The Complete Certified in Cybersecurity course (CC) – 2022

The Complete Certified in Cybersecurity course (CC) – 2022

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 132 lectures (14h 34m) | 6.21 GB

Get started on your Cybersecurity career today! Take the Complete Certified in Cybersecurity Beginners Course CC – 2022

Welcome, I am Thor Pedersen, and I am here to help you get that critical entry level Cybersecurity knowledge, so you can get your first job in Cyber Security and/or pass your Certified in Cybersecurity (CC) certification.

My courses on Udemy have over 350,000 enrollments from 180+ countries, and my courses (Certified in Cybersecurity, CISSP, PMP, and CISM) are both the “Best Selling” and “Highest Rated”.

This is why you need this course!
Getting into Cyber Security and (if you want) earning your Certified in Cybersecurity Certification (CC) RIGHT now is a very smart career move.

Cyber Security professionals make good money:

Certified Cyber Security professionals in North America makes earn an average salary of U.S. $119,000.

Entry Level Cyber Security Analysts earn on average $82,000 in the US.

Worldwide certified individuals earn on average $91,000, where their non-certified colleagues earn less than $60,000 a year.

There are a ton of job openings:

There is a global gap in the cyber security workforce of over 2.7 million open jobs we can’t fill.
600,000 of those jobs are in the US. There is 0% unemployment in Cyber Security.

35% of ALL Cyber Security jobs are unfilled, there are simply not enough Cyber Security professionals to hire.

Cyber Security job growth is expected at 33% in the next 10 years, the average for all occupations is 7.7%.

People in Cyber Security has very high job satisfaction:

77% of Cyber Security professionals reported they are satisfied or extremely satisfied with their jobs, with Gen Z/Millennials experiencing the highest satisfaction rate at 79%.

“Information Security Analyst” is the #1 job in the “U.S. News & World Report 2022 Best Jobs” list. The list ranks the 100 best jobs across 17 sectors including business, healthcare and technology, taking into account factors such as growth potential, salary and work-life balance.

There is so many directions you can go in Cyber Security:

Cyber Security is such a vast field, you can specialize in what sounds exciting to you and you can work in almost any sector. They all need Cyber Security professionals. You get to work in an amazing meaningful field.

What you’ll learn

  • Gain the knowledge for entry level IT and Cybersecurity roles and job interviews.
  • Prepare for in-demand Cybersecurity entry level certifications like CC (Certified in Cybersecurity), CSX-P, or ITCA.
  • Understand the basic concepts and terminologies of Cyber Security, Information, and IT Security.
  • Take your cyber security career to the next level! Get the tools to start or grow your Cyber Security career.
  • Learn about: Security Principle, Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) and Incident Response Concepts.
  • Learn about: Access Controls Concepts, Network Security, Security Operations, and much more.
  • Understand and be able to explain: The CIA triad, IAAA, Risk Management, Organizational/IT/Cyber Security Governance.
  • Understand and be able to explain: Physical/logical access control, Disaster planning/recovery, Cryptography, Network Security, Malware, and much more.
Table of Contents

Introduction
1 Introduction and download your free study guides.
2 Connect with me on Social media and the Udemy ratings system
3 How to get the most out of my courses and the Udemy interface
4 General Certified in Cybersecurity links

CC Domain 1 Security Principles
5 Domain 1 – What we will be covering.
6 The differences between Information Security, IT Security, and Cybersecurity.
7 The CIA Triad – Confidentiality, Integrity, and Availability – part 1
8 The CIA Triad – Confidentiality, Integrity, and Availability – part 2
9 The CIA Triad – Confidentiality, Integrity, and Availability – part 3
10 The CIA Triad – Confidentiality, Integrity, and Availability – part 4
11 The CIA Triad – Confidentiality, Integrity, and Availability – part 5
12 IAAA -Identification, Authentication, Authorization, and Accountability – part 1
13 IAAA -Identification, Authentication, Authorization, and Accountability – part 2
14 IAAA -Identification, Authentication, Authorization, and Accountability – part 3
15 IAAA -Identification, Authentication, Authorization, and Accountability – part 4
16 IAAA -Identification, Authentication, Authorization, and Accountability – part 5
17 Privacy
18 Risk Management – part 1
19 Risk Management – part 2
20 Risk Management – part 3
21 Risk Management – part 4
22 Risk Management – part 5
23 Risk Management – part 6
24 Access Control Categories and Types – part 1
25 Access Control Categories and Types – part 2
26 The Ethics of your organizations and (ISC)2
27 Governance vs. Management
28 Laws and regulations – part 1
29 Laws and regulations – part 2
30 Security governance principles
31 What we covered in Domain 1
32 Certified in Cybersecurity Domain 1 links

Domain 2 Business Continuity, Disaster Recovery, and Incident Response
33 Domain 2 – What we will be covering.
34 BCP – Business Continuity Planning – Part 1
35 BCP – Business Continuity Planning – Part 2
36 BCP – Business Continuity Planning – Part 3
37 DRP – Disaster Recovery Planning – Part 1
38 DRP – Disaster Recovery Planning – Part 2
39 DRP – Disaster Recovery Planning – Part 3
40 DRP – Disaster Recovery Planning – Part 4
41 Incidents Response – Part 1
42 Incidents Response – Part 2
43 Incidents Response – Part 3
44 Incidents Response – Part 4
45 Incidents Response – Part 5
46 What we covered in Domain 2
47 Certified in Cybersecurity Domain 2 links

Domain 3 Access Controls Concepts
48 Domain 3 – What we will be covering.
49 Physical Security – part 1
50 Physical Security – part 2
51 Physical Security – part 3
52 Physical Security – part 5
53 Physical Security – part 4
54 Logical Access Control – Part 1
55 Logical Access Control – Part 2
56 Logical Access Control – Part 3
57 Logical Access Control – Part 4
58 Logical Access Control – Part 5
59 What we covered in Domain 3
60 Certified in Cybersecurity Domain 3 links

Domain 4 Network Security
61 Domain 4 – What we will be covering.
62 Network Basics and Definitions – Part 1
63 Network Basics and Definitions – Part 2
64 The OSI Model – Part 1
65 The OSI Model – Part 2
66 The OSI Model – Part 3
67 The TCPIP model
68 IP addresses, port numbers, and MAC addresses – Part 1
69 IP addresses, port numbers, and MAC addresses – Part 2
70 IP addresses, port numbers, and MAC addresses – Part 3
71 IP support protocols – Part 1
72 IP support protocols – Part 2
73 Cables – Part 1
74 Cables – Part 2
75 LAN topologies
76 Wi-Fi
77 Wireless networks – Part 1
78 Wireless networks – Part 2
79 VLANs and Routers – Part 1
80 VLANs and Routers – Part 2
81 VPNs, NAC, and third-party connectivity
82 SDN, SD-WAN, and SDX
83 Attacks and attackers – Part 1
84 Attacks and attackers – Part 2
85 Attacks and attackers – Part 3
86 Intrusion Detection and Prevention systems (IDS-IPS) – Part 1
87 Intrusion Detection and Prevention systems (IDS-IPS) – Part 2
88 SIEM and SOAR systems
89 Honeynets and Honeypots
90 Firewalls – Part 1
91 Firewalls – Part 2
92 day attacks and exploits
93 Vulnerability Scanning
94 Virtualization, Cloud, and Distributed Computing – Part 1
95 Virtualization, Cloud, and Distributed Computing – Part 2
96 Virtualization, Cloud, and Distributed Computing – Part 3
97 Virtualization, Cloud, and Distributed Computing – Part 4
98 Virtualization, Cloud, and Distributed Computing – Part 5
99 The Internet of Things (IoT)
100 Asset tracking and hardware hardening
101 Electricity
102 Backups – Part 1
103 Backups – Part 2
104 Fault tolerance, redundancy, and resiliency – Part 1
105 Fault tolerance, redundancy, and resiliency – Part 2
106 Fault tolerance, redundancy, and resiliency – Part 3
107 Fire suppression – Part 1
108 Fire suppression – Part 2
109 Secure design principles – Part 1
110 Secure design principles – Part 2
111 What we covered in Domain 4
112 Certified in Cybersecurity Domain 4 links

Domain 5 Security Operations
113 Domain 5 – What we will be covering.
114 Configuration Management
115 Patch Management.
116 Change Management
117 Cryptography – Part 1
118 Cryptography – Part 2
119 Cryptography – Part 3
120 Hashing
121 Attacks on our cryptography
122 Data handling, data storage and data retention – Part 1
123 Data handling, data storage and data retention – Part 2
124 Data handling, data storage and data retention – Part 3
125 Administrative (Directive) Controls
126 Training and awareness
127 Social Engineering attacks – Part 1
128 Social Engineering attacks – Part 2
129 What we covered in Domain 5
130 Certified in Cybersecurity Domain 5 links

The study process, material, tips, tricks and practice tests!
131 How to approach practice questions
CC Exam emulation – FULL practice test #1
CC Exam emulation – FULL practice test #2
132 How to design your career and certification path.

Homepage