Launch Your Cybersecurity Career With Confidence
- No Experience Needed – Start Your Cybersecurity Journey from Scratch
- Crack the (ISC)² CC Exam with Full Domain Mastery
- Learn from Top Industry Experts in Dynamic, Interactive Sessions
- Get Post-training Mentorship, Career Support & Lifetime Access to Resources

Program Highlights
Earthblueone Certified in Cybersecurity (CC) training course is excellent for entry-level cybersecurity professionals. Certification in Cybersecurity demonstrates to employers that you have a thorough understanding of the appropriate technical principles and a demonstrated ability to learn while working.
- 24-Hour LIVE Instructor-Led Training
- Highly Interactive and Dynamic Sessions
- Career Guidance and Mentorship
- Full 5 Domain Exam Practice
- Immersive Learning
- Extended Post-Training Support
- Learn with Real-world Scenarios
- Learn from Industry Experts
- Access to Recorded Sessions
CC Certification Training
-
About Course
-
Domains Overview
-
Learning Outcome
-
Target Audience
-
Course Objectives
-
Exam Details
The Certified in Cybersecurity (CC) training course from InfosecTrain offers a comprehensive introduction to the field of cybersecurity, aligned with (ISC)² standards. This foundational course covers five key domains: Security Principles, Business Continuity and Disaster Recovery, Access Controls, Network Security, and Security Operations. Participants will understand essential topics such as risk management, ethical guidelines, physical and logical access controls, networking, and system hardening.
Certified in Cybersecurity (CC) training program equips both new entrants and seasoned professionals with the knowledge to tackle cybersecurity challenges and prepares them for the Certified in Cybersecurity exam. Ideal for IT professionals, career changers, and students, this course is a critical step toward a successful career in cybersecurity.
Security Principles | 26% |
Business Continuity (BC), Disaster Recovery (DR) & Incident Response (IR) | 10% |
Access Controls Concepts | 22% |
Network Security | 24% |
Security Operations | 18% |
- Domain 1: Security Principles (26%)
- 1.1: Understand the security concepts of information assurance
- Confidentiality
- Integrity
- Availability
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
- Non-repudiation
- Privacy
- 1.2: Understand the risk management process
- Risk management (e.g., risk priorities, risk tolerance)
- Risk identification, assessment, and treatment
- 1.3: Understand security controls
- Technical controls
- Administrative controls
- Physical controls
- 1.4: Understand (ISC)² Code of Ethics
- Professional code of conduct
- 1.4: Understand governance processes
- Policies
- Procedures
- Standards
- Regulations and laws
- 1.1: Understand the security concepts of information assurance
- Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%)
- 2.1: Understand business continuity (BC)
- Purpose
- Importance
- Components
- 2.2: Understand disaster recovery (DR)
- Purpose
- Importance
- Components
- 2.3: Understand incident response
- Purpose
- Importance
- Components
- 2.1: Understand business continuity (BC)
- Domain 3: Access Controls Concepts (22%)
- 3.1: Understand physical access controls
- Physical security controls (e.g., badge systems, gate entry, environmental design)
- Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
- Authorized versus unauthorized personnel
- 3.2: Understand logical access controls
- Principle of least privilege
- Segregation of duties
- Discretionary access control (DAC)
- Mandatory access control (MAC)
- Role-based access control (RBAC)
- 3.1: Understand physical access controls
- Domain 4: Network Security (24%)
- 4.1: Understand computer networking
- Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi) Ports
- Applications
- 4.2: Understand network threats and attacks
- Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
- Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
- Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
- 4.3: Understand network security infrastructure
- On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
- Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
- Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
- 4.1: Understand computer networking
- Domain 5: Security Operations (18%)
- 5.1: Understand data security
- Encryption (e.g., symmetric, asymmetric, hashing)
- Data handling (e.g., destruction, retention, classification, labeling)
- Logging and monitoring security events
- 5.2: Understand system hardening
- Configuration management (e.g., baselines, updates, patches)
- 5.3: Understand best practice security policies
- Data handling policy
- Password policy
- Acceptable Use Policy (AUP)
- Bring your own device (BYOD) policy
- Change management policy (e.g., documentation, approval, rollback)
- Privacy policy
- 5.4: Understand security awareness training
- Purpose/concepts (e.g., social engineering, password protection)
- Importance
- 5.1: Understand data security
This course is ideal for:
- Current IT professional
- Career Changers
- College Students and Recent Graduates
- Understand foundational cybersecurity principles, including CIA triad, risk management, and governance.
- Learn business continuity, disaster recovery, and incident response planning essentials.
- Explore physical and logical access control mechanisms like RBAC, MAC, and MFA.
- Gain insights into networking models, common attack vectors, and defense architectures.
- Develop skills in data security, encryption, system hardening, and policy implementation.
- Build the confidence and competence to clear the (ISC)² Certified in Cybersecurity exam.
- Get career-ready with expert mentoring, hands-on Q&A, and actionable security insights.
Duration of the Exam | 2 Hours |
Number of Questions | 100 |
Exam Format | Multiple Choice Questions |
Passing Score | 700 out of 1000 |
Exam Language | English |
Testing Center | Pearson VUE Testing Center |

Still Confused About Course?
Talk to Our Experts!