وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Complete Certified in Cybersecurity (CC) course ISC2 ’23

سرفصل های دوره

Start your Cyber security career today! Take the Complete Certified in Cybersecurity (CC) beginners course ISC2 - 2023


1. Introduction
  • 1.1 2022 ThorTeaches CC Study Guides Chapter 1 v1.2.pdf
  • 1.2 2022 ThorTeaches CC Study Guides Chapter 2 v1.1.pdf
  • 1.3 2022 ThorTeaches CC Study Guides Chapter 3 v1.1.pdf
  • 1.4 2022 ThorTeaches CC Study Guides Chapter 4 v1.1.pdf
  • 1.5 2022 ThorTeaches CC Study Guides Chapter 5 v1.pdf
  • 1.6 2023 CC Mnemonics by ThorTeaches.pdf
  • 1. Introduction and download your free study guides.
  • 2. Connect with me on Social media and the Udemy ratings system
  • 3. How to get the most out of my courses and the Udemy interface
  • 4. General Certified in Cybersecurity links.html

  • 2. CC Domain 1 Security Principles
  • 1. Domain 1 - What we will be covering.
  • 2. The differences between Information Security, IT Security, and Cybersecurity.
  • 3. The CIA Triad - Confidentiality, Integrity, and Availability - part 1
  • 4. The CIA Triad - Confidentiality, Integrity, and Availability - part 2
  • 5. The CIA Triad - Confidentiality, Integrity, and Availability - part 3
  • 6. The CIA Triad - Confidentiality, Integrity, and Availability - part 4
  • 7. The CIA Triad - Confidentiality, Integrity, and Availability - part 5
  • 8. The CIA Triad - Confidentiality, Integrity, and Availability - Quiz.html
  • 9. IAAA -Identification, Authentication, Authorization, and Accountability - part 1
  • 10. IAAA -Identification, Authentication, Authorization, and Accountability - part 2
  • 11. IAAA -Identification, Authentication, Authorization, and Accountability - part 3
  • 12. IAAA -Identification, Authentication, Authorization, and Accountability - part 4
  • 13. IAAA -Identification, Authentication, Authorization, and Accountability - part 5
  • 14. IAAA -Identification, Authentication, Authorization, and Accountability - Quiz.html
  • 15. Privacy
  • 16. Risk Management - part 1
  • 17. Risk Management - part 2
  • 18. Risk Management - part 3
  • 19. Risk Management - part 4
  • 20. Risk Management - part 5
  • 21. Risk Management - part 6
  • 22. Risk Management - Quiz.html
  • 23. Access Control Categories and Types - part 1
  • 24. Access Control Categories and Types - part 2
  • 25. Access Control Categories and Types Quiz.html
  • 26. The Ethics of your organizations and (ISC)2
  • 27. Governance vs. Management
  • 28. Laws and regulations - part 1
  • 29. Laws and regulations - part 2
  • 30. Security governance principles
  • 31. Policies, procedures, standards, laws, and regulations quiz.html
  • 32. What we covered in Domain 1
  • 33. Certified in Cybersecurity Domain 1 links.html

  • 3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response
  • 1. Domain 2 - What we will be covering.
  • 2. BCP - Business Continuity Planning - Part 1
  • 3. BCP - Business Continuity Planning - Part 2
  • 4. BCP - Business Continuity Planning - Part 3
  • 5. BCP - Business Continuity Planning - Quiz.html
  • 6. DRP - Disaster Recovery Planning - Part 1
  • 7. DRP - Disaster Recovery Planning - Part 2
  • 8. DRP - Disaster Recovery Planning - Part 3
  • 9. DRP - Disaster Recovery Planning - Part 4
  • 10. DRP - Disaster Recovery Planning - Quiz.html
  • 11. Incidents Response - Part 1
  • 12. Incidents Response - Part 2
  • 13. Incidents Response - Part 3
  • 14. Incidents Response - Part 4
  • 15. Incidents Response - Part 5
  • 16. Incidence response Quiz.html
  • 17. What we covered in Domain 2
  • 18. Certified in Cybersecurity Domain 2 links.html

  • 4. Domain 3 Access Controls Concepts
  • 1. Domain 3 - What we will be covering.
  • 2. Physical Security - part 1
  • 3. Physical Security - part 2
  • 4. Physical Security - part 3
  • 5. Physical Security - part 5
  • 6. Physical Security - part 4
  • 7. Physical Security Quiz.html
  • 8. Logical Access Control - Part 1
  • 9. Logical Access Control - Part 2
  • 10. Logical Access Control - Part 3
  • 11. Logical Access Control - Part 4
  • 12. Logical Access Control - Part 5
  • 13. Logical Access Control quiz.html
  • 14. What we covered in Domain 3
  • 15. Certified in Cybersecurity Domain 3 links.html

  • 5. Domain 4 Network Security
  • 1. Domain 4 - What we will be covering.
  • 2. Network Basics and Definitions - Part 1
  • 3. Network Basics and Definitions - Part 2
  • 4. Network Basics and Definitions - Quiz.html
  • 5. The OSI Model - Part 1
  • 6. The OSI Model - Part 2
  • 7. The OSI Model - Part 3
  • 8. The TCPIP model
  • 9. The OSI and TCPIP Model Quiz.html
  • 10. IP addresses, port numbers, and MAC addresses - Part 1
  • 11. IP addresses, port numbers, and MAC addresses - Part 2
  • 12. IP addresses, port numbers, and MAC addresses - Part 3
  • 13. IP addresses, port numbers, and MAC addresses - Quiz.html
  • 14. IP support protocols - Part 1
  • 15. IP support protocols - Part 2
  • 16. Cables - Part 1
  • 17. Cables - Part 2
  • 18. LAN topologies
  • 19. Wi-Fi
  • 20. Wireless networks - Part 1
  • 21. Wireless networks - Part 2
  • 22. VLANs and Routers - Part 1
  • 23. VLANs and Routers - Part 2
  • 24. VPNs, NAC, and third-party connectivity
  • 25. SDN, SD-WAN, and SDX
  • 26. DMZ, VLAN, VPN, Microsegmentation, Defense in depth, NAC IOT Quiz.html
  • 27. Attacks and attackers - Part 1
  • 28. Attacks and attackers - Part 2
  • 29. Attacks and attackers - Part 3
  • 30. Attacks and attackers Quiz.html
  • 31. Intrusion Detection and Prevention systems (IDS-IPS) - Part 1
  • 32. Intrusion Detection and Prevention systems (IDS-IPS) - Part 2
  • 33. Intrusion Detection and Prevention systems quiz.html
  • 34. SIEM and SOAR systems
  • 35. Honeynets and Honeypots
  • 36. Firewalls - Part 1
  • 37. Firewalls - Part 2
  • 38. 0-day attacks and exploits
  • 39. Vulnerability Scanning
  • 40. Virtualization, Cloud, and Distributed Computing - Part 1
  • 41. Virtualization, Cloud, and Distributed Computing - Part 2
  • 42. Virtualization, Cloud, and Distributed Computing - Part 3
  • 43. Virtualization, Cloud, and Distributed Computing - Part 4
  • 44. Virtualization, Cloud, and Distributed Computing - Part 5
  • 45. Virtualization, Cloud, and Distributed Computing - Quiz.html
  • 46. The Internet of Things (IoT)
  • 47. Asset tracking and hardware hardening
  • 48. Electricity
  • 49. Backups - Part 1
  • 50. Backups - Part 2
  • 51. Fault tolerance, redundancy, and resiliency - Part 1
  • 52. Fault tolerance, redundancy, and resiliency - Part 2
  • 53. Fault tolerance, redundancy, and resiliency - Part 3
  • 54. Fire suppression - Part 1
  • 55. Fire suppression - Part 2
  • 56. Data Centers Quiz.html
  • 57. Secure design principles - Part 1
  • 58. Secure design principles - Part 2
  • 59. What we covered in Domain 4
  • 60. Certified in Cybersecurity Domain 4 links.html

  • 6. Domain 5 Security Operations
  • 1. Domain 5 - What we will be covering.
  • 2. Configuration Management
  • 3. Patch Management.
  • 4. Change Management
  • 5. Change, patch, configuration management - Quiz.html
  • 6. Cryptography - Part 1
  • 7. Cryptography - Part 2
  • 8. Cryptography - Part 3
  • 9. Hashing
  • 10. Attacks on our cryptography
  • 11. Encryption Quiz.html
  • 12. Data handling, data storage and data retention - Part 1
  • 13. Data handling, data storage and data retention - Part 2
  • 14. Data handling, data storage and data retention - Part 3
  • 15. Retention, classification, labeling quiz.html
  • 16. Administrative (Directive) Controls
  • 17. Training and awareness
  • 18. Social Engineering attacks - Part 1
  • 19. Social Engineering attacks - Part 2
  • 20. Training. awareness and social engineering quiz.html
  • 21. What we covered in Domain 5
  • 22. Certified in Cybersecurity Domain 5 links.html

  • 7. The study process, material, tips, tricks and practice tests!
  • 1. How to approach practice questions
  • 2. CC Exam emulation - FULL practice test #1.html
  • 3. CC Exam emulation - FULL practice test #2.html
  • 4. How to design your career and certification path.
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 3239
    حجم: 6367 مگابایت
    مدت زمان: 874 دقیقه
    تاریخ انتشار: 29 دی 1401
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید