Certified in Cybersecurity (CC) is a professional certification is designed for individuals who work in the cybersecurity industry or are looking to pursue a career in this field.
This is reference material for (ISC)2's a free certification, entitled as Certified in Cybersecurity (CC). People who are interested in learning more about cyber security may get a career and knowledge jump start with the help of this certificate.
This examination is conducted in person and is attentively watched. There are 100 multiple-choice questions (MCQs) on the test, and each one is worth 10 points. The minimum score required to pass is 700.
This reference material will be helpful to all security professionals as well as students who want to brush up on their understanding of cyber security.
This certification covers five different cyber security domains, including
Security Principles
Incident Response, Business Continuity (BC), and Disaster Recovery (DR) Concepts
Access Controls Concepts
Network Security
Security Operations.
For your benefit and convenience, we have divided these five categories into sixteen subjects in this reference material. In order to help both newcomers to the field of cyber security and seasoned experts who want a refresher on these subjects.
NOTE: It has been advised that you read the official (ISC)2 document first before referring to this.
The Topics which will be covered in this Blog are:
(ISC)2 Code of Ethics
Security Concepts
Risk Management
Security Governance
Business Continuity
Incidence Response
Disaster Recovery
Physical Access Control
Logical Access Control
Computer Networking
Network Threats
Threat Identification and Prevention
Network Security Infrastructure
Cloud Computing
Data Security
Security Awareness and Training.
For More information Join Our official WhatsApp group
(ISC)2 Code of Ethics:
Codes of ethics primarily offer instructions for how workers should conduct themselves in an honest and ethical manner. its an mandatory requirement especially for information security professionals act honorably and responsibly.
In other terms, this means that employees must not mistreat the company or compromise important information. He or she is in charge of upholding the integrity and confidentiality of sensitive data belonging to the company they work for.
(ISC)2 also have their own Code of Ethics, and they have 4 cannons: ( This is important for the exam)
Cannon 1: Protect Society and Infrastructure and the Common Good.
Cannon 2: Act Honorably
Cannon 3: Serve Principles diligently and Competently
Cannon 4: Actions as a security Professional should advance and Protect the Information security Profession.
The most important scenario in this topic: If you suspect an (ISC)2 member violates the code of ethics, then you have to report that member about the Breach of the Code of Ethics conducted by them, to (ISC)2 for Investigation.
You may feel why it is important to know the Code of Ethics because even in your workplace this code of ethics will be followed and as a security professional you have to know which activity should be conducted and which should not. you will face 2 - 3 questions from this session.
Ok, for now, we will stop here, we will continue with Security Concepts in the next blog. Then bye until we meet on the next series. this is Sandeep Velayudhan Signing out.
For More information Join Our official WhatsApp group
Reference: https://www.isc2.org/certified-in-cybersecurity
1 Comment