The Complete Certified in Cybersecurity CC course ISC2 2025
-
Introduction
-
Domain 1 Security PrinciplesDomain 1 – What we will be covering46sThe differences between Information Security, IT Security, and Cybersecurity6m 4sThe CIA Triad – Confidentiality, Integrity, and Availability – part 16m 24sThe CIA Triad – Confidentiality, Integrity, and Availability – part 27m 10sThe CIA Triad – Confidentiality, Integrity, and Availability – part 33m 33sThe CIA Triad – Confidentiality, Integrity, and Availability – part 48m 53sThe CIA Triad – Confidentiality, Integrity, and Availability – part 53m 33sIAAA -Identification, Authentication, Authorization, and Accountability – part 17m 45sIAAA -Identification, Authentication, Authorization, and Accountability – part 22m 55sIAAA -Identification, Authentication, Authorization, and Accountability – part 37m 34sIAAA -Identification, Authentication, Authorization, and Accountability – part 48m 52sIAAA -Identification, Authentication, Authorization, and Accountability – part 50sPrivacy0sRisk Management – part 10sRisk Management – part 20sRisk Management – part 39m 50sRisk Management – part 48m 56sRisk Management – part 58m 10sRisk Management – part 60sAccess Control Categories and Types – part 10sAccess Control Categories and Types – part 20sThe Ethics of your organizations and ISC20sGovernance vs. Management0sLaws and regulations – part 10sLaws and regulations – part 20sSecurity governance principles0sWhat we covered in Domain 10sCertified in Cybersecurity (CC) Domain 1 links
-
Domain 2 Business Continuity, Disaster Recovery, and Incident ResponseDomain 2 – What we will be covering0sBCP – Business Continuity Planning – Part 10sBCP – Business Continuity Planning – Part 20sBCP – Business Continuity Planning – Part 30sDRP – Disaster Recovery Planning – Part 10sDRP – Disaster Recovery Planning – Part 20sDRP – Disaster Recovery Planning – Part 30sDRP – Disaster Recovery Planning – Part 40sIncidents Response – Part 10sIncidents Response – Part 20sIncidents Response – Part 30sIncidents Response – Part 40sIncidents Response – Part 50sWhat we covered in Domain 20sCertified in Cybersecurity (CC) Domain 2 links
-
Domain 3 Access Controls ConceptsDomain 3 – What we will be covering0sPhysical Security – part 10sPhysical Security – part 20sPhysical Security – part 30sPhysical Security – part 40sPhysical Security – part 50sLogical Access Control – Part 10sLogical Access Control – Part 20sLogical Access Control – Part 30sLogical Access Control – Part 40sLogical Access Control – Part 50sWhat we covered in Domain 30sCertified in Cybersecurity Domain (CC) 3 links
-
Domain 4 Network SecurityDomain 4 – What we will be covering0sNetwork Basics and Definitions – Part 10sNetwork Basics and Definitions – Part 20sThe OSI Model – Part 10sThe OSI Model – Part 20sThe OSI Model – Part 30sThe TCP/IP model0sIP addresses, port numbers, and MAC addresses – Part 10sIP addresses, port numbers, and MAC addresses – Part 20sIP addresses, port numbers, and MAC addresses – Part 30sIP support protocols – Part 10sIP support protocols – Part 20sCables – Part 10sCables – Part 20sLAN topologies0sWi-Fi0sWireless networks – Part 10sWireless networks – Part 20sVLANs and Routers – Part 10sVLANs and Routers – Part 20sVPNs, NAC, and third-party connectivity0sSDN, SD-WAN, and SDX0sAttacks and attackers – Part 10sAttacks and attackers – Part 20sAttacks and attackers – Part 30sIntrusion Detection and Prevention systems (IDS-IPS) – Part 10sIntrusion Detection and Prevention systems (IDS-IPS) – Part 20sSIEM and SOAR systems0sHoneynets and Honeypots0sFirewalls – Part 10sFirewalls – Part 20s0-day attacks and exploits0sVulnerability Scanning0sVirtualization, Cloud, and Distributed Computing – Part 10sVirtualization, Cloud, and Distributed Computing – Part 20sVirtualization, Cloud, and Distributed Computing – Part 30sVirtualization, Cloud, and Distributed Computing – Part 40sVirtualization, Cloud, and Distributed Computing – Part 50sThe Internet of Things (IoT)0sAsset tracking and hardware hardening0sElectricity0sBackups – Part 10sBackups – Part 20sFault tolerance, redundancy, and resiliency – Part 10sFault tolerance, redundancy, and resiliency – Part 20sFault tolerance, redundancy, and resiliency – Part 30sFire suppression – Part 10sFire suppression – Part 20sSecure design principles – Part 10sSecure design principles – Part 20sWhat we covered in Domain 40sCertified in Cybersecurity (CC) Domain 4 links
-
Domain 5 Security OperationsDomain 5 – What we will be covering0sConfiguration Management0sPatch Management.0sChange Management0sCryptography – Part 10sCryptography – Part 20sCryptography – Part 30sHashing0sAttacks on our cryptography0sData handling, data storage and data retention – Part 10sData handling, data storage and data retention – Part 20sData handling, data storage and data retention – Part 30sAdministrative (Directive) Controls0sTraining and awareness0sSocial Engineering attacks – Part 10sSocial Engineering attacks – Part 20sWhat we covered in Domain 50sCertified in Cybersecurity (CC) Domain 5 links
-
Domain recaps
-
The study process, material, tips, tricks and practice tests!
Welcome, I am Thor Pedersen, and I am here to help you get that critical entry level Cyber security knowledge, so you can get your first job in Cyber security and/or pass your Certified in Cybersecurity (CC) certification by ISC2.
Join the over 68,000 students enrolled in my Certified in Cybersecurity (CC) courses.
My courses have over 680,000 enrollments from 201 countries, and my courses Certified in Cybersecurity (CC), CISSP, PMP, and CISM are the “Best Selling” and “Highest Rated”.
Why should you buy this course?
Getting into Cyber security and (if you want) earning your Certified in Cybersecurity Certification (CC) by ISC2 RIGHT now is a very smart career move.
-
You could make an awesome salary:
-
Certified Cyber security professionals in North America makes earn an average salary of USD99,000.
-
Entry Level Cyber security Analysts earn on average USD82,000 in the US.
-
Worldwide certified individuals earn on average USD91,000, where their non-certified colleagues earn less than USD60,000 a year.
-
-
There are a ton of open job:
-
There is a global gap in the Cyber security workforce of over 2.7 million open jobs we can’t fill.
769,000 of those jobs are in the US. There is 0% unemployment in Cyber security. -
35% of ALL Cyber security jobs are unfilled, there are simply not enough Cyber security professionals to hire.
-
Cyber security job growth is expected to be 33% in the next 10 years, the average for all occupations is 7.7%.
-
-
Very high job satisfaction:
-
77% of Cyber security professionals reported they are satisfied or extremely satisfied with their jobs, with Gen Z/Millennials experiencing the highest satisfaction rate at 79%.
-
“Information Security Analyst” is the #1 job in the “U.S. News & World Report 2022 Best Jobs” list. The list ranks the 100 best jobs across 17 sectors including business, healthcare, and technology, taking into account factors such as growth potential, salary and work-life balance.
-
-
A TON of directions you can expand your career:
-
Cyber security is such a vast field, you can specialize in what sounds exciting to you and you can work in almost any sector. They all need Cyber security professionals. You get to work in an amazing meaningful field.
-
I think my courses are fantastic, but don’t just take my word for it. Here’s what some of my other students have to say about them:
-
I passed my exam as of yesterday. Thanks so much for all the information. The way the course taught me how this test was going to ask me questions was so accurate. Thanks so much! (Katie,★★★★★).
-
Used this course to prepare for the exam and passed first time. So far the best instructor I have found on this platform. (Annette, ★★★★★).
-
Thanks Thor, this was excellent-keep up the great work! I passed on my first attempt after going through the course , this also helped in studying and passing Comptia Security+ because some of the concept I already got from studying for Certified in Cybersecurity. (Rosanne, ★★★★★).
-
I passed my exam yesterday, I must say this course helped me a lot! it was my second attempt. I bought this course after I failed on my first attempt. THOR is a great teacher, with lots of techniques and insights during the lessons. this course is very easy to understand. Don’t think twice go for it. The secret in life is not to give up! (Patricia, ★★★★★).
Join our community of successful students and reach your certification goals!
When you buy this course you get all this:
-
17.5 hours of Entry level Cyber security videos.
-
121-page PDF Certified in Cybersecurity (CC) study guides: Detailed guides made from our lectures.
-
1-page PDF Certified in Cybersecurity (CC) Mnemonics: Memory aids to help you remember key concepts.
-
260+ Certified in Cybersecurity (CC) practice questions: 60+ chapter completion questions and 2x 100 question practice tests.
-
200+ website links: Additional resources for you to delve deeper into entry-level Cyber security.
-
Subtitles in multiple languages: English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Japanese, Chinese, and Hindi.
-
An automatic certificate of completion: To hang on your wall, use for your resume, or for CEUs/PDUs. (17 CEUs)
-
30-day money-back guarantee: No questions asked.
-
Lifetime Access to the course and all future updates.
-
Offline video viewing: Available on the Udemy mobile apps.
In Domain 1: Security Principles we cover:
1.1 Understand the security concepts of information assurance
1.2 Understand the risk management process
1.3 Understand security controls
1.4 Understand ISC2 Code of Ethics
1.5 Understand governance processes
In Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts we cover:
2.1 Understand business continuity (BC)
2.2 Understand disaster recovery (DR)
2.3 Understand incident response
In Domain 3: Access Controls Concepts we cover:
3.1 Understand physical access controls
3.2 Understand logical access controls
In Domain 4: Network Security we cover:
4.1 Understand computer networking
4.2 Understand network threats and attacks
4.3 Understand network security infrastructure
In Domain 5: Security Operations we cover:
5.1 Understand data security
5.2 Understand system hardening
5.3 Understand best practice security policies
5.4 Understand security awareness training
We continue to update our courses to make sure you have the latest and most effective study materials:
-
2024: Added subtitles in Japanese and Portuguese (Brazil).
-
2023: Added updates/new videos: Scheduling your exam and what to expect, What to expect on exam day and after, I passed the exam, now what?, Domain 5 recap, Domain 2 recap, How to approach certification studying, Why you should want to get Certified in Cybersecurity.
-
2022: Course release for the completely new CC – Certified in Cybersecurity certification from ISC2.
Start Your Certification Journey Today!
Join thousands of successful professionals who have transformed their careers with ThorTeaches. Let me guide you to CISSP certification success.
Enroll now and let’s achieve your certification goals together!
Thor Pedersen
What's included
- 17.5 hours on-demand video
- 6 articles
- 14 downloadable resources
- Access on mobile and TV
- Closed captions
- Certificate of completion