187
Introduction and download your free study guides
Tips and tricks
How to approach certification studying
General Certified in Cybersecurity (CC) links
Domain 1 - What we will be covering
The differences between Information Security, IT Security, and Cybersecurity
The CIA Triad - Confidentiality, Integrity, and Availability - Part 1
The CIA Triad - Confidentiality, Integrity, and Availability - Part 2
The CIA Triad - Confidentiality, Integrity, and Availability - Part 3
The CIA Triad - Confidentiality, Integrity, and Availability - Part 4
The CIA Triad - Confidentiality, Integrity, and Availability - Part 5
The CIA Triad - Confidentiality, Integrity, and Availability - Quiz
IAAA - Identification, Authentication, Authorization, and Accountability - Part 1
IAAA - Identification, Authentication, Authorization, and Accountability - Part 2
IAAA - Identification, Authentication, Authorization, and Accountability - Part 3
IAAA - Identification, Authentication, Authorization, and Accountability - Part 4
IAAA - Identification, Authentication, Authorization, and Accountability - Part 5
IAAA -Identification, Authentication, Authorization, and Accountability - Quiz
Privacy
Risk Management - Part 1
Risk Management - Part 2
Risk Management - Part 3
Risk Management - Part 4
Risk Management - Part 5
Risk Management - Part 6
Risk Management - Quiz
Access Control Categories and Types - Part 1
Access Control Categories and Types - Part 2
Access Control Categories and Types - Quiz
The Ethics of your organizations and ISC2
Governance vs. Management
Laws and regulations - Part 1
Laws and regulations - Part 2
Security governance principles
Policies, procedures, standards, laws, and regulations - Quiz
What we covered in Domain 1
Certified in Cybersecurity (CC) Domain 1 Links
Domain 2 - What we will be covering
BCP - Business Continuity Planning - Part 1
BCP - Business Continuity Planning - Part 2
BCP - Business Continuity Planning - Part 3
BCP - Business Continuity Planning - Quiz
DRP - Disaster Recovery Planning - Part 1
DRP - Disaster Recovery Planning - Part 2
DRP - Disaster Recovery Planning - Part 3
DRP - Disaster Recovery Planning - Part 4
DRP - Disaster Recovery Planning - Quiz
Incidents Response - Part 1
Incidents Response - Part 2
Incidents Response - Part 3
Incidents Response - Part 4
Incidents Response - Part 5
Incidents Response - Quiz
What we covered in Domain 2
Certified in Cybersecurity (CC) Domain 2 Links
Domain 3 - What we will be covering
Physical Security - Part 1
Physical Security - Part 2
Physical Security - Part 3
Physical Security - Part 4
Physical Security - Part 5
Physical Security - Quiz
Logical Access Control - Part 1
Logical Access Control - Part 2
Logical Access Control - Part 3
Logical Access Control - Part 4
Logical Access Control - Part 5
Logical Access Control - Quiz
What we covered in Domain 3
Certified in Cybersecurity Domain (CC) 3 Links
Domain 4 - What we will be covering
Network Basics and Definitions - Part 1
Network Basics and Definitions - Part 2
Network Basics and Definitions - Quiz
The OSI Model - Part 1
The OSI Model - Part 2
The OSI Model - Part 3
The TCP/IP model
The OSI and TCP/IP Model Quiz
IP addresses, port numbers, and MAC addresses - Part 1
IP addresses, port numbers, and MAC addresses - Part 2
IP addresses, port numbers, and MAC addresses - Part 3
IP addresses, port numbers, and MAC addresses - Quiz
IP support protocols - Part 1
IP support protocols - Part 2
Cables - Part 1
Cables - Part 2
LAN topologies
Wi-Fi
Wireless networks - Part 1
Wireless networks - Part 2
VLANs and Routers - Part 1
VLANs and Routers - Part 2
VPNs, NAC, and third-party connectivity
SDN, SD-WAN, and SDX
DMZ, VLAN, VPN, Microsegmentation, Defense in depth, NAC IOT - Quiz
Attacks and attackers - Part 1
Attacks and attackers - Part 2
Attacks and attackers - Part 3
Attacks and attackers - Quiz
Intrusion Detection and Prevention systems (IDS-IPS) - Part 1
Intrusion Detection and Prevention systems (IDS-IPS) - Part 2
Intrusion Detection and Prevention systems (IDS-IPS) - Quiz
SIEM and SOAR systems
Honeypots and Honeynets
Firewalls - Part 1
Firewalls - Part 2
0-day attacks and exploits
Vulnerability Scanning
Virtualization, Cloud, and Distributed Computing - Part 1
Virtualization, Cloud, and Distributed Computing - Part 2
Virtualization, Cloud, and Distributed Computing - Part 3
Virtualization, Cloud, and Distributed Computing - Part 4
Virtualization, Cloud, and Distributed Computing - Part 5
Virtualization, Cloud, and Distributed Computing - Quiz
The Internet of Things (IoT)
Asset tracking and hardware hardening
Electricity
Backups - Part 1
Backups - Part 2
Fault tolerance, redundancy, and resiliency - Part 1
Fault tolerance, redundancy, and resiliency - Part 2
Fault tolerance, redundancy, and resiliency - Part 3
Fire suppression - Part 1
Fire suppression - Part 2
Data Centers Quiz
Secure design principles - Part 1
Secure design principles - Part 2
What we covered in Domain 4
Certified in Cybersecurity (CC) Domain 4 Links
Domain 5 - What we will be covering
Configuration Management
Patch Management
Change Management
Change, patch, configuration management - Quiz
Cryptography - Part 1
Cryptography - Part 2
Cryptography - Part 3
Hashing
Attacks on our cryptography
Encryption Quiz
Data handling, data storage and data retention - Part 1
Data handling, data storage and data retention - Part 2
Data handling, data storage and data retention - Part 3
Retention, classification, labeling quiz
Administrative (Directive) Controls
Training and awareness
Social Engineering attacks - Part 1
Social Engineering attacks - Part 2
Training, awareness, and social engineering quiz
What we covered in Domain 5
Certified in Cybersecurity (CC) Domain 5 Links
Domain 1 recap Certified in Cybersecurity (CC)
Domain 2 recap Certified in Cybersecurity (CC)
Domain 3 recap Certified in Cybersecurity (CC)
Domain 4 recap Certified in Cybersecurity (CC)
Domain 5 recap Certified in Cybersecurity (CC)
Thor's CC Glossary - 2500 terms
Thor's CC Domain 1 Flashcards - ThorTeaches.com
Thor's CC Domain 2 Flashcards - ThorTeaches.com
Thor's CC Domain 3 Flashcards - ThorTeaches.com
Thor's CC Domain 4 Flashcards - ThorTeaches.com
Thor's CC Domain 5 Flashcards - ThorTeaches.com
Why you should want to get Certified in Cybersecurity
Scheduling your exam and what to expect
What to expect on exam day and after
I passed the exam. Now what?
I failed the exam. Now what?
How to approach practice questions
How to design your career and certification path
Certified in Cybersecurity (CC) practice test #1
Certified in Cybersecurity (CC) practice test #2
Certified in Cybersecurity (CC) practice test #3
Certified in Cybersecurity (CC) practice test #4
Certified in Cybersecurity (CC) practice test #5
Certified in Cybersecurity (CC) practice test #6
Certified in Cybersecurity (CC) practice test #7
Certified in Cybersecurity (CC) practice test #8
Certified in Cybersecurity (CC) practice test #9
Certified in Cybersecurity (CC) practice test #10
Certified in Cybersecurity (CC) practice test #11
Certified in Cybersecurity (CC) practice test #12
Certified in Cybersecurity (CC) practice test #13
Certified in Cybersecurity (CC) practice test #14
Certified in Cybersecurity (CC) practice test #15
Certified in Cybersecurity (CC) practice test #16
Certified in Cybersecurity (CC) practice test #17

instructor