This plan includes
- Limitedfree coursesaccess
- Play & PauseCourse Videos
- VideoRecorded Lectures
- Learn onMobile/PC/Tablet
- Quizzes andReal Projects
- Lifetime CourseCertificate
- Email & ChatSupport
What you'll learn?
- Security Principles
- Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
- Access Controls Concepts
- Network Security
- Security Operations
Course Overview
The Cyber Security training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:
The course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.
Certification:
Upon completion of the course, you will be eligible to sit for the CC certification exam. The exam is administered by ISC2.
Enroll in the CC training course today and take the first step towards becoming certified in cybersecurity.
Why Choose Cyvitrix?
Industry-Relevant Curriculum:We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.
Expert Instructors:Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.
Flexible Learning:We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.
Certification:Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.
Community:Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.
Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.
Why training with us is ideal for you?
- Excellent quality video content
- High courses quality
- Organized materials
- Real life scenarios and examples
- Practice questions and questions ideas
- Up to date content
- Reasonable pricing
Pre-requisites
- No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
Target Audience
- Security Analysts and Managers
- Students who need to gain understanding
- People who are interested in pursuing this certification
- IT Manager, and Analysts
- Auditors and Risk practitioners
- Anyone interested in the subject of the training
Curriculum 90 Lectures 12:28:44
Section 1 : Course Introduction
Section 2 : Domain 1 Security Principles
- Lecture 1 :
- 1-CC1-EN-The Security Objective and CIA Triad
- Lecture 2 :
- 2-CC1-EN-Privacy Requirements and regulations
- Lecture 3 :
- 3-CC1-EN-Risk Management Introduction
- Lecture 4 :
- 4-CC1-EN-Inherent and Residual Risk
- Lecture 5 :
- 5-CC1-EN-Managing the Risk - Risk Response
- Lecture 6 :
- 6-CC1-EN-Reporting and Monitoring the Risk
- Lecture 7 :
- 7-CC1-EN-Introduction to Security Controls
- Lecture 8 :
- 8-CC1-EN-Security Controls Examples
- Lecture 9 :
- 9-CC1-EN-Defens in Depth or layered defenses
- Lecture 10 :
- 10-CC1-EN-ISC2 Code of Ethics
- Lecture 11 :
- 11-CC1-EN-Information System Governance and Management
- Lecture 12 :
- 12-CC1-EN-Policies as Governance Tool
- Lecture 13 :
- 13-CC1-EN-Policies Example
- Lecture 14 :
- 14-CC1-EN-Clear Desk Policy
- Lecture 15 :
- 15-CC1-EN-Acceptable Use Policy - AUP
- Lecture 16 :
- 16-CC1-EN-Standards
- Lecture 17 :
- 17-CC1-EN-Procedures and Guidelines
- Lecture 18 :
- 18-CC1-EN-Law and Legal Regulations
- Lecture 19 :
- 19-CC1-EN-Separation of duties and avoiding conflict of interest
Section 3 : Domain 2 Business Continuity (BC), Disaster Recovery, IRP
- Lecture 1 :
- 1-CC2-EN-Security Threats
- Lecture 2 :
- 2-CC2-EN-Vulnerabilities and Cyber Attacks
- Lecture 3 :
- 3-CC2-EN-Man in the middle attack and Bufferover Flow
- Lecture 4 :
- 4-CC2-EN-Cyber Kill Chain, the Process of Hacking into systems
- Lecture 5 :
- 5-CC2-EN-Incident Management Process
- Lecture 6 :
- 6-CC2-EN-Understand Business Impact Assessment
- Lecture 7 :
- 7-CC2-EN-Disaster Recovery Plan and its components
- Lecture 8 :
- 8-CC2-EN-Business Continuity Plan
- Lecture 9 :
- 9-CC2-EN-Recovery Point Objective and Recovery Time Objective
- Lecture 10 :
- 10-CC2-EN-Acceptable Interruption Window, Service Delivery Objective and MTO
- Lecture 11 :
- 11-CC2-EN-CISA4-Recovery Sites
- Lecture 12 :
- 12-CC2-EN-Testing and evaluating BCP and DRP
- Lecture 13 :
- 13-CC2-EN-Data Backup Overview
- Lecture 14 :
- 14-CC2-EN-Data Backup types and Backup Strategy
- Lecture 15 :
- 15-CC2-EN-Stroage Media types - DAS vs NAS vs SAN
- Lecture 16 :
- 16-CC2-EN-Storage Redundancy using Redundant Array of Independet Disks
Section 4 : Domain 3 Access Control
- Lecture 1 :
- 1-CC3-EN-The IAAA Framework
- Lecture 2 :
- 2-CC3-EN-Authentication
- Lecture 3 :
- 3-CC3-EN-MFA and Biometric
- Lecture 4 :
- 4-CC3-EN-Single Sign on (SSO) and Reduced Sign on (RSO)
- Lecture 5 :
- 5-CC3-EN-Authorisation and Access Control Models
- Lecture 6 :
- 6-CC3-EN-Owner and Custodian and their responsibilities in Assets and data ...
- Lecture 7 :
- 7-CC3-EN-Accounting and Auditing
- Lecture 8 :
- 8-CC3-EN-IAM Solutions
- Lecture 9 :
- 9-CC3-EN-What is Physical Security
- Lecture 10 :
- 10-CC3-EN-Physical Access Control System 1
- Lecture 11 :
- 11-CC3-EN-Physical Access Control System 2
- Lecture 12 :
- 12-CC3-EN-Environmental Controls - Securing Power Sources
- Lecture 13 :
- 13-CC3-EN-Environmental Controls - Fire Threat and Controls
- Lecture 14 :
- 14-CC3-EN-Physical Security Best Practices
Section 5 : Domain 4 Network Security
- Lecture 1 :
- 1-CC4-EN-Introduction to IT Networks
- Lecture 2 :
- 2-CC4-EN-Network Topologies Explaination
- Lecture 3 :
- 3-CC4-EN-CISA4-OSI and TCPIP Model
- Lecture 4 :
- 4-CC4-EN-CISA4-Layers 1,2,3 Overview - IP Address, MAC Address, Physical Layers
- Lecture 5 :
- 5-CC4-EN-Layer 3,4,5,6,7 Overview - TCPUDP - Session and Application Layers
- Lecture 6 :
- 6-CC4-EN-Organization IT Infrastructure and Security Overview
- Lecture 7 :
- 7-CC4-EN-Network Segmentation and VLANs
- Lecture 8 :
- 8-CC4-EN-Firewalls and IPS
- Lecture 9 :
- 9-CC4-EN-Network Admission Control and Dot1x
- Lecture 10 :
- 10-CC4-EN-DMZ and Bastian Host - Screened Subnet
- Lecture 11 :
- 11-CC4-EN-Proxy, Load Balancer, Email Security
- Lecture 12 :
- 12-CC4-EN-VPN Service
- Lecture 13 :
- 13-CC4-EN-Cryptography Overview
- Lecture 14 :
- 14-CC4-EN-Symmetric Encryption
- Lecture 15 :
- 15-CC4-EN-Asymmetric Encryption Overview
- Lecture 16 :
- 16-CC4-EN-Integrity Hashing and Salting
- Lecture 17 :
- 17-CC4-EN-CISA5-Digital Signature
Section 6 : Domain 5 Security Operations
- Lecture 1 :
- 1-CC5-EN-Data Lifecylce
- Lecture 2 :
- 2-CC5-EN-Roles in Data and Assets Protection
- Lecture 3 :
- 3-CC5-EN-Data Security Measures
- Lecture 4 :
- 4-CC5-EN-Data Destruction
- Lecture 5 :
- 5-CC5-EN-Security Operation Center Overview
- Lecture 6 :
- 6-CC5-EN-SOC Tools - SIEM Solution
- Lecture 7 :
- 7-CC5-EN-SOC Tools - FIM Solution
- Lecture 8 :
- 8-CC5-EN-SOC Tools - Vulnerability Scanning tools
- Lecture 9 :
- 9-CC5-EN-SOC Tools - EDR and NDR Overview
- Lecture 10 :
- 10-CC5-EN-SOC Tools - XDR and SOAR Overview
- Lecture 11 :
- 11-CC5-EN-SOC Tools - Threat Intel and IOCs and TTPs
- Lecture 12 :
- 12-CC5-EN-CISA5-End-user Security Software Overview
- Lecture 13 :
- 13-CC5-EN-CISA5-Endpoint Protection Platform Overview - EPP
- Lecture 14 :
- 14-CC5-EN-Configuration Management
- Lecture 15 :
- 15-CC5-EN-Patch Management and Vulnerability Management
- Lecture 16 :
- 16-CC5-EN-Change Management Process
- Lecture 17 :
- 17-CC5-EN-Types of Changes
- Lecture 18 :
- 18-CC5-EN-Introduction to Databases
- Lecture 19 :
- 19-CC5-EN-Database Security Key Concepts
- Lecture 20 :
- 20-CC5-EN-Social Engineering
- Lecture 21 :
- 21-CC5-EN-Security Awareness Program
- Lecture 22 :
- 22-CC5-EN-Software development methodologies overview
- Lecture 23 :
- 23-Security Testing - PT, SAST, SCA
Our learners work at
Frequently Asked Questions
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.Is there any free trial?
Currently, we do not offer any free trial.Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
39381 Course Views
10 Courses