“The best online course I’ve ever taken”-sherene

(ISC)²

CC

The (ISC)² Certified in Cybersecurity (CC) certification is the ultimate starting point for an exciting career in Cybersecurity. It’s open to IT professionals, as well as to those looking to transition from another field into cybersecurity, college students, and recent graduates.Embark on a fulfilling professional journey by obtaining certification in Cybersecurity from (ISC)², the top-ranked global cybersecurity organization.

Jobs that use (ISC)² CC

Security Analyst

(Average Salary $81,979)

Security Auditor

(Average Salary $117,000)

Security Engineer

(Average Salary $87,570)

Incident Responder

(Average Salary $120,45)

Security Specialist

(Average Salary $86,442)

Penetration Tester

(Average Salary $81,230)

Open The Doors To Your Cybersecurity Career With CC Certification

Start From Scratch

CC is perfect for beginners, as it establishes the core knowledge required by every cybersecurity job role and provides a springboard to intermediate-level cybersecurity jobs

Learn From Industry Leading Experts

Learn from (ISC)² Official Authorized CC Instructors
Our CC instructors are well-versed in accelerated learning concepts and exam preparation.

(ISC)² CC Is a Global Certification That Validates Your Cybersecurity Knowledge for

Career Advancement and Credibility

Learn In Virtual Live Classes with an Instructor!

Virtual Instructor Led Classes

Duration

8 hours of live instruction
6 hours of self-paced content in preparation for live sessions

What's Included?
Peer discussions
Pre- and post-course assessments
Knowledge checks and end-of-chapter study sheets and quizzes
Online interactive flashcards
180-day access to recorded live sessions and self-paced content

+ FREE Exam Voucher

Pass Guarantee
If You Don’t Pass The Exam, We’ll Give You Free Retake Exam Voucher

Format
Live Instructor Led Classes



Domain 1: Security Principles (26%, 20 items)

1.1 Understand the security concepts of information assurance

  • Confidentiality
  • Integrity
  • Availability
  • Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
  • Non-repudiation
  • Privacy

1.2 Understand the risk management process

  • Risk management (e.g., risk priorities, risk tolerance)
  • Risk identification, assessment, and treatment

1.3  Understand security controls

  • Technical controls
  • Administrative controls
  • Physical controls

1.4 Understand (ISC)2 Code of Ethics

  • Professional code of conduct

1.5 Understand governance processes

  • Policies
  • Procedures
  • Standards
  • Regulations and laws

Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

(10%, 7 items)

2.1 Understand business continuity (BC)

  • Purpose
  • Importance
  • Components

2.2 Understand disaster recovery (DR) • Purpose

  • Importance
  • Components

2.3 Understand the incident response

  • Purpose
  • Importance Components

Domain 3: Access Controls Concepts (22%, 17 items)

3.1Understand physical access controls

• Physical security controls (e.g., badge systems, gate entry, environmental design)
• Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
• Authorized versus unauthorized personnel

3.2 Understand logical access controls

• Principle of least privilege
• Segregation of duties
• Discretionary access control (DAC)
• Mandatory access control (MAC)
• Role-based access control (RBAC)

Domain 4:Network Security (24%, 18 items)

4.1 Understand computer networking

• Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi)
• Ports
• Application

4.2 Understand network threats and attacks

• Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
• Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
• Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))

4.3 Understand network security infrastructure

  • On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
  • Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))

Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)

Domain 5: Security Operations (18%, 13 items)

5.1 Understand data security

  • Encryption (e.g., symmetric, asymmetric, hashing)
  • Data handling (e.g., destruction, retention, classification, labeling)
  • Logging and monitoring security events

5.2 Understand system hardening

• Configuration management (e.g., baselines, updates, patches)

5.3 Understand best practice security policies

  • Data handling policy
  • Password policy
  • Acceptable Use Policy (AUP)
  • Bring your own device (BYOD) policy
  • Change management policy (e.g., documentation, approval, rollback)
  • Privacy policy

5.4 Understand security awareness training

  • Purpose/concepts (e.g., social engineering, password protection)
  • Importance

1. Security Principles Incident Response:

The processes and procedures used to detect, investigate, contain, and recover from security incidents or breaches while minimizing damage and preventing future occurrences.

2. Business Continuity (BC) and Disaster Recovery (DR)

Concepts refer to an organization’s ability to continue functioning during and after a disruptive event, and the plan of action to recover and resume normal operations as quickly as possible.

3. Access Controls Concepts:

Security measures to manage and control access to computer systems, networks, and data, including authentication, authorization, and accounting mechanisms to ensure only authorized users can access protected resources.

4. Network Security

Encompasses various technologies, policies, and practices to protect computer networks from unauthorized access, misuse, modification, or disruption.

5. Security Operations

The tools, processes, and practices used to detect, prevent, and respond to security threats and incidents, including monitoring, analysis, and investigation of security events

How Do I Get My (ISC)² CC Certification?

You will earn the (ISC)² CC certification by passing one exam that consists of both multiple-choice and performance-based questions Read on for some common-sense advice that can increase your chance to succeed in your exam and achieve (ISC)² CC certification status

Why Should I Get (ISC)² CC Certified?

The (ISC)² Certified in Cybersecurity provides a strong foundation in cybersecurity and assists recipients in establishing a career path in this field. This certification, which is intended for entry-level professionals, demonstrates to employers that you possess the essential knowledge, skills, and abilities required for a junior or entry-level position in cybersecurity. Moreover, it indicates your eagerness and potential to learn and advance in your role.

Can I Attend If I’m Just A Beginner And Don’t Have Masters Degree Or Any Experience?

Yes, (ISC)² CC is one of the first Cyber security certifications you should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
CC incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills.

What Will I Be Able To Achieve After Taking The Certification?

You can showcase a range of topics to recruiters that will increase your chances of securing an entry-level job in cybersecurity. These topics include but are not limited to, security principles, concepts related to business continuity (BC), disaster recovery (DR), and incident response, access controls concepts, network security, and security operations. By demonstrating proficiency in these areas, you can exhibit your knowledge and competency in the field, making you a more attractive candidate to potential employers.

Take Classes Today – Get Certified Next Week!

ENROLL NOW

The (ISC)² Certified in Cybersecurity is an essential certification that provides a strong foundation in cybersecurity and assists recipients in establishing a career path in this field. This certification, which is intended for entry-level professionals, demonstrates to employers that you possess the essential knowledge, skills, and abilities required for a junior or entry-level position in cybersecurity. Moreover, it indicates your eagerness and potential to learn and advance in your role.

Earning this certification demonstrates a strong grasp of technical concepts and an ability to learn on the job, providing employers with confidence. As an (ISC)² certification, CC holders have access to the world’s largest network of certified cybersecurity professionals, supporting their ongoing professional growth and the acquisition of new achievements and qualifications throughout their careers.