Holiday Skills Carnival:
 Buy 1 Get 1 FREE
Days
Hours
Minutes
Seconds

Program Highlights

InfosecTrain’s Certified in Cybersecurity (CC) training course is excellent for entry-level cybersecurity professionals. Certification in Cybersecurity demonstrates to employers that you have a thorough understanding of the appropriate technical principles and a demonstrated ability to learn while working.

  • 16-Hour LIVE Instructor-led Training16-Hour LIVE Instructor-led Training
  • Full 5 Domain Exam PracticeFull 5 Domain Exam Practice
  • Learn with Real-world ScenariosLearn with Real-world Scenarios
  • Highly Interactive & Dynamic SessionsHighly Interactive & Dynamic Sessions
  • Immersive LearningImmersive Learning
  • Learn from Industry ExpertsLearn from Industry Experts
  • Career Guidance & MentorshipCareer Guidance & Mentorship
  • Extended Post Training SupportExtended Post Training Support
  • Access to Recorded SessionsAccess to Recorded Sessions

Training Schedule

  • upcoming classes
  • corporate training
  • 1 on 1 training
Upcoming classes
Start - End Date Training Mode Batch Type Start - End Time Batch Status
08 Dec - 18 Dec Online Weekday 20:00 - 22:00 IST BATCH OPEN
05 Jan - 15 Jan Online Weekday 20:00 - 22:00 IST BATCH OPEN
corporate training

Why Choose Our Corporate Training Solution

  • Upskill your team on the latest tech
  • Highly customized solutions
  • Free Training Needs Analysis
  • Skill-specific training delivery
  • Secure your organizations inside-out

Seeking Corporate Training?

Discover Tailored Solutions for your unique needs. Request a Quote Today!

1-on-1 training

Why Choose 1-on-1 Training

  • Get personalized attention
  • Customized content
  • Learn at your dedicated hour
  • Instant clarification of doubt
  • Guaranteed to run

Desire Personalized Attention?

Request for exclusive batches that are tailored just for you, with flexible schedules.
Ask for 1-on-1 Training Now!

Can't Find a Suitable Schedule? Talk to Our Training Advisor!

Loading...
Offer|InfosecTrain
About Course

The Certified in Cybersecurity (CC) training course from InfosecTrain offers a comprehensive introduction to the field of cybersecurity, aligned with (ISC)² standards. This foundational course covers five key domains: Security Principles, Business Continuity and Disaster Recovery, Access Controls, Network Security, and Security Operations. Participants will understand essential topics such as risk management, ethical guidelines, physical and logical access controls, networking, and system hardening.

Certified in Cybersecurity (CC) training program equips both new entrants and seasoned professionals with the knowledge to tackle cybersecurity challenges and prepares them for the Certified in Cybersecurity exam. Ideal for IT professionals, career changers, and students, this course is a critical step toward a successful career in cybersecurity.

Domains Overview

Security Principles  26%
Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR)  10%
Access Controls Concepts  22%
Network Security  24%
Security Operations 18%
Course Curriculum
  • Domain 1: Security Principles (26%)
    • 1.1: Understand the security concepts of information assurance
      • Confidentiality
      • Integrity
      • Availability
      • Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
      • Non-repudiation
      • Privacy
    • 1.2: Understand the risk management process
      • Risk management (e.g., risk priorities, risk tolerance)
      • Risk identification, assessment, and treatment
    • 1.3: Understand security controls
      • Technical controls
      • Administrative controls
      • Physical controls
      • 1.4: Understand (ISC)² Code of Ethics
      • Professional code of conduct
    • 1.4: Understand governance processes
      • Policies
      • Procedures
      • Standards
      • Regulations and laws
  • Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%)
    • 2.1: Understand business continuity (BC)
      • Purpose
      • Importance
      • Components
    • 2.2: Understand disaster recovery (DR)
      • Purpose
      • Importance
      • Components
    • 2.3: Understand incident response
      • Purpose
      • Importance
      • Components
  • Domain 3: Access Controls Concepts (22%)
    • 3.1: Understand physical access controls
      • Physical security controls (e.g., badge systems, gate entry, environmental design)
      • Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
      • Authorized versus unauthorized personnel
    • 3.2: Understand logical access controls
      • Principle of least privilege
      • Segregation of duties
      • Discretionary access control (DAC)
      • Mandatory access control (MAC)
      • Role-based access control (RBAC)
  • Domain 4: Network Security (24%)
    • 4.1: Understand computer networking
      • Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi) Ports
      • Applications
    • 4.2: Understand network threats and attacks
      • Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
      • Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
      • Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
    • 4.3: Understand network security infrastructure
      • On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
      • Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
      • Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
  • Domain 5: Security Operations (18%)
    • 5.1: Understand data security
      • Encryption (e.g., symmetric, asymmetric, hashing)
      • Data handling (e.g., destruction, retention, classification, labeling)
      • Logging and monitoring security events
    • 5.2: Understand system hardening
      • Configuration management (e.g., baselines, updates, patches)
    • 5.3: Understand best practice security policies
      • Data handling policy
      • Password policy
      • Acceptable Use Policy (AUP)
      • Bring your own device (BYOD) policy
      • Change management policy (e.g., documentation, approval, rollback)
      • Privacy policy
    • 5.4: Understand security awareness training
      • Purpose/concepts (e.g., social engineering, password protection)
      • Importance

Target Audience

This course is ideal for:

  • Current IT professional
  • Career Changers
  • College Students and Recent Graduates
Pre-requisites

None

Exam Details

Duration of the Exam 2 Hours
Number of Questions 100
Exam Format Multiple Choice Questions
Passing Score 700 out of 1000
Exam Language English
Testing Center Pearson VUE Testing Center
Course Objectives
  • Understand foundational cybersecurity principles, including CIA triad, risk management, and governance.
  • Learn business continuity, disaster recovery, and incident response planning essentials.
  • Explore physical and logical access control mechanisms like RBAC, MAC, and MFA.
  • Gain insights into networking models, common attack vectors, and defense architectures.
  • Develop skills in data security, encryption, system hardening, and policy implementation.
  • Build the confidence and competence to clear the (ISC)² Certified in Cybersecurity exam.
  • Get career-ready with expert mentoring, hands-on Q&A, and actionable security insights.
Still unsure?
We're just a click away
For
loader-infosectrain

Can't wait? Get in touch now

Toll Free Numbers

How We Help You Succeed

Vision

Vision

Goal

Goal

Skill-Building

Skill-Building

Mentoring

Mentoring

Direction

Direction

Support

Support

Success

Success

Our Expert Course Advisors

Words Have Power

Success Speaks Volumes

Success Story

Get a Sample Certificate

Sample Certificate

Frequently Asked Questions

What is (ISC)² Certified in Cybersecurity℠ exam?

The (ISC)² Certified in Cybersecurity exam is an entry-level certification designed to validate foundational cybersecurity knowledge. It proves that the holder possesses the foundational knowledge and skills necessary for entry—or junior-level roles in cybersecurity, showcasing their readiness to learn and advance in the field.

Who should take the CC exam?

The exam is ideal for newcomers to the cybersecurity field, including recent graduates, IT professionals seeking to transition into cybersecurity, and anyone interested in understanding basic cybersecurity principles.

What are the prerequisites for the CC exam?

No prerequisites are required to earn the Certified in Cybersecurity certification.

How can I register for the CC exam?

  • Create an account with Pearson VUE, the exclusive global administrator of (ISC)² exams.
  • Select the certification: CC: Certified in Cybersecurity.
  • Select your testing location and schedule your exam.
  • Enter the promo code you’ve obtained after submitting the candidate application form.

What topics are covered in the CC exam?

The course covered five domains:

  • Security Principles
  • Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
  • Access Controls Concepts
  • Network Security
  • Security Operations

How long is the CC exam, and what is the format?

The exam is formatted with multiple-choice questions and lasts 2 hours.

What is the passing score for the CC exam?

The passing score is 700 out of 1000.

What study materials are recommended for the CC exam?

There are various study materials available for the CC exam, including:

  • Textbooks
  • Free study guides
  • InfosecTrain’s online instructor-led training
  • Online courses
  • Free practice question papers

Is there a recertification requirement for the CC certification?

Yes, like most professional certifications, maintaining the CC certification requires meeting continuing professional education (CPE) credits and paying an annual maintenance fee to ensure the certification holder stays current in the field.

What opportunities can arise from being certified in cybersecurity?

Earning a CC certification can open up entry-level roles in cybersecurity, including:

  • Information Security Analyst
  • Security Consultant
  • Penetration Tester
  • Incident Responder
  • Security Architect

TOP