10% Discount Available | Enrolment Deadline 31st December

Logo

ISC2 Certified in Cybersecurity® (CC®)

This accelerated entry-level certification helps you develop essential cybersecurity knowledge. You don't need work experience, just the passion and drive to enter a challenging and rewarding field that protects the world from bad actors.

What you’ll learn

This entry-level cybersecurity certification will prove to employers that you have the foundational knowledge, skills, and abilities necessary for an entry- or junior-level cybersecurity role.

ISC2 CC will signal your understanding of fundamental security best practices, policies and procedures, as well as your willingness and ability to learn more and grow on the job. It's the first step on a career-long journey that will help you gain experience and work towards advanced qualifications such as the CISSP and CCSP.

We believe a need still exists in our industry for a certification that is attainable for newcomers and recognizes the growing trend of people entering the cybersecurity workforce without direct IT experience. Employers need confidence that when hiring new entrants into the field they have a solid grasp of the right technical concepts, and a demonstrated aptitude to learn on the job. Moreover, as an ISC2 certification, the recipient will be an ISC2 member backed by the world's largest network of certified cybersecurity professionals helping them continue their professional development and earn new achievements and qualifications throughout their career.

Curriculum

  • 1.1 Understand the security concepts of information assurance Confidentiality Integrity Availability Authentication (e.g., methods of authentication, multi-factor authentication (MFA)) Non-repudiation Privacy
  • 1.2 Understand the risk management process Risk management (e.g., risk priorities, risk tolerance) Risk identification, assessment and treatment
  • 1.3 Understand security controls Technical controls Administrative controls Physical controls
  • 1.4 Understand ISC2 Code of Ethics Professional code of conduct
  • 1.5 Understand governance processes Policies Procedures Standards Regulations and laws
  • 2.1 Understand business continuity (BC) Purpose Importance Components
  • 2.2 Understand disaster recovery (DR) Purpose Importance Components
  • 2.3 Understand incident response Purpose Importance Components
  • 3.1 Understand physical access controls Physical security controls (e.g., badge systems, gate entry, environmental design) Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs) Authorized versus unauthorized personnel
  • 3.2 Understand logical access controls Principle of least privilege Segregation of duties Discretionary access control (DAC) Mandatory access control (MAC) Role-based access control (RBAC)
  • 4.1 Understand computer networking Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi) Ports Applications
  • 4.2 Understand network threats and attacks Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel) Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS)) Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
  • 4.3 Understand network security infrastructure On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA)) Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT)) Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
  • 5.1 Understand data security Encryption (e.g., symmetric, asymmetric, hashing) Data handling (e.g., destruction, retention, classification, labeling) Logging and monitoring security events
  • 5.2 Understand system hardening Configuration management (e.g., baselines, updates, patches)
  • 5.3 Understand best practice security policies Data handling policy Password policy Acceptable Use Policy (AUP) Bring your own device (BYOD) policy Change management policy (e.g., documentation, approval, rollback) Privacy policy 5.4 Understand security awareness training Purpose/concepts (e.g., social engineering, password protection) Importance

Prerequisites

Unlike other ISC2 certifications, there is no work experience requirement to earn this certification.

Exam info

At the end of this accelerated course, you can sit the official ISC2 CC exam at any Pearson VUE Authorized Test Center, covered by your Firebrand Certification Guarantee.

Domains:

Security Principles (26%)

Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%)

Access Controls Concepts (22%)

Network Security (24%)

Security Operations (18%)

Upcoming Courses

Filter courses by learning type:

Sorry, there are currently no dates available for this course. Please submit an enquiry and one of our team will contact you about potential future dates or alternative options.

FAQs

Yes, we do provide courses suitable for beginners. However, Firebrand's accelerated courses aren't easy and it's essential that you are interested and actively pursuing a career in IT.

Traditional training providers usually run their courses from 9am to 5pm. At Firebrand Training we maximise the number of learning hours to minimise the number of training days, so you’ll be back to your job as quickly as possible. You don’t waste time travelling to several courses and finding an exam centre after that.

Firebrand's accelerated courses are constantly reviewed. We ask our delegates for feedback after every course. We are official partners with leading vendors and therefore, we're provided with certification changes and updates, which we can then implement in our course delivery at a very early stage. This feedback is then analysed in view of changes or discrepancies. We will then address the topics mentioned and have a panel of subject matter experts provide us with valuable suggestions for improvement and solutions.

If you need to learn new skills and you want to be able to put them into practice quickly, then Firebrand is the right training company for you.

Our unique accelerated training method means that we are your fastest way to learn. By delivering training for up to 12 hours per day, seven days per week, with exam centres on-site, we ensure that you are trained and certified quicker than anywhere else, having spent less time out of the office away from the day job.

Can't find the answer you're looking for?

Our expert learning advisors are ready to help. Whether you need course recommendations, have technical queries, or want to discuss your learning goals, we're just a message away.

Train your team

Since 2001 we’ve trained 134,561 employees from thousands of large and small organisations, saving them more than one million hours in training time.