CSX-P, or ITCA.
    • Get started on or take your Cyber Security career to the next level! Get the tools to start or grow your Cyber Security career.
    • Understand and be able to explain: Security Principle, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) and Incident Response Concepts.
    • Understand and be able to explain: Access Controls Concepts, Network Security, Security Operations, and much more.
    • Understand and be able to explain: The CIA triad, IAAA, Risk Management, Organizational/IT/Cyber Security Governance.
    • Understand and be able to explain: Physical/logical access control, Disaster planning/recovery, Cryptography, Network Security, Malware, and much more.
    • Understand and be able to explain: Cyber Security, Information, and IT Security.

    Who is this for?


  • People wanting to get the knowledge for their first job in Cyber Security.
  • Anyone who wants to begin a career as a Cyber Security professional.
  • Business & IT Managers needing or wanting to learn about Cyber Security.
  • Anyone who wants to learn the basics of computer and Cyber Security.
  • Entry or Mid level professionals looking to gain or renew the Fundamentals of Cyber Security for their job or certifications.
  • Anyone wanting to pass their Certified in Cybersecurity (CC), CSX-P or ITCA exams.
  • Systems, Security and Cyber Security analysts, engineers, managers, administrators, consultants or auditors.
  • More details


    Description

    Welcome, I am Thor Pedersen, and I am here to help you get that critical entry level Cyber security knowledge, so you can get your first job in Cyber security and/or pass your Certified in Cybersecurity (CC) certification by (ISC)².

    My courses on Udemy have over 360,000 enrollments from 190+ countries, and my courses Certified in Cybersecurity (CC), CISSP, PMP, and CISM are the “Best Selling” and “Highest Rated”.


    Why should you buy this course?
    Getting into Cyber security and (if you want) earning your Certified in Cybersecurity Certification (CC) by (ISC)² RIGHT now is a very smart career move.

    1. You could make an awesome salary: 

      1. Certified Cyber security professionals in North America makes earn an average salary of U.S. $119,000.

      2. Entry Level Cyber security Analysts earn on average $82,000 in the US.

      3. Worldwide certified individuals earn on average $91,000, where their non-certified colleagues earn less than $60,000 a year.

    2. There are a ton of open job: 

      1. There is a global gap in the Cyber security workforce of over 2.7 million open jobs we can't fill.
        769,000 of those jobs are in the US. There is 0% unemployment in Cyber security.

      2. 35% of ALL Cyber security jobs are unfilled, there are simply not enough Cyber security professionals to hire.

      3. Cyber security job growth is expected to be 33% in the next 10 years, the average for all occupations is 7.7%.

    3. Very high job satisfaction: 

      1. 77% of Cyber security professionals reported they are satisfied or extremely satisfied with their jobs, with Gen Z/Millennials experiencing the highest satisfaction rate at 79%.

      2. “Information Security Analyst” is the #1 job in the "U.S. News & World Report 2022 Best Jobs" list. The list ranks the 100 best jobs across 17 sectors including business, healthcare, and technology, taking into account factors such as growth potential, salary and work-life balance.

    4. A TON of directions you can expand your career:

      1. Cyber security is such a vast field, you can specialize in what sounds exciting to you and you can work in almost any sector. They all need Cyber security professionals. You get to work in an amazing meaningful field.


    This course includes ALL of this:

    • 16.5 hours of Entry level Cyber security videos.

    • 175+ page downloadable Certified in Cybersecurity (CC) study guides: Made from my lecture slides.

    • 260+ Certified in Cybersecurity (CC) practice questions, 60+ chapter completion questions and 2x 100 question practice tests.

    • 200+ website links: Additional resources for you to delve deeper into entry level Cyber security.

    • An automatic certificate of completion: To hang on your wall, use for your resume, or for CEUs/PDUs.

    • 30-day money-back guaranteed by Udemy.

    • Lifetime Access to the course videos and questions and all future updates to my Certified in Cybersecurity (CC) course.

    • Offline video viewing on the Udemy mobile apps.


    I think my courses are fantastic but don't just take my word for it. Here's what some of my other students have to say about them:

    • This course has been fantastic! I passed the exam on the first attempt. Thanks, Thor! (Anne 5-stars)

    • Great! Passed my exam today and this course really helped me understand how ISC² certifications work. (Lucas 5-stars)

    • One Shot one GOAL, Got my provisional passed within one week only by reviewing this course. Excellent and amazing thorough training provided., thanks Thor.. next is CISSP with you! (Will 5-stars)

    • I was able to pass the CC certification using this course. I would recommend this to anyone looking to take and pass the CC certification exam. This course was well laid out and easy to understand. Thor gives you what you need to know and puts it in an understandable way. Thank You! (John 5-stars)

    • I recently passed my CC exam and this course has been an amazing resource to be prepared for the certification exam. The lessons are very well covered, the material and questions get you into a right mindset that's needed on exam day. I highly recommend Thor's courses and I look forward to using them for my next certifications. (Valdet 5-stars)



    In Domain 1: Security Principles we cover:

    1.1 Understand the security concepts of information assurance

    1.2 Understand the risk management process

    1.3 Understand security controls

    1.4 Understand (ISC)² Code of Ethics

    1.5 Understand governance processes


    In Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts we cover:

    2.1 Understand business continuity (BC)

    2.2 Understand disaster recovery (DR)

    2.3 Understand incident response


    In Domain 3: Access Controls Concepts we cover: 

    3.1 Understand physical access controls

    3.2 Understand logical access controls


    In Domain 4: Network Security we cover: 

    4.1 Understand computer networking

    4.2 Understand network threats and attacks

    4.3 Understand network security infrastructure


    In Domain 5: Security Operations we cover: 

    5.1 Understand data security

    5.2 Understand system hardening

    5.3 Understand best practice security policies

    5.4 Understand security awareness training


    *** This course was made for the 2022 version of the Certified in Cybersecurity entry-level certification (CC) exam by ISC2 ***

    The next curriculum update is expected in 2025.



    Start your certification journey today, let me help YOU get certified.

    Thor Pedersen

    Who this course is for:

    • People wanting to get the knowledge for their first job in Cyber Security.
    • Anyone who wants to begin a career as a Cyber Security professional.
    • Business & IT Managers needing or wanting to learn about Cyber Security.
    • Anyone who wants to learn the basics of computer and Cyber Security.
    • Entry or Mid level professionals looking to gain or renew the Fundamentals of Cyber Security for their job or certifications.
    • Anyone wanting to pass their Certified in Cybersecurity (CC), CSX-P or ITCA exams.
    • Systems, Security and Cyber Security analysts, engineers, managers, administrators, consultants or auditors.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Thor Pedersen | 370,000+ Enrollments Worldwide
    Thor Pedersen | 370,000+ Enrollments Worldwide
    Instructor's Courses
    Who are you Thor?Hi, my name is Thor Pedersen and I teach CISSP, CISM, CC, PMP,  IT, Cyber Security, and Project Management.In 1987, when I was 13, I bought my first computer, it was a Commodore 64.What started as just hobbies, playing games and programming, evolved into an incredible career in Cyber Security, networking, data centers, programming, project management, and more.Why should I get certified?Getting certified is really a smart career move, it can help you advance your career and get ahead in life.There are over 760,000 open jobs in Cyber Security in the US.Just in 2020 and 2021, 263,000 new people joined the cybersecurity workforce and the open jobs still increased by 17,000     •  CISSP: The average CISSP salary in the US is $125,000 a year and there are 140,000 open CISSP jobs in the US.     •  CISM: The average CISM salary in the US is $137,000 a year and there are 58,000 open CISM jobs in the US.     •  CC: The average Certified Cyber security professionals salary in the US is $119,000 a year and there are 760,000 open jobs in cybersecurity in the US.     •  PMP: The average PMP salary in the US is $120,000 a year and there are 200,000 open PMP jobs in the US.Why should I use your courses for my certification studying?Passing your certification exams, in my opinion, is all about having the right approach and materials. I will teach you both.My CISSP, CC, and CISM courses are both the “Best Selling” and “Highest Rated” courses on Udemy, with over 370,000 enrollments from 190+ countries.I think my courses are fantastic but don't just take my word for it. Here's what some of my other students have to say about them:· Thor's videos played a major factor in my ability to pass I cannot recommend them enough. (Blair, 5-stars).· I passed the CISSP with the ISC Book and Thor's lectures and practice questions. Enough said (Warren, 5-stars).· This content helped me pass my CISSP first time. It was the main material I used for studying. Very helpful. (Duncan, 5-stars).· This course assisted me in successfully passing the CISSP Exam. Highly recommend. (Patrick, 5-stars).· Hi Thor, I used your test and videos and passed the exam at first attempt. (Shan, 5-stars)How should I start my certification studying?1. Find the materials you need.     •  CISSP: I normally recommend 1-2 good video courses, 1-2 good books, 1,500-3,500 easy/mid questions and 1,000-1,500 hard questions. **     •   CISM: I recommend 1 good video course, the CISM AIO book, and the ISACA CISM QAE questions.     •  PMP: I recommend 1 good video course, Rita’s PMP book, the PMBOK, and 1,000-2,000 practice questions.     •  CC: I recommend 1 good video course and a 2-400 practice questions.2.   Build a study plan and commit to it. **3.  Learn to deconstruct questions and find the keywords and indicators. **4.  Time management on the exam. **** I cover these in my free CISSP study course.Let me help YOU get certified.Thor PedersenCISSP | PMP | CISM | CC | CDPSE | CompTIA Security+ | CCNP R/S | CCNP Enterprise | CCNA R/S | CCNA Enterprise | CCNA-Security | KCBS Certified Barbecue Judge | Et. Al.
    ThorTeaches.com LLC
    ThorTeaches.com LLC
    Instructor's Courses
    What is Thor Teaches?Thor Teaches is an online training company founded by Thor Pedersen.We are focused on teaching IT, Cyber Security, and Project management certificationsWhy should I get certified?Getting certified is really a smart career move, it can help you advance your career and get ahead in life.     •  CISSP: The average CISSP salary in the US is $129,000 a year and there are over 116,000 open CISSP jobs in the US.     •  CISM: The average CISM salary in the US is $137,000 a year and there are over 45,000 open CISM jobs in the US.     •  PMP: The average PMP salary in the US is $120,000 a year and there are over 200,000 open PMP jobs in the US.Why should I use your courses for my certification studying?Passing your certification exams, we believe, is all about having the right approach and materials. We will teach you both.Our CISSP and CISM courses are the “Best Selling” and “Highest Rated” CISSP and CISM courses on Udemy, with over 360,000 enrollments from 190+ countries.We think our courses are fantastic but don't just take our word for it. Here's what some of our other students have to say about them:· Thor's videos played a major factor in my ability to pass I cannot recommend them enough. (Blair, 5-stars).· I passed the CISSP with the ISC Book and Thor's lectures and practice questions. Enough said (Warren, 5-stars).· This content helped me pass my CISSP first time. It was the main material I used for studying. Very helpful. (Duncan, 5-stars).· This course assisted me in successfully passing the CISSP Exam. Highly recommend. (Patrick, 5-stars).· Hi Thor, I used your test and videos and passed the exam at first attempt. (Shan, 5-stars)How should I start my certification studying?#1 Find the materials you need.     For the CISSP: We normally recommend 1-2 good video courses, 1-2 good books, 1,500-3,500 easy/mid questions and 1,000-1,500 hard questions. **     For the CISM: We recommend 1 good video course, the CISM AIO book, and the ISACA CISM QAE questions.     For the PMP: We recommend 1 good video course, Rita’s PMP book, the PMBOK, and 1,000-2,000 practice questions.#2  Build a study plan and commit to it. **#3  Learn to deconstruct questions and find the keywords and indicators. **#4  Time management on the exam. **        ** We cover these in our free CISSP study course. **Let us help YOU get certified.Thor Teaches
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 126
    • duration 14:33:04
    • Release Date 2022/12/24