We may earn an affiliate commission when you visit our partners.
Course image
(ISC)² Education & Training

Congratulations on your interest in pursuing a career in cybersecurity. The Certified in Cybersecurity (CC) certification will demonstrate to employers that you have foundational knowledge of industry terminology, network security, security operations and policies and procedures that are necessary for an entry- or junior-level cybersecurity role. It will signal your understanding of fundamental security best practices, policies and procedures, as well as your willingness and ability to learn more and grow on the job.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Five courses

Security Principles

Welcome to Security Principles, the first course in this five-part Specialization. Upon completion, you'll be able to discuss foundational cybersecurity principles, recognize information assurance concepts, define risk management terminology, classify security controls, distinguish between policies and laws, analyze governance elements, and practice the (ISC)2 Code of Ethics.

Incident Response, BC, and DR Concepts

(3 hours)
Welcome to course 2 of 5 of this Specialization, Incident Response, BC, and DR Concepts. This course focuses on the availability part of the CIA triad and the importance of maintaining availability of both human and system resources. These are usually accomplished through the implementation of Incident Response (IR), Business Continuity (BC) and Disaster Recovery (DR) plans.

Access Control Concepts

(4 hours)
Welcome to the third course of this Specialization, Access Control Concepts. We will explore the types of access control every information security professional should know, including physical and logical controls and how they combine to strengthen an organization's security.

Network Security

(7 hours)
Welcome to Network Security, the fourth course in this Specialization. We'll explore computer networking and securing networks. The internet connects nearly everyone and everything, and this is accomplished through networking. While most see computer networking as a positive, criminals routinely use the internet, and the networking protocols themselves, as weapons and tools to exploit vulnerabilities. We'll review the basic components of a network, threats and attacks to the network, and learn how to protect them from attackers.

Security Operations

(8 hours)
This course focuses on the day-to-day use of security controls and risk mitigation strategies. We will explore ways to secure data and systems, and how to encourage secure practices among users.

Learning objective

​demonstrate that you have foundational knowledge of industry terminology, network security, security operations and policies and procedures.

Save this collection

Save Certified in Cybersecurity to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser