We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security Principles for CC℠

Kevin Henry

This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.

Read more

This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.

This is the first of the five domains for the CC℠ examination and it sets a foundation that the other domains build upon. In this course, Security Principles for CC℠, you’ll learn essential security concepts. First, you’ll explore Information assurance and governance. Next, you’ll discover Risk Management. Finally, you’ll learn how to respect the ISC2 Code of Ethics that pertain to all certification holders. When you’re finished with this course, you’ll have the skills and knowledge of Information protection and assurance needed for the Certified in Cybersecurity exam.

Enroll now

What's inside

Syllabus

Course Overview
Information Security Concepts and Governance
Risk Management
Security Controls
Read more
(ISC)2 Code of Ethics
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Intended for learners who seek a CC℠ certification
Provides essential security concepts for CC℠ professionals
Establishes a foundation for other CC℠ domains
Taught by industry expert Kevin Henry
Covers key topics such as information assurance, governance, and risk management

Save this course

Save Security Principles for CC℠ to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Principles for CC℠. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Principles for CC℠ will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Security Professionals like Cybersecurity Analyst who have mastered the principles of information assurance and risk management will develop protective measures for companies and institutions. This course would serve to build the knowledge base a Cybersecurity Analyst would need to develop effective and robust cybersecurity protocols.
Security Consultant
Security Consultants play an advisory role to help organizations improve their security strategies, investigate cybercrimes, and implement security protocols. This course would build the knowledge base a Security Consultant would need to provide effective and informed guidance on cybersecurity best practices, risk management, and compliance.
IT Security Administrator
IT Security Administrators design and manage security systems to protect computer networks and data. This course would help IT Security Administrator in applying principles of information assurance and risk management to design solutions that will effectively secure computer networks and sensitive data.
Security Architect
Security Architects are responsible for designing, implementing, and maintaining an organization's security systems. This course would help Security Architects in applying principles of information assurance and risk management to build and maintain effective cybersecurity architectures that are tailored to an organization's specific needs.
Network Security Engineer
Network Security Engineers are responsible for securing an organization's computer networks. This course would help Network Security Engineers to apply principles of information assurance and risk management to develop and implement effective network security solutions.
Security Engineer
Security Engineers are responsible for the security of an organization's computer systems and networks. This course would help Security Engineers in applying principles of information assurance and risk management to develop and implement effective security solutions.
Information Security Manager
Information Security Managers are responsible for developing and managing an organization's information security program. This course would provide Information Security Managers with a strong foundation in information assurance and risk management principles, enabling them to effectively manage an organization's cybersecurity program.
IT Auditor
IT Auditors are responsible for evaluating an organization's IT systems and processes to ensure compliance with security standards. This course would help IT Auditors gain a deeper understanding of information assurance and risk management principles, enabling them to effectively evaluate an organization's cybersecurity posture and make recommendations for improvement.
Security Specialist
Security Specialists are responsible for providing security expertise and support to an organization. This course would provide Security Specialists with a strong foundation in information assurance and risk management principles, enabling them to effectively contribute to an organization's cybersecurity efforts.
Cybersecurity Risk Manager
Cybersecurity Risk Managers are responsible for assessing and managing cybersecurity risks. This course would provide Cybersecurity Risk Managers with a strong foundation in information assurance and risk management principles, enabling them to effectively assess and mitigate cybersecurity risks.
Incident Responder
Incident Responders are responsible for responding to and investigating cybersecurity incidents. This course would provide Incident Responders with a strong foundation in information assurance and risk management principles, enabling them to effectively respond to and mitigate cybersecurity incidents.
Compliance Officer
Compliance Officers are responsible for ensuring that an organization complies with applicable laws and regulations. This course may provide Compliance Officers with a basic understanding of information assurance and risk management principles which may be helpful in understanding and managing an organization's cybersecurity compliance obligations.
Policy Analyst
Policy Analysts are responsible for developing and analyzing policies. This course may provide Policy Analysts with a basic understanding of information assurance and risk management principles, which may be helpful in developing and analyzing cybersecurity policies.
Project Manager
Project Managers are responsible for planning and executing projects. This course may provide Project Managers with a basic understanding of information assurance and risk management principles, which may be helpful in managing cybersecurity projects.
Business Analyst
Business Analysts are responsible for analyzing business needs and developing solutions. This course may provide Business Analysts with a basic understanding of information assurance and risk management principles, which may be helpful in understanding and analyzing an organization's cybersecurity needs.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Principles for CC℠.
This official study guide for the CISM exam covers all the key topics included in the Security Principles domain, providing detailed explanations and practice questions.
This widely used textbook covers fundamental principles and practices of computer security. It provides a deep dive into encryption, authentication, access control, and other core security concepts, which complements the course material.
Provides comprehensive coverage of information security management principles and practices, with a focus on the Certified in Cybersecurity (CC) exam.
Offers a comprehensive overview of cybersecurity concepts and best practices, including information assurance and governance, risk management, and security controls.
This textbook provides a comprehensive overview of security in computing systems. It covers both theoretical foundations and practical applications, offering insights into security principles and technologies.
This comprehensive study guide covers all ten domains of the CISSP exam, including the Security Principles domain, providing a thorough understanding of the concepts and best practices.
Covers the principles and practices of risk management in information technology systems, providing a thorough understanding of the risk assessment process.
Provides a thorough preparation for the CISSP exam, covering all eight domains including Security Principles.
This official study guide is closely aligned with the CC℠ exam blueprint and provides in-depth coverage of all eight domains, including security principles. It offers practice questions and mock exams to reinforce understanding.
Offers a comprehensive overview of information security management practices, providing a solid foundation for understanding the Security Principles domain.
Provides a concise overview of information security principles and practices, tailored for managers and executives who need a basic understanding of the topic.
Provides advanced insights into enterprise security risk management, helping readers understand the process of identifying, assessing, and mitigating risks.
Provides an overview of cloud security concepts and best practices, including Security Principles in the context of cloud computing.
This framework provides a structured approach to cybersecurity risk management and improvement. It offers guidance on implementing security controls and best practices that align with the CC℠ domain of security principles.
This guide provides a practical introduction to ethical hacking and penetration testing. It covers techniques and tools used to identify vulnerabilities and exploit systems, offering insights into the attacker's perspective.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Principles for CC℠.
Business Continuity (BC), Disaster Recovery (DR) &...
Most relevant
Access Controls Concepts for CC℠
Most relevant
Security Principles
Most relevant
Cybersecurity Specialist Capstone
Most relevant
Practice Exam for ISC2 Certified in Cybersecurity (CC)
Most relevant
Systems and Application Security for SSCP®
Most relevant
Information Security Program for CISM®
Most relevant
AWS Certified Cloud Practitioner (CLF-C02)
Most relevant
Asset Security for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser