As cyberthreats continue to disrupt business on a daily basis, the need for security experts is at an all-time high. Yet talent is scarce.
The new Certified in Cybersecurity (CC) entry-level certification from (ISC)2, the world’s leading cybersecurity professional organisation known for the CISSP®, helps organisations like yours develop new talent for your teams and build a stronger line of defence.
No cybersecurity work experience or formal education/degree is required. CC certification prepares candidates to start their path toward cybersecurity leadership with the key foundational concepts in information security, determined by cyber experts and practitioners working in the field.
As an (ISC)2 Official Training Partner, UNSW Canberra is pleased to offer you Certified in Cybersecurity exam preparation.
We’ll dive deep into these key topics:
• Domain 1: Security Principles
• Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
• Domain 3: Access Controls Concepts
• Domain 4: Network Security
• Domain 5: Security Operations
To help close the workforce gap, (ISC)2 recently launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers and IT professionals. CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP and future leadership roles.
Official (ISC)² Certified in Cybersecurity (CC) Entry-Level Certification Training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry- or junior-level cybersecurity role.
Participate in live sessions led by an authorised (ISC)2 instructor and work on your own through an engaging self-paced experience to build a solid foundation of knowledge tested on the entry-level Certified in Cybersecurity (CC) exam. This 14-hour blended learning experience features:
- 8 hours of live instruction
- 6 hours of self-paced content in preparation of live sessions
- Peer discussions
- Pre- and post-course assessments
- Knowledge checks and end-of-chapter study sheets and quizzes
- Online interactive flash cards
- Exam voucher
Exam Domains Covered
- Domain 1: Security Principles
- Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
- Domain 3: Access Controls Concepts
- Domain 4: Network Security
- Domain 5: Security Operations
On completion of this course, participants should be able to:
- Discuss the foundational concepts of cybersecurity principles.
- Recognize foundational security concepts of information assurance.
- Define risk management terminology and summarize the process.
- Relate risk management to personal or professional practices.
- Classify types of security controls.
- Distinguish between policies, procedures, standards, regulations and laws.
- Demonstrate the relationship among governance elements.
- Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples.
- Practice the terminology of and review security policies.
- Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
- Recall the terms and components of incident response.
- Summarize the components of a business continuity plan.
- Identify the components of disaster recovery.
- Practice the terminology and review concepts of business continuity, disaster recovery and incident response.
- Select access controls that are appropriate in a given scenario.
- Relate access control concepts and processes to given scenarios.
- Compare various physical access controls.
- Describe logical access controls.
- Practice the terminology and review concepts of access controls.
- Explain the concepts of network security.
- Recognize common networking terms and models.
- Identify common protocols and port and their secure counterparts.
- Identify types of network (cyber) threats and attacks.
- Discuss common tools used to identify and prevent threats.
- Identify common data center terminology.
- Recognize common cloud service terminology.
- Identify secure network design terminology.
- Practice the terminology and review concepts of network security.
- Explain concepts of security operations.
- Discuss data handling best practices.
- Identify key concepts of logging and monitoring.
- Summarize the different types of encryption and their common uses.
- Describe the concepts of configuration management.
- Explain the application of common security policies.
- Discuss the importance of security awareness training.
- Practice the terminology and review concepts of network operations