ISC2 Certified in Cybersecurity

CMIT Digital Certificate of Completion

Students have 12 months to work at their own pace, and can start at any time of year.

Certified
Leads to Industry certification.

Self-paced course
Online self-paced course.

Flexible
Start any time and work at your own pace.

Learn anywhere
Learn anytime, anywhere.

ISC2 Certified in Cybersecurity

€595

or 3 interest-free payments with Klarna Logo

Course Details

The ISC2 Certified in Cybersecurity course is designed to equip you with the knowledge and skills necessary to excel in the rapidly evolving field of cybersecurity. This course covers essential security concepts, incident response, access control, network security, and security operations, providing you with a robust foundation to understand and tackle the challenges faced in today’s digital landscape. By engaging with a blend of theoretical knowledge and practical demonstrations, you will gain insights into the fundamental principles of cybersecurity, risk management, and the implementation of effective security controls.

Throughout the course, you will explore key topics such as password security, multifactor authentication, business continuity planning, network threats, and data security best practices. Each module is structured to enhance your understanding and prepare you for the ISC2 certification exam. By mastering these concepts, you will be well-prepared to protect organisational assets and contribute to the security posture of any organisation.

This course includes the following features:

  • Instructor-led demonstrations and visual presentations to develop your skills based on real-world scenarios.
  • Unlike a live class, you can fast-forward, repeat, or rewind all your lectures. This gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.
  • FlashCards and Education Games are also provided throughout the course.
  • Practice exams prepare you for your exams.
  • You can also interact and collaborate with other students through our forums, student contributions and announcement features.
Who should complete this ISC2 Course?
  • Aspiring Cybersecurity Professionals: Ideal for individuals starting a career in cybersecurity, this course provides foundational knowledge in security principles, risk management, and threat mitigation, preparing learners for roles like Cybersecurity Analyst and IT Security Specialist.
  • IT Administrators and Support Professionals: Those working in IT support or administration can expand their expertise in network security, access control, and incident response, making them more valuable in security-focused roles.
  • Security Consultants and Risk Management Professionals: This course helps professionals implement security controls and business continuity plans, equipping them to assess risks and improve security strategies for organisations.
  • Network and Information Security Engineers: Network professionals looking to enhance their security knowledge can use this course to identify vulnerabilities, mitigate threats, and strengthen organizational security postures.
  • Individuals Preparing for ISC2 Certification: This course is perfect for those pursuing the ISC2 Certified in Cybersecurity credential, a recognised certification that validates essential cybersecurity skills and enhances career opportunities.
Entry Requirements / Prerequisites

 

How CMIT eLearning Works…

Play
Topics covered in this ISC2 course
Module 1: Introduction and Security Concepts
  • Certification Overview
  • Exam Objectives
  • Instructor Introduction
  • ISC CiC Course Intro
  • Password Security
  • Whiteboard – Multifactor Authentication (MFA)
  • Understand the risk management process
  • Understand security controls (Technical, Administrative and Physical Controls)
  • Understand ISC2 Code of Ethics
  • Understand Governance processes (Standards, Regulations, Security Policies)
  • Module Summary and Review Questions
Module 2: Incident Response, Business Continuity and Disaster Recovery
  • Concepts
  • Understand Business Continuity
  • Components of a Business Continuity Plan
  • Disaster Recovery
  • RTO-RPO
  • Understand Business Response (Incident and Post Incident Response)
  • Module Summary and Review Questions
Module 3: Access Control Concepts
  • Understand physical access controls
  • Defence in Depth
  • Compare Physical Control Types
  • Monitoring Controls
  • Describe logical access controls
  • Logical Access controls
  • Principle of least privilege
  • Segregation of duties
  • Module Summary and Review Questions
Module 4: Network Security
  • Understanding computer networking
  • Network Security Design
  • Whiteboard – Networking Concepts
  • Networking protocols and ports
  • Understand Network Threats
  • Types of network (cyber) threats and attacks
  • Threat Actors
  • Tools used to identify and prevent threats
  • Network Security Infrastructure
  • On-Premises Architecture
  • Data Center Design Discussion
  • Cloud Architecture Service and Deployment Models
  • Managed Service Providers
  • Service Level Agreements (SLA)
  • Shared Security Model
  • Zero Trust
  • Module Summary and Review Questions
Module 5: Security Operations
  • Understand Data Security
  • Data Security Fundamentals
  • Data Handling Best Practices
  • Encryption
  • Data Security Compliance
  • Understand System Hardening
  • System Hardening
  • Configuration Management
  • Understanding Best Practice Security Policies
  • Common Security Policies
  • Security Awareness Training
  • Social Engineering
  • Module Summary and Review Questions
  • Next Steps and Course Closeout
Assessment
  • Once you successfully pass the programme(s), you will be able to download a CMIT Digital Certificate of Completion. This can be accessed via the Progress Reports section located on the top right side of your eLearning platform.
  • You may optionally take exams to receive certification. Exam fees are not included in the course price. More information on exams can be found on the CMIT exam page.
Accreditation
  • You may optionally take exams to receive professional certification.
  • More information can be found on the CMIT Accreditation Details page.

Request Prospectus

Complete the form below to request a prospectus.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in

Student Reviews of this course

0
0 out of 5 stars (based on 0 reviews)
Excellent
Very good
Average
Poor
Terrible

There are no reviews yet. Be the first one to write one.

Request A Prospectus

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
This field is hidden when viewing the form
Opt in
College of Management and IT (CMIT)
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Click here to view our Privacy Policy