188
Introduction and download your free study guides
Tips and tricks
How to approach certification studying
General Certified in Cybersecurity (CC) links
Domain 1 - What we will be covering
The differences between Information Security, IT Security, and Cybersecurity
The CIA Triad - Confidentiality, Integrity, and Availability - Part 1
The CIA Triad - Confidentiality, Integrity, and Availability - Part 2
The CIA Triad - Confidentiality, Integrity, and Availability - Part 3
The CIA Triad - Confidentiality, Integrity, and Availability - Part 4
The CIA Triad - Confidentiality, Integrity, and Availability - Part 5
The CIA Triad - Confidentiality, Integrity, and Availability - Quiz
IAAA - Identification, Authentication, Authorization, and Accountability - Part 1
IAAA - Identification, Authentication, Authorization, and Accountability - Part 2
IAAA - Identification, Authentication, Authorization, and Accountability - Part 3
IAAA - Identification, Authentication, Authorization, and Accountability - Part 4
IAAA - Identification, Authentication, Authorization, and Accountability - Part 5
IAAA -Identification, Authentication, Authorization, and Accountability - Quiz
Privacy
Risk Management - Part 1
Risk Management - Part 2
Risk Management - Part 3
Risk Management - Part 4
Risk Management - Part 5
Risk Management - Part 6
Risk Management - Quiz
Access Control Categories and Types - Part 1
Access Control Categories and Types - Part 2
Access Control Categories and Types - Quiz
The Ethics of your organizations and ISC2
Governance vs. Management
Laws and regulations - Part 1
Laws and regulations - Part 2
Security governance principles
Policies, procedures, standards, laws, and regulations - Quiz
What we covered in Domain 1
Certified in Cybersecurity (CC) Domain 1 Links
Domain 2 - What we will be covering
BCP - Business Continuity Planning - Part 1
BCP - Business Continuity Planning - Part 2
BCP - Business Continuity Planning - Part 3
BCP - Business Continuity Planning - Quiz
DRP - Disaster Recovery Planning - Part 1
DRP - Disaster Recovery Planning - Part 2
DRP - Disaster Recovery Planning - Part 3
DRP - Disaster Recovery Planning - Part 4
DRP - Disaster Recovery Planning - Quiz
Incidents Response - Part 1
Incidents Response - Part 2
Incidents Response - Part 3
Incidents Response - Part 4
Incidents Response - Part 5
Incidents Response - Quiz
What we covered in Domain 2
Certified in Cybersecurity (CC) Domain 2 Links
Domain 3 - What we will be covering
Physical Security - Part 1
Physical Security - Part 2
Physical Security - Part 3
Physical Security - Part 4
Physical Security - Part 5
Physical Security - Quiz
Logical Access Control - Part 1
Logical Access Control - Part 2
Logical Access Control - Part 3
Logical Access Control - Part 4
Logical Access Control - Part 5
Logical Access Control - Quiz
What we covered in Domain 3
Certified in Cybersecurity Domain (CC) 3 Links
Domain 4 - What we will be covering
Network Basics and Definitions - Part 1
Network Basics and Definitions - Part 2
Network Basics and Definitions - Quiz
The OSI Model - Part 1
The OSI Model - Part 2
The OSI Model - Part 3
The TCP/IP model
The OSI and TCP/IP Model Quiz
IP addresses, port numbers, and MAC addresses - Part 1
IP addresses, port numbers, and MAC addresses - Part 2
IP addresses, port numbers, and MAC addresses - Part 3
IP addresses, port numbers, and MAC addresses - Quiz
IP support protocols - Part 1
IP support protocols - Part 2
Cables - Part 1
Cables - Part 2
LAN topologies
Wi-Fi
Wireless networks - Part 1
Wireless networks - Part 2
VLANs and Routers - Part 1
VLANs and Routers - Part 2
VPNs, NAC, and third-party connectivity
SDN, SD-WAN, and SDX
DMZ, VLAN, VPN, Microsegmentation, Defense in depth, NAC IOT - Quiz
Attacks and attackers - Part 1
Attacks and attackers - Part 2
Attacks and attackers - Part 3
Attacks and attackers - Quiz
Intrusion Detection and Prevention systems (IDS-IPS) - Part 1
Intrusion Detection and Prevention systems (IDS-IPS) - Part 2
Intrusion Detection and Prevention systems (IDS-IPS) - Quiz
SIEM and SOAR systems
Honeypots and Honeynets
Firewalls - Part 1
Firewalls - Part 2
0-day attacks and exploits
Vulnerability Scanning
Virtualization, Cloud, and Distributed Computing - Part 1
Virtualization, Cloud, and Distributed Computing - Part 2
Virtualization, Cloud, and Distributed Computing - Part 3
Virtualization, Cloud, and Distributed Computing - Part 4
Virtualization, Cloud, and Distributed Computing - Part 5
Virtualization, Cloud, and Distributed Computing - Quiz
The Internet of Things (IoT)
Asset tracking and hardware hardening
Electricity
Backups - Part 1
Backups - Part 2
Fault tolerance, redundancy, and resiliency - Part 1
Fault tolerance, redundancy, and resiliency - Part 2
Fault tolerance, redundancy, and resiliency - Part 3
Fire suppression - Part 1
Fire suppression - Part 2
Data Centers Quiz
Secure design principles - Part 1
Secure design principles - Part 2
What we covered in Domain 4
Certified in Cybersecurity (CC) Domain 4 Links
Domain 5 - What we will be covering
Configuration Management
Patch Management
Change Management
Change, patch, configuration management - Quiz
Cryptography - Part 1
Cryptography - Part 2
Cryptography - Part 3
Hashing
Attacks on our cryptography
Encryption Quiz
Data handling, data storage and data retention - Part 1
Data handling, data storage and data retention - Part 2
Data handling, data storage and data retention - Part 3
Retention, classification, labeling quiz
Administrative (Directive) Controls
Training and awareness
Social Engineering attacks - Part 1
Social Engineering attacks - Part 2
Training, awareness, and social engineering quiz
What we covered in Domain 5
Certified in Cybersecurity (CC) Domain 5 Links
Domain 1 recap Certified in Cybersecurity (CC)
Domain 2 recap Certified in Cybersecurity (CC)
Domain 3 recap Certified in Cybersecurity (CC)
Domain 4 recap Certified in Cybersecurity (CC)
Domain 5 recap Certified in Cybersecurity (CC)
Thor's CC Glossary - 2500 terms
Thor's CC Domain 1 Flashcards - ThorTeaches.com
Thor's CC Domain 2 Flashcards - ThorTeaches.com
Thor's CC Domain 3 Flashcards - ThorTeaches.com
Thor's CC Domain 4 Flashcards - ThorTeaches.com
Thor's CC Domain 5 Flashcards - ThorTeaches.com
Why you should want to get Certified in Cybersecurity
Scheduling your exam and what to expect
The CC CAT exam format (Computerized Adaptive Testing).
What to expect on exam day and after
I passed the exam. Now what?
I failed the exam. Now what?
How to approach practice questions
How to design your career and certification path
Certified in Cybersecurity (CC) practice test #1
Certified in Cybersecurity (CC) practice test #2
Certified in Cybersecurity (CC) practice test #3
Certified in Cybersecurity (CC) practice test #4
Certified in Cybersecurity (CC) practice test #5
Certified in Cybersecurity (CC) practice test #6
Certified in Cybersecurity (CC) practice test #7
Certified in Cybersecurity (CC) practice test #8
Certified in Cybersecurity (CC) practice test #9
Certified in Cybersecurity (CC) practice test #10
Certified in Cybersecurity (CC) practice test #11
Certified in Cybersecurity (CC) practice test #12
Certified in Cybersecurity (CC) practice test #13
Certified in Cybersecurity (CC) practice test #14
Certified in Cybersecurity (CC) practice test #15
Certified in Cybersecurity (CC) practice test #16
Certified in Cybersecurity (CC) practice test #17

instructor