We may earn an affiliate commission when you visit our partners.
Kevin Henry

This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.

Read more

This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.

This is the first of the five domains for the CC℠ examination and it sets a foundation that the other domains build upon. In this course, Security Principles for CC℠, you’ll learn essential security concepts. First, you’ll explore Information assurance and governance. Next, you’ll discover Risk Management. Finally, you’ll learn how to respect the ISC2 Code of Ethics that pertain to all certification holders. When you’re finished with this course, you’ll have the skills and knowledge of Information protection and assurance needed for the Certified in Cybersecurity exam.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Information Security Concepts and Governance
Risk Management
Security Controls
Read more
(ISC)2 Code of Ethics
Domain Summary

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Intended for learners who seek a CC℠ certification
Provides essential security concepts for CC℠ professionals
Establishes a foundation for other CC℠ domains
Taught by industry expert Kevin Henry
Covers key topics such as information assurance, governance, and risk management

Save this course

Save Security Principles for CC℠ to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Principles for CC℠ with these activities:
Organize Course Materials
Enhance your learning experience by organizing and reviewing course materials.
Show steps
  • Gather all course materials, including notes, slides, assignments, and readings
  • Organize and file them in a logical manner
  • Regularly review the materials to reinforce your understanding
Practice Information Assurance
Sharpen your information assurance skills to prepare for the course.
Browse courses on Information Assurance
Show steps
  • Review key concepts and techniques of information assurance
  • Participate in online forums or discussions related to information assurance
  • Complete hands-on exercises or labs
Review Security Concepts
Refresh your foundational knowledge of security concepts before beginning the course.
Browse courses on Security Concepts
Show steps
  • Review notes from previous courses or textbooks
  • Complete practice questions or quizzes
Five other activities
Expand to see all activities and additional details
Show all eight activities
Connect with Cybersecurity Experts
Seek guidance and advice from experienced professionals in the field.
Show steps
  • Attend industry events or workshops
  • Reach out to professionals on LinkedIn or other networking platforms
  • Request informational interviews or mentorship opportunities
Explore Risk Management Best Practices
Enhance your understanding of risk management principles and strategies.
Browse courses on Risk Management
Show steps
  • Find online tutorials or articles on risk management best practices
  • Follow the steps and examples provided in the tutorials
  • Apply the concepts to real-world scenarios
Discuss Security Controls with Peers
Exchange knowledge and perspectives on security controls by engaging with peers.
Browse courses on Security Controls
Show steps
  • Join or create a study group specifically focused on security controls
  • Participate in regular discussions and share knowledge
  • Collaborate on projects or mock assessments
Create a Security Incident Response Plan
Develop a deeper understanding of security incident response strategies and practices.
Show steps
  • Identify potential security threats and vulnerabilities
  • Design and implement a response plan using existing frameworks (e.g., NIST)
  • Test and evaluate the plan's effectiveness
Solve Practice Questions on Security Principles
Test your comprehension of security principles and prepare for certification exams.
Browse courses on Security Principles
Show steps
  • Find practice questions or mock exams related to the CC exam
  • Time yourself and answer the questions
  • Review your answers and identify areas for improvement

Career center

Learners who complete Security Principles for CC℠ will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
Security Professionals like Cybersecurity Analyst who have mastered the principles of information assurance and risk management will develop protective measures for companies and institutions. This course would serve to build the knowledge base a Cybersecurity Analyst would need to develop effective and robust cybersecurity protocols.
Security Consultant
Security Consultants play an advisory role to help organizations improve their security strategies, investigate cybercrimes, and implement security protocols. This course would build the knowledge base a Security Consultant would need to provide effective and informed guidance on cybersecurity best practices, risk management, and compliance.
IT Security Administrator
IT Security Administrators design and manage security systems to protect computer networks and data. This course would help IT Security Administrator in applying principles of information assurance and risk management to design solutions that will effectively secure computer networks and sensitive data.
Security Architect
Security Architects are responsible for designing, implementing, and maintaining an organization's security systems. This course would help Security Architects in applying principles of information assurance and risk management to build and maintain effective cybersecurity architectures that are tailored to an organization's specific needs.
Network Security Engineer
Network Security Engineers are responsible for securing an organization's computer networks. This course would help Network Security Engineers to apply principles of information assurance and risk management to develop and implement effective network security solutions.
Security Engineer
Security Engineers are responsible for the security of an organization's computer systems and networks. This course would help Security Engineers in applying principles of information assurance and risk management to develop and implement effective security solutions.
Information Security Manager
Information Security Managers are responsible for developing and managing an organization's information security program. This course would provide Information Security Managers with a strong foundation in information assurance and risk management principles, enabling them to effectively manage an organization's cybersecurity program.
IT Auditor
IT Auditors are responsible for evaluating an organization's IT systems and processes to ensure compliance with security standards. This course would help IT Auditors gain a deeper understanding of information assurance and risk management principles, enabling them to effectively evaluate an organization's cybersecurity posture and make recommendations for improvement.
Security Specialist
Security Specialists are responsible for providing security expertise and support to an organization. This course would provide Security Specialists with a strong foundation in information assurance and risk management principles, enabling them to effectively contribute to an organization's cybersecurity efforts.
Cybersecurity Risk Manager
Cybersecurity Risk Managers are responsible for assessing and managing cybersecurity risks. This course would provide Cybersecurity Risk Managers with a strong foundation in information assurance and risk management principles, enabling them to effectively assess and mitigate cybersecurity risks.
Incident Responder
Incident Responders are responsible for responding to and investigating cybersecurity incidents. This course would provide Incident Responders with a strong foundation in information assurance and risk management principles, enabling them to effectively respond to and mitigate cybersecurity incidents.
Compliance Officer
Compliance Officers are responsible for ensuring that an organization complies with applicable laws and regulations. This course may provide Compliance Officers with a basic understanding of information assurance and risk management principles which may be helpful in understanding and managing an organization's cybersecurity compliance obligations.
Policy Analyst
Policy Analysts are responsible for developing and analyzing policies. This course may provide Policy Analysts with a basic understanding of information assurance and risk management principles, which may be helpful in developing and analyzing cybersecurity policies.
Project Manager
Project Managers are responsible for planning and executing projects. This course may provide Project Managers with a basic understanding of information assurance and risk management principles, which may be helpful in managing cybersecurity projects.
Business Analyst
Business Analysts are responsible for analyzing business needs and developing solutions. This course may provide Business Analysts with a basic understanding of information assurance and risk management principles, which may be helpful in understanding and analyzing an organization's cybersecurity needs.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Principles for CC℠.
This official study guide for the CISM exam covers all the key topics included in the Security Principles domain, providing detailed explanations and practice questions.
This widely used textbook covers fundamental principles and practices of computer security. It provides a deep dive into encryption, authentication, access control, and other core security concepts, which complements the course material.
Provides comprehensive coverage of information security management principles and practices, with a focus on the Certified in Cybersecurity (CC) exam.
Offers a comprehensive overview of cybersecurity concepts and best practices, including information assurance and governance, risk management, and security controls.
This textbook provides a comprehensive overview of security in computing systems. It covers both theoretical foundations and practical applications, offering insights into security principles and technologies.
This comprehensive study guide covers all ten domains of the CISSP exam, including the Security Principles domain, providing a thorough understanding of the concepts and best practices.
Covers the principles and practices of risk management in information technology systems, providing a thorough understanding of the risk assessment process.
Provides a thorough preparation for the CISSP exam, covering all eight domains including Security Principles.
This official study guide is closely aligned with the CC℠ exam blueprint and provides in-depth coverage of all eight domains, including security principles. It offers practice questions and mock exams to reinforce understanding.
Offers a comprehensive overview of information security management practices, providing a solid foundation for understanding the Security Principles domain.
Provides a concise overview of information security principles and practices, tailored for managers and executives who need a basic understanding of the topic.
Provides advanced insights into enterprise security risk management, helping readers understand the process of identifying, assessing, and mitigating risks.
Provides an overview of cloud security concepts and best practices, including Security Principles in the context of cloud computing.
This guide provides a practical introduction to ethical hacking and penetration testing. It covers techniques and tools used to identify vulnerabilities and exploit systems, offering insights into the attacker's perspective.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Principles for CC℠.
Business Continuity (BC), Disaster Recovery (DR) &...
Most relevant
Access Controls Concepts for CC℠
Most relevant
Security Principles
Most relevant
Cybersecurity Specialist Capstone
Most relevant
Practice Exam for ISC2 Certified in Cybersecurity (CC)
Most relevant
Systems and Application Security for SSCP®
Most relevant
Information Security Program for CISM®
Most relevant
AWS Certified Cloud Practitioner (CLF-C02)
Most relevant
Asset Security for CISSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser