Great Learning Education Centre

Certified in Cybersecurity

Enquire Now

Course Information

Schedules
  • 27 Feb 2025 (Thu) 7:00 PM - 10:00 PM
Registration period
12 Feb 2025 (Wed) - 26 Feb 2025 (Wed)
Price
HKD 4,000
Course Level
Study Mode
Duration
15 Hour(s)
Language
Cantonese, English
Location
Unit A, 20/F, Success Commercial Building, 245-251 Hennessy Road, Wanchai, Hong Kong
2 views

Course Overview

 

The Certified in Cybersecurity (CC) certification will demonstrate to employers that you have foundational knowledge of industry terminology, network security, security operations and policies and procedures that are necessary for an entry- or junior-level cybersecurity role. It will signal your understanding of fundamental security best practices, policies and procedures, as well as your willingness and ability to learn more and grow on the job.      

Course Objectives

After completing this course, you will be able to:

  1. Discuss the foundational concepts of cybersecurity principles.
  2. Recognize foundational security concepts of information assurance.
  3. Define risk management terminology and summarize the process.
  4. Relate risk management to personal or professional practices.
  5. Classify types of security controls.
  6. Distinguish between policies, procedures, standards, regulations and laws.
  7. Demonstrate the relationship among governance elements.
  8. Analyze appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples.
  9. Practice the terminology of and review security policies.
  10. Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
  11. Recall the terms and components of incident response.
  12. Summarize the components of a business continuity plan.
  13. Identify the components of disaster recovery.
  14. Practice the terminology and review concepts of business continuity, disaster recovery and incident response.
  15. Select access controls that are appropriate in a given scenario.
  16. Relate access control concepts and processes to given scenarios.
  17. Compare various physical access controls.
  18. Describe logical access controls.
  19. Practice the terminology and review concepts of access controls.
  20. Explain the concepts of network security.
  21. Recognize common networking terms and models.
  22. Identify common protocols and ports and their secure counterparts.
  23. Identify types of network (cyber) threats and attacks.
  24. Discuss common tools used to identify and prevent threats.
  25. Identifycommon data center terminology.
  26. Recognize common cloud service terminology.
  27. Identify secure network design terminology.
  28. Practice the terminology and review concepts of network security.
  29. Explain concepts of security operations.
  30. Discuss data handling best practices.
  31. Identify key concepts of logging and monitoring.
  32. Summarize the different types of encryption and their common uses.
  33. Describe the concepts of configuration management.
  34. Explain the application of common security policies.
  35. Discuss the importance of security awareness training.
  36. Practice the terminology and review concepts of network operations.
 

 

What You’ll Learn

 

Security Principles
Module 1: Understand the Security Concepts of Information Assurance
Module 2: Understand the Risk Management Process
Module 3: Understand Security Controls
Module 4: Understand Governance Elements and Processes
Module 5: Understand ISC2 Code of Ethics

2: Incident Response, Business Continuity and Disaster Recovery Concepts
Module 1: Understand Incident Response
Module 2: Understand Business Continuity (BC)
Module 3: Understand Disaster Recovery (DR)

3: Access Control Concepts
Module 1: Understand Access Control Concepts
Module 2: Understand Physical Access Controls
Module 3: Understand Logical Access Controls

4: Network Security
Module 1: Understand Computer Networking
Module 2: Understand Network (Cyber) Threats and Attacks
Module 3: Understand Network Security Infrastructure

5: Security Operations
Module 1: Understand Data Security
Module 2: Understand System Hardening
Module 3: Understand Best Practice Security Policies
Module 4: Understand Security Awareness Training

 

 



Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed