category
Certified In Cybersecurity – Self-paced – Tier 2
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R7 500,00
Price excluding VAT
Tier 2
Pricing is applicable to only the following countries: South Africa, Equatorial New Guinea, Mauritius.
Introduction
ISC2 is the world’s largest non-profit cybersecurity membership association, known for creating the industry’s gold standard credential, the CISSP, and other top cybersecurity certifications — all requiring work experience.
What makes Certified in Cybersecurity (CC) so unique is that it requires no experience or formal education — only basic knowledge of information technology IT (Information Technology) is recommended. In that sense, it opens opportunities in cybersecurity to a much broader pool of candidates, including recent graduates, career changers and IT professionals.
As the true entry point to career excellence, Certified in Cybersecurity starts newcomers on their path to advanced cybersecurity certifications and future leadership roles.
For organisations, it helps develop new talent for their teams to build a stronger line of defence. It gives them the assurance that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles.
Audience Profile
CC training is ideal for individuals who are at entry-level and desire to serve their interest in cybersecurity as a career.
|
|
|
|
|
|
|
|
Pre-requisites
There are no specific prerequisites to take the exam. No work experience in cybersecurity or formal education diploma/degree is required.
What is included?
- Self-paced online adaptive learning journey
- Data-driven analytics dashboard for real-time feedback on learner progress
- Robust search functionality to narrow topics
- Pre- and post-course assessments
- Knowledge checks and end-of-domain quizzes
- Official ISC2 eTextbook for the certification – Valid for 6 months/180 Days from date of fulfilment
- Single Use ISC2 Certification Exam Voucher – Valid for 12 months/365 Days from date of fulfilment
- Interactive content
- Domain-by-domain study sheets with key points
- Email content support (membersupport@isc2.org/membersupportemea@isc2.org)
- Online interactive flash cards
- Glossary of Terms
- 24/7/365 chat technical support
What Is Online Self-Paced Training?
ISC2 Self-Paced Training enables a flexible and engaging learning experience which gives you the freedom and confidence to move ahead on your schedule, without sacrificing quality for convenience. Throughout the entire learning experience, you have on-demand access to interactive learning content and industry topics to reinforce the material and increase your knowledge retention. Course activities which draw from real-world scenarios and a learning Plan helps you stay on track with your studies and help you prepare for your ISC2 certification exam.
How is the Self-Paced Course Accessed?
An access key and instructions will be sent via email after your purchase is complete.
You may then login anytime at https://my.isc2.org/s/login/
Course Objectives
On completion of this program, the participants will be able to:
- Discuss the foundational concepts of cybersecurity principles
- Recognize foundational security concepts of information assurance
- Define risk management terminology and summarize the process
- Relate risk management to personal or professional practices
- Classify types of security controls
- Distinguish between policies, procedures, standards, regulations and laws
- Demonstrate the relationship among governance elements
- Analyse appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples
- Practice the terminology of and review security policies
- Explain how organisations respond to, recover from and continue to operate during unplanned disruptions
- Recall the terms and components of incident response
- Summarize the components of a business continuity plan
- Identify the components of disaster recovery
- Practice the terminology and review concepts of business continuity, disaster recovery and incident response
- Select access controls that are appropriate in a given scenario
- Relate access control concepts and processes to given scenarios
- Compare various physical access controls
- Describe logical access controls
- Practice the terminology and review concepts of access controls
- Explain the concepts of network security
- Recognize common networking terms and models
- Identify common protocols and port and their secure counterparts
- Identify types of networks (cyber) threats and attacks
- Discuss common tools used to identify and prevent threats
- Identify common data centre terminology
- Recognize common cloud service terminology
- Identify secure network design terminology
- Practice the terminology and review concepts of network security
- Explain concepts of security operations
- Discuss data handling best practices
- Identify key concepts of logging and monitoring
- Summarize the different types of encryptions and their common uses
- Describe the concepts of configuration management
- Explain the application of common security policies
- Discuss the importance of security awareness training
- Practice the terminology and review concepts of network operations
| Exam Domains |
| Domain 1: Security Principles |
| Domain 2: Business Continuity (BD), Disaster Recovery (DR), & Incident Response Concepts |
| Domain 3: Access Control Concepts |
| Domain 4: Network Security |
| Domain 5: Security Operations |
Course Content
| Chapter 1: Security Principles |
| Module 1: Understand the Security Concepts of Information Assurance |
| Module 2: Understand the Risk Management Processes |
| Module 3: Understand Security Controls |
| Module 4: Understand Governance Elements |
| Chapter 2: Incident Response, Business Continuity and Disaster Recovery |
| Module 1: Understand Incident Response |
| Module 2: Understand Business Continuity |
| Module 3: Understand Disaster Recovery |
| Chapter 3: Access Controls Concepts |
| Module 1: Understand Access Control Concepts |
| Module 2: Understand Physical Access Controls |
| Module 3: Understand Logical Access Controls |
| Chapter 4: Network Security |
| Module 1: Understand Computer Networking |
| Module 2: Understand Network (Cyber) Threats and Attacks |
| Module 3: Understand Network Security Infrastructure |
| Chapter 5: Security Operations |
| Module 1: Understand Data Security |
| Module 2: Understand System Hardening |
| Module 3: Understand Best Practice Security Policies |
| Module 4: Understand Security Awareness Training |
| Chapter 6: Course Summary and Test Preparations |
| Module 1: Certification Requirements |
| Module 2: Scheduling the Exam |
| Module 3: Before the Exam |
| Module 4: Day of Exam |
| Module 5: Tips for Reading the Questions |
Benefits of Certified in Cybersecurity
For the Individual:
- Respect: Validates knowledge and willingness to learn. It’s a way to be considered for an entry or junior level cybersecurity position
- Job Offer or Advancement: Helps individuals demonstrate foundational cybersecurity knowledge employers are looking for, from an association they trust
- Growth and Learning: Access to professional development opportunities and courses available to ISC2 members
- Pathway to the CISSP and/or a Career in Cybersecurity: Builds a strong foundation for a cybersecurity career
- Community of Professionals: Enables access to a network of peers
- Higher Salary: ISC2 members report 35% higher annual salary than non-member
For the Organisation:
- Lowers Hiring Risk: Signals a candidate’s foundational understanding of key cybersecurity concepts, and their willingness and ability to learn more and grow on the job
- Long-term Resiliency: Investing and developing entry and junior talent will help build long-term resiliency
- Improve Cybersecurity Coherence across the Organisation: Ensure professionals speak the same language across disciplines and have cross-departmental perspectives
- Instant Credibility: Increase organisational integrity in the eyes of clients and other stakeholders
Associated Certifications and Exam
The Certified in Cybersecurity entry-level credential was launched to introduce a much wider pool of candidates to the field and help close the workforce gap.
| Exam Details | Certified Cybersecurity |
| Exam Title | Certified Cybersecurity |
| Number of Questions/Practical Challenges | 100 Questions |
| Test Duration | 2 Hours |
| Test Format | Multiple choice questions |
| Test Delivery | Pearson VUE |
| Availability | Chinese, English, German, Japanese, Korean, Spanish. |
| Passing Score | 700/1000 |
ISC2 Overview
In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish holistic security programs that assure the protection of an organisations information assets.
ISC2 is an international non-profit membership association focused on inspiring a safe and secure cyber world. Today, based in the United States, ISC2 serves its global membership from its headquarters in Alexandria, Virginia, along with a portfolio of credentials and world-class education programs in the form of vendor-neutral education products and career services.
Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, ISC2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
ISC2 members, candidates and associates, nearly 675,000 strong, are made up of certified cyber, information, software and infrastructure security professionals who are making a difference and helping to advance the industry. ISC2 members represent an elite, global network of dedicated cybersecurity professionals – preeminent experts in their field – who have committed themselves to the highest ethical standards and best practices. All members are certified professionals who have passed ISC2 examinations attesting to skill and knowledge in their field. Through their ISC2 certification, they have demonstrated superior competency and devoted themselves to making the cyber world a safer place for all.
Torque IT is the longest standing Official Training Partner (OTP) in South Africa and has maintained the status of one of the leading ISC2 accredited training organizations in South Africa. Torque IT remains the Only Preferred OTP in the South Africa. As a leading and established training provider of cybersecurity education and certification, Torque IT is committed to expanding our offerings and promoting cybersecurity awareness and expertise across all ISC2 Certifications and throughout South Africa and various African countries.