Introduction
Cybersecurity
()
What you should know
()
1. Certified in Cybersecurity (CC) Certification
The CC exam
()
Careers in information security
()
The value of certification
()
(ISC)2 code of ethics
()
2. Security Concepts
Confidentiality
()
Integrity
()
Availability
()
Authentication and authorization
()
Password security
()
Multifactor authentication
()
Non-repudiation
()
Privacy
()
3. Risk Management
Understanding risks
()
Risk assessment
()
Risk treatment
()
Selecting security controls
()
Configuration management
()
4. Security Governance
Regulations and laws
()
Security policy framework
()
Best practice security policies
()
5. Business Continuity
Business continuity planning
()
Business continuity controls
()
High availability and fault tolerance
()
6. Incident Response
Build an incident response program
()
Create an incident response team
()
Incident communications plan
()
Incident identification
()
7. Disaster Recovery
Disaster recovery planning
()
Backups
()
Disaster recovery sites
()
Test BC/DR plans
()
8. Physical Access Controls
Control physical access
()
Design for physical security
()
Visitor management
()
Physical security personnel
()
9. Logical Access Controls
Account and privilege management
()
Account monitoring
()
Provisioning and deprovisioning
()
Authorization
()
10. Computer Networking
Network types
()
Introducing TCP/IP
()
IP addresses and DHCP
()
Network ports
()
Securing wireless networks
()
Wireless encryption
()
Ping and traceroute
()
11. Network Threats
Viruses, worms, and trojans
()
Botnets
()
Eavesdropping attacks
()
Implementation attacks
()
12. Threat Identification and Prevention
Intrusion detection and prevention
()
Malware prevention
()
Port scanners
()
Vulnerability scanners
()
13. Network Security Infrastructure
Data center protection
()
Security zones
()
Routers and switches
()
VLANs and network segmentation
()
Firewalls
()
VPNs and VPN concentrators
()
Network access control
()
Internet of Things
()
Securing IoT devices
()
Network security for smart devices
()
14. Cloud Computing
What is the cloud?
()
Cloud service categories
()
Cloud deployment models
()
Managed security service providers
()
Manage vendor relationships
()
Vendor agreements
()
15. Data Security
Understanding encryption
()
Symmetric vs. asymmetric cryptography
()
Hash functions
()
The data lifecycle
()
Data classification
()
Logging and monitoring
()
16. Security Awareness and Training
Social engineering
()
Impersonation attacks
()
Security awareness training
()
Conclusion
Get ready for the exam!
()