Entry-Level Cybersecurity Certification


If you’re looking for a career change, want to break into the cybersecurity industry, or are just starting your IT journey, this training is perfect for you. The best part? You don’t need a technical background to enroll. Cybersecurity is one of the most in-demand skills in the market today, and with this foundational knowledge, you will be ready to take your first steps into this exciting field.

Security

in

Information Governance


Training is critical to the success of any security program. By raising awareness and teaching best practices, employees can help to reduce the risk of a data breach. However, training must be ongoing and tailored to the needs of the organization. Cybersecurity is an ever-changing field, and new threats are constantly emerging. As a result, it is important to keep employees up to date on the latest cybersecurity risks and trends. Furthermore, security training must be relevant to the specific job functions of each employee. By tailoring training to the needs of each individual, organizations can ensure that employees are better equipped to protect company data. Ultimately, a comprehensive security program is only as strong as its weakest link. By investing in employee training, organizations can help to close any gaps in their defenses.

Choose a Date


Course Objectives


Chapters Covered in this Course:

This course covers the following chapters and modules:

Chapter 1: Security Principles

  • Module 1: Understand the security concepts of information assurance
  • Module 2: Understand the risk management concepts
  • Module 3: Understand security controls
  • Module 4: Understand governance processes
  • Module 5: Understand (ISC)² Code of Ethics

Chapter 2: Incident Response, Business Continuity (BC), and Disaster Recovery (DR)

  • Module 1: Understand incident response
  • Module 2: Understand business continuity (BC)
  • Module 3: Understand disaster recovery (DR)

Chapter 3: Access Controls Concepts

  • Module 1: Understand access control concepts
  • Module 2: Understand physical access controls
  • Module 3: Understand logical access controls

Chapter 4: Network Security

  • Module 1: Understand computer networking
  • Module 2: Understand network threats and attacks
  • Module 3: Understand network security infrastructure

Chapter 5: Security Operations

  • Module 1: Understand data security
  • Module 2: Understand system hardening
  • Module 3: Understand best practice security policies
  • Module 4: Understand security awareness training

Chapter 6: Course Summary and Exam Details

  • Module 1: Work experience requirements
  • Module 2: Scheduling the exam
  • Module 3: Before the exam
  • Module 4: After the exam
  • Module 5: Exam Tips
  • Module 6: Review Summary

Note: Course materials are organized by chapter not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline. The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.




Technology Requirements


The following are system requirements needed to enhance your overall learning experience.

A stable and continuous internet connection is required. In order to record your completion of the online learning courses, please ensure you are connected to the internet at all times while taking the course.



Hardware Specifications:

  • Processor 2 GHz +
  • RAM 4 GB +
  • Monitor minimum resolution (1024 x 768)
  • Video Card
  • Keyboard and Mouse or other assistive technology

Computer Peripherals:

  • Speakers/Headphones – (Noise-cancelling headset is recommended)
  • Microphone
  • Camera (recommended)

Supported Operating Systems:

  • Macintosh OS X 10.10 to present
  • Windows 10 to present

Supported Browsers:

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox

Application Software:

Live Sessions:

Note, the live sessions will only become available to participants at the scheduled start time listed, but we recommend logging in ten minutes ahead of time.

These (ISC)² Instructor-led sessions leverage the Webex meeting platform. Please ensure that you are able to join your Webex sessions prior to joining the class.

To join these live sessions on Webex you will need a computer (Windows or Apple) or mobile device with internet access and speakers.


Frequently Asked Questions


Q: Why is (ISC)² developing an entry-level certification?

A: Research from (ISC)² and InfoGov.com continues to conclude that there is a global shortage of qualified cybersecurity professionals. While there are many contributing factors, we believe one solution is to create a certification that enables candidates – including students, young professionals and career-changers – to demonstrate to employers their familiarity with foundational cybersecurity concepts as determined by cybersecurity professionals and practitioners already in the field.


Q: What is (ISC)² Certified in Cybersecurity℠?

A: (ISC)² Certified in Cybersecurity is a foundational cybersecurity certification designed to help recipients build a pathway to a rewarding career in cybersecurity. This entry-level certification will prove to employers you have the foundational knowledge, skills and abilities necessary for an entry- or junior-level cybersecurity role. It proves your willingness and ability to learn and grow on the job.


Q: Who should consider participating in this opportunity?

A: The Certified in Cybersecurity entry-level certification is ideal for:

  • IT professionals
  • Career changers
  • College students or recent graduates
  • Advanced high school students or recent graduates


Q: How much work experience is required to earn this certification?

A: Unlike other (ISC)² certifications, there is no work experience requirement to earn the entry-level Certified in Cybersecurity certification.


Q: Why will this certification be different from other foundational certifications?

A: We believe a need still exists in our industry for a certification that is attainable for newcomers and recognizes the growing trend of people entering the cybersecurity workforce without direct IT experience. Employers need confidence that when hiring new entrants into the field they have a solid grasp of the right technical concepts, and a demonstrated aptitude to learn on the job. Moreover, as an (ISC)² certification, the recipient will be an (ISC)² member backed by the world’s largest network of certified cybersecurity professionals helping them continue their professional development and earn new achievements and qualifications throughout their career.


Q: What can I expect from the online instructor-led course?

A: The online instructor-led course is mix of live sessions led by an authorized (ISC)2 instructor and an engaging online self-paced experience to build a solid foundation of knowledge tested on the entry-level Certified in Cybersecurity (CC) exam. This 14-hour blended learning experience features:

  • 8 hours of live instruction
  • 6 hours of self-paced content in preparation of live sessions
  • Peer discussions
  • Pre- and post-course assessments
  • Knowledge checks and end-of chapter study sheets and quizzes
  • Online interactive flashcards
  • 180-day access to recorded live sessions and self-paced content

Q: Can I take the exam without starting or completing the education course?

A: Yes, you can take the exam at any time you feel ready.


Q: How do I schedule my course?

A: Upon purchasing coaching, you'll receive further instructions on how to book a time for your appointment.


Q: Can I purchase coaching more than once?

A: Absolutely! If you find yourself in need of coaching more than once, simply purchase the coaching again.