Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Ultimate ISC2 Certified in Cybersecurity (CC) Course
Description
Description of Training
Introduction
Introduction & Download Study Guide (5:15)
Important Web Links
Domain 1 - Security principles
1.1 - Security Concepts (1:07)
1.1.2,.3.4.5 The CIA Triad (7:15)
1.1.6,1.1.7 - Authentication, IAAA (11:35)
1.1.8 Non-Repudiation (4:51)
1.1.9 Privacy (4:41)
1.2.1 Understanding Risk Management (2:09)
1.2.2 Understanding Risk Identification (2:44)
1.2.3 Understanding Risk Assessment (3:20)
1.2.4 Understanding Risk Treatment (2:02)
1.2.5 Configuration Management (3:03)
1.3.1 Security Controls (2:17)
1.3.2 Technical Controls (3:06)
1.3.3 Administrative Controls (2:49)
1.3.4 Physical Controls (2:48)
1.4.1 ISC2 Code of Ethics (2:18)
1.5.0 Governance Process (2:58)
1.5.1 Policies (2:55)
1.5.2 Procedures (2:11)
1.5.3 Standards (3:41)
1.5.4 Regulation and laws (2:44)
1.5.5 Best practice security policies (2:41)
Quiz 1: End of Chapter Quiz
Domain 2 - BC & DR & Incident Response Concepts
2.1.1 Domain 2 objectives (1:32)
2.1.2 What is Business Continuity (1:30)
2.1.3 Business Continuity Planning (2:28)
2.1.4 Business Continuity Controls (2:07)
2.1.5 What is high availability (5:42)
2.2.1 What is disaster recovery (1:43)
2.2.2 Disaster recovery planning (2:43)
2.2.3 Data backup (9:25)
2.2.4 Types of disaster recovery sites (4:59)
2.3.1 What is incident response (2:25)
2.3.2 Create a incident response program (3:42)
2.3.3 Create an incident response team (5:18)
2.3.4 Incident communication planning (3:52)
2.3.5 Identify incidents (4:58)
Quiz 2: End of Chapter Quiz
Domain 3 -- Access Control Concepts
3.1.1 Domain 3 objectives (1:13)
3.1.2 Physical security controls types (3:53)
3.1.3 Monitoring physical access (3:26)
3.1.4 Visitors management (2:25)
3.1.5 Differences between Authorised and Non-authorised personnel (5:21)
3.2.1 What is logical access controls (2:29)
3.2.2 What is principle of least privilge (1:51)
3.2.3 What is segregation of duties (2:17)
3.2.4 What is DAC (1:44)
3.2.5 What is MAC (2:13)
3.2.6 What is RBAC (2:19)
Quiz 3: End of Chapter Quiz
Domain 4 - Network Security
4.1.1 Domain Objectives (4:00)
4.1.2 Network types (2:58)
4.1.3 Introducing TCP IP (3:31)
4.1.4 The OSI Model (14:34)
4.1.5 IP Addresses and DHCP (5:19)
4.1.6 Network Ports (3:57)
4.1.7 Network Cables (4:58)
4.1.8 WiFi (3:30)
4.1.9 VLANs (2:35)
4.1.10 VPNs (8:44)
4.2.1 Types of threats (4:17)
4.2.2 Intrusion Detection and Prevention Systems (5:29)
4.2.3 Malware Preventions (2:03)
4.2.4 Port Scanners (2:59)
4.2.5 Vulnerability Scanners (6:35)
4.2.6 Firewalls (6:17)
4.2.7 Honeynets and Honeypots (5:12)
4.2.8 SIEM and SOAR systems (5:19)
4.3.1 Types of Infrastracture, On-Premise, Cloud and Hybrid (5:14)
4.3.2 Data center protection (3:18)
4.3.3 Security Zones (4:09)
4.3.4 Routers and Switches (7:06)
4.3.5 VLANs and Network segmentation (5:49)
4.3.6 Firewalls (6:17)
4.3.7 VPNs and VPN Concentrator (3:10)
4.3.8 Internet of Things (IoT) (2:14)
4.3.9 Security IoT devices (2:52)
4.3.10 Network Security for Smart devices (2:05)
Quiz 4: End of Chapter Quiz
Domain 5 - Security Operations
5.1.1 Domain Objectives (1:11)
5.1.2 What is Data and Data Security (6:03)
5.1.3 Understanding Encryption (2:26)
5.1.4 Differences between symmetric vs asymmetric cryptography (2:43)
5.1.5 Hashing (3:33)
5.1.6 Data Handling (2:10)
5.1.7 Data Classification (2:06)
5.1.8 Logging and Monitoring Security Events (2:17)
5.2.1 What is Configuration Management (3:46)
5.2.2 Patch Management (2:28)
5.3.1 Data Handling Policies (1:55)
5.3.2 Password Policies (1:39)
5.3.3 Acceptable Use Policy (AUP) (1:49)
5.3.4 Bring Your Own Device (BYOD) Policy (2:03)
5.3.5 Change management (2:16)
5.3.6 Privacy Policy (2:07)
5.4.1 Social Engineering (5:00)
5.4.2 Security Awareness Training (3:29)
Quiz 5: End of Chapter Quiz
Practice Questions
Practice Questions 1
Practice Questions 2
Audio
Audio Download
2.2.2 Disaster recovery planning
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock