CC – Certified in Cybersecurity Certification Prep

Learn the fundamentals of cybersecurity and prepare for an entry-level role with the CC – Certified in Cybersecurity course. This program covers essential topics such as cybersecurity principles, risk management, security controls, governance, the Code of Ethics, incident response, and disaster recovery. Equip yourself with the knowledge and skills necessary to succeed in the cybersecurity field.
Course Details

Price:

$1,095.00

Days:

1

Location:

Virtual

Course Overview

Learn the fundamentals of cybersecurity and prepare for an entry-level role with the CC – Certified in Cybersecurity course. This program covers essential topics such as cybersecurity principles, risk management, security controls, governance, the Code of Ethics, incident response, and disaster recovery. Equip yourself with the knowledge and skills necessary to succeed in the cybersecurity field.

– • Discuss the foundational concepts of cybersecurity principles
– • Recognize foundational security concepts of information assurance
– • Define risk management terminology and summarize the process
– • Relate risk management to personal or professional practices
– • Classify types of security controls
– • Distinguish between policies, procedures, standards, regulations, and laws
– • Demonstrate the relationship among governance elements
– • Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples
– • Practice the terminology of and review security policies
– • Explain how organizations respond to, recover from, and continue to operate during unplanned disruptions
– • Recall the terms and components of incident response
– • Summarize the components of a business continuity plan
– • Identify the components of disaster recovery
– • Practice the terminology and review concepts of business continuity, disaster recovery, and incident response
– • Select access controls that are appropriate in a given scenario
– • Relate access control concepts and processes to given scenarios
– • Compare various physical access controls
– • Describe logical access controls
– • Practice the terminology and review concepts of access controls
– • Explain the concepts of network security
– • Recognize common networking terms and models
– • Identify common protocols and ports and their secure counterparts
– • Identify types of network (cyber) threats and attacks
– • Discuss common tools used to identify and prevent threats
– • Identify common data center terminology
– • Recognize common cloud service terminology
– • Identify secure network design terminology
– • Practice the terminology and review concepts of network security
– • Explain concepts of security operations
– • Discuss data handling best practices
– • Identify key concepts of logging and monitoring
– • Summarize the different types of encryption and their common uses
– • Describe the concepts of configuration management
– • Explain the application of common security policies
– • Discuss the importance of security awareness training
– • Practice the terminology and review concepts of network operations

No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.

• Network Security
• Access Controls Concepts
• Security Operations
• Incident Response
• Business Continuity and Disaster Recovery Concepts
• Security Principles

Class Dates & Times
Filters Sort results
Reset Apply
7/7/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,095.00
9/8/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,095.00
11/3/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$1,095.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.