Left Blocks Image | Learnfly Right Blocks Image | Learnfly
All in One Offer! | Access Unlimited Courses in any category starting at just $29. Offer Ends in:

Learnfly | Menu Trigger Icons Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart
    Learnfly | Empty Cart Icons

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Free
6 days left at this price!

This plan includes

  • Limited free courses access
  • Play & Pause Course Videos
  • Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Email & Chat Support
Get Unlimited Learning Access
$29
6 days left at this price!
30-Day Money-Back Guarantee

This plan includes

  • Access to 11,000+ Courses
  • Ads free experience Courses
  • Play & Pause Course Videos
  • Learnfly HD IconsHD Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Instructor Direct Support
  • Email & Chat Support
  • Cancel Anytime
$29
$29
$29
  • Security Principles
  • Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
  • Access Controls Concepts
  • Network Security
  • Security Operations

The  Cyber Security training course is designed to provide you with a detailed understanding of information security management, risk management, and incident management. The course is divided into four domains, each of which is covered in-depth:

The course is designed to help you develop the necessary skills to become a successful information security manager by providing you with practical knowledge and hands-on experience.

Certification:


Upon completion of the course, you will be eligible to sit for the CC certification exam. The exam is administered by ISC2.

Enroll in the CC training course today and take the first step towards becoming certified in cybersecurity.

Why Choose Cyvitrix?

Industry-Relevant Curriculum:We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.

Expert Instructors:Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.

Flexible Learning:We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.

Certification:Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.

Community:Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.

Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.

Why training with us is ideal for you?

- Excellent quality video content

- High courses quality

- Organized materials

- Real life scenarios and examples

- Practice questions and questions ideas

- Up to date content

- Reasonable pricing

  • No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
  • Security Analysts and Managers
  • Students who need to gain understanding
  • People who are interested in pursuing this certification
  • IT Manager, and Analysts
  • Auditors and Risk practitioners
  • Anyone interested in the subject of the training
View More...
  • Section 1 : Course Introduction 1 Lectures 00:03:29

    • Lecture 1 :
    • Certified in Cybersecurity Course Introduction Preview
  • Section 2 : Domain 1 Security Principles 19 Lectures 02:13:20

    • Lecture 1 :
    • 1-CC1-EN-The Security Objective and CIA Triad
    • Lecture 2 :
    • 2-CC1-EN-Privacy Requirements and regulations
    • Lecture 3 :
    • 3-CC1-EN-Risk Management Introduction
    • Lecture 4 :
    • 4-CC1-EN-Inherent and Residual Risk
    • Lecture 5 :
    • 5-CC1-EN-Managing the Risk - Risk Response
    • Lecture 6 :
    • 6-CC1-EN-Reporting and Monitoring the Risk
    • Lecture 7 :
    • 7-CC1-EN-Introduction to Security Controls
    • Lecture 8 :
    • 8-CC1-EN-Security Controls Examples
    • Lecture 9 :
    • 9-CC1-EN-Defens in Depth or layered defenses
    • Lecture 10 :
    • 10-CC1-EN-ISC2 Code of Ethics
    • Lecture 11 :
    • 11-CC1-EN-Information System Governance and Management
    • Lecture 12 :
    • 12-CC1-EN-Policies as Governance Tool
    • Lecture 13 :
    • 13-CC1-EN-Policies Example
    • Lecture 14 :
    • 14-CC1-EN-Clear Desk Policy
    • Lecture 15 :
    • 15-CC1-EN-Acceptable Use Policy - AUP
    • Lecture 16 :
    • 16-CC1-EN-Standards
    • Lecture 17 :
    • 17-CC1-EN-Procedures and Guidelines
    • Lecture 18 :
    • 18-CC1-EN-Law and Legal Regulations
    • Lecture 19 :
    • 19-CC1-EN-Separation of duties and avoiding conflict of interest
  • Section 3 : Domain 2 Business Continuity (BC), Disaster Recovery, IRP 16 Lectures 02:14:04

    • Lecture 1 :
    • 1-CC2-EN-Security Threats
    • Lecture 2 :
    • 2-CC2-EN-Vulnerabilities and Cyber Attacks
    • Lecture 3 :
    • 3-CC2-EN-Man in the middle attack and Bufferover Flow
    • Lecture 4 :
    • 4-CC2-EN-Cyber Kill Chain, the Process of Hacking into systems
    • Lecture 5 :
    • 5-CC2-EN-Incident Management Process
    • Lecture 6 :
    • 6-CC2-EN-Understand Business Impact Assessment
    • Lecture 7 :
    • 7-CC2-EN-Disaster Recovery Plan and its components
    • Lecture 8 :
    • 8-CC2-EN-Business Continuity Plan
    • Lecture 9 :
    • 9-CC2-EN-Recovery Point Objective and Recovery Time Objective
    • Lecture 10 :
    • 10-CC2-EN-Acceptable Interruption Window, Service Delivery Objective and MTO
    • Lecture 11 :
    • 11-CC2-EN-CISA4-Recovery Sites
    • Lecture 12 :
    • 12-CC2-EN-Testing and evaluating BCP and DRP
    • Lecture 13 :
    • 13-CC2-EN-Data Backup Overview
    • Lecture 14 :
    • 14-CC2-EN-Data Backup types and Backup Strategy
    • Lecture 15 :
    • 15-CC2-EN-Stroage Media types - DAS vs NAS vs SAN
    • Lecture 16 :
    • 16-CC2-EN-Storage Redundancy using Redundant Array of Independet Disks
  • Section 4 : Domain 3 Access Control 14 Lectures 02:03:47

    • Lecture 1 :
    • 1-CC3-EN-The IAAA Framework
    • Lecture 2 :
    • 2-CC3-EN-Authentication
    • Lecture 3 :
    • 3-CC3-EN-MFA and Biometric
    • Lecture 4 :
    • 4-CC3-EN-Single Sign on (SSO) and Reduced Sign on (RSO)
    • Lecture 5 :
    • 5-CC3-EN-Authorisation and Access Control Models
    • Lecture 6 :
    • 6-CC3-EN-Owner and Custodian and their responsibilities in Assets and data ...
    • Lecture 7 :
    • 7-CC3-EN-Accounting and Auditing
    • Lecture 8 :
    • 8-CC3-EN-IAM Solutions
    • Lecture 9 :
    • 9-CC3-EN-What is Physical Security
    • Lecture 10 :
    • 10-CC3-EN-Physical Access Control System 1
    • Lecture 11 :
    • 11-CC3-EN-Physical Access Control System 2
    • Lecture 12 :
    • 12-CC3-EN-Environmental Controls - Securing Power Sources
    • Lecture 13 :
    • 13-CC3-EN-Environmental Controls - Fire Threat and Controls
    • Lecture 14 :
    • 14-CC3-EN-Physical Security Best Practices
  • Section 5 : Domain 4 Network Security 17 Lectures 02:44:28

    • Lecture 1 :
    • 1-CC4-EN-Introduction to IT Networks
    • Lecture 2 :
    • 2-CC4-EN-Network Topologies Explaination
    • Lecture 3 :
    • 3-CC4-EN-CISA4-OSI and TCPIP Model
    • Lecture 4 :
    • 4-CC4-EN-CISA4-Layers 1,2,3 Overview - IP Address, MAC Address, Physical Layers
    • Lecture 5 :
    • 5-CC4-EN-Layer 3,4,5,6,7 Overview - TCPUDP - Session and Application Layers
    • Lecture 6 :
    • 6-CC4-EN-Organization IT Infrastructure and Security Overview
    • Lecture 7 :
    • 7-CC4-EN-Network Segmentation and VLANs
    • Lecture 8 :
    • 8-CC4-EN-Firewalls and IPS
    • Lecture 9 :
    • 9-CC4-EN-Network Admission Control and Dot1x
    • Lecture 10 :
    • 10-CC4-EN-DMZ and Bastian Host - Screened Subnet
    • Lecture 11 :
    • 11-CC4-EN-Proxy, Load Balancer, Email Security
    • Lecture 12 :
    • 12-CC4-EN-VPN Service
    • Lecture 13 :
    • 13-CC4-EN-Cryptography Overview
    • Lecture 14 :
    • 14-CC4-EN-Symmetric Encryption
    • Lecture 15 :
    • 15-CC4-EN-Asymmetric Encryption Overview
    • Lecture 16 :
    • 16-CC4-EN-Integrity Hashing and Salting
    • Lecture 17 :
    • 17-CC4-EN-CISA5-Digital Signature
  • Section 6 : Domain 5 Security Operations 23 Lectures 03:09:36

    • Lecture 1 :
    • 1-CC5-EN-Data Lifecylce
    • Lecture 2 :
    • 2-CC5-EN-Roles in Data and Assets Protection
    • Lecture 3 :
    • 3-CC5-EN-Data Security Measures
    • Lecture 4 :
    • 4-CC5-EN-Data Destruction
    • Lecture 5 :
    • 5-CC5-EN-Security Operation Center Overview
    • Lecture 6 :
    • 6-CC5-EN-SOC Tools - SIEM Solution
    • Lecture 7 :
    • 7-CC5-EN-SOC Tools - FIM Solution
    • Lecture 8 :
    • 8-CC5-EN-SOC Tools - Vulnerability Scanning tools
    • Lecture 9 :
    • 9-CC5-EN-SOC Tools - EDR and NDR Overview
    • Lecture 10 :
    • 10-CC5-EN-SOC Tools - XDR and SOAR Overview
    • Lecture 11 :
    • 11-CC5-EN-SOC Tools - Threat Intel and IOCs and TTPs
    • Lecture 12 :
    • 12-CC5-EN-CISA5-End-user Security Software Overview
    • Lecture 13 :
    • 13-CC5-EN-CISA5-Endpoint Protection Platform Overview - EPP
    • Lecture 14 :
    • 14-CC5-EN-Configuration Management
    • Lecture 15 :
    • 15-CC5-EN-Patch Management and Vulnerability Management
    • Lecture 16 :
    • 16-CC5-EN-Change Management Process
    • Lecture 17 :
    • 17-CC5-EN-Types of Changes
    • Lecture 18 :
    • 18-CC5-EN-Introduction to Databases
    • Lecture 19 :
    • 19-CC5-EN-Database Security Key Concepts
    • Lecture 20 :
    • 20-CC5-EN-Social Engineering
    • Lecture 21 :
    • 21-CC5-EN-Security Awareness Program
    • Lecture 22 :
    • 22-CC5-EN-Software development methodologies overview
    • Lecture 23 :
    • 23-Security Testing - PT, SAST, SCA
  • Learnfly Google Logo
  • Learnfly Facebook Logo
  • Learnfly Apple Logo
  • Learnfly EA Logo
  • Learnfly Amazon Logo
  • Learnfly IBM Logo
  • Learnfly Microsoft Logo
  • Learnfly Reddit Logo
  • Learnfly Spotify Logo
  • Learnfly Uber Logo
  • Learnfly Youtube Logo
  • Learnfly Instagram Logo
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
    Learnfly LMS Sample
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
User Images | Learnfly

40970 Course Views

10 Courses

I am Security Consultant and Professional Trainer, Certified Trainer from many Certification bodies, I posses not only knowledge, but only proven skills and compliance projects experience, I have the following "ACTIVE" Credentials Certified Information System Security Professional - CISSP Certified information Security Manager - CISM Certified Information System Auditor - CISA Certified in Risk and Information System Control (CRISC) Cisco Certified Network Professional (CCNP) Enterprise Track Paloalto Certified Network Security Engineer (PCNSE7) Fortinet Network Security Engineer (NSE) ISO27001 Lead Implementer Certified Ethical Hacker - v10
View More...
  • Unmatched Variety and Value!
    Learnfly's monthly subscription offers unlimited access to a vast range of courses. Affordable pricing, compared to competitors, makes it the ultimate choice for continuous learning.
    Jessica M.

    4.7

    JM
  • Top-Notch Quality, Affordable Rates!
    High-quality courses with certified instructors make Learnfly stand out. The affordable pricing is a game-changer for those seeking premium education.
    Alex P.

    4.5

    AP
  • Certified Excellence Every Time!
    Learnfly's courses, taught by certified instructors, ensure top-notch learning experiences. The course completion certificates add significant value to one's skill set.
    Sarah R.

    4.3

    SR
  • Round-the-Clock Support!
    Learnfly goes the extra mile with 24/7 course support. Their dedication to helping students succeed is commendable.
    Ryan K.

    4.1

    RK
  • Learn Anywhere, Anytime!
    Whether on mobile, PC, or tablet, Learnfly's platform offers flexibility. Learning on the go has never been easier.
    Emily S.

    4.7

    ES
  • Job-Ready Skills!
    Learnfly's job-oriented courses equip learners with practical skills for the workplace. An investment in career growth!
    Jake M.

    4.2

    JM
  • Budget-Friendly Brilliance!
    Learnfly's pricing is a steal for the quality and variety of courses offered. Quality education without breaking the bank.
    Olivia T.

    4.5

    OT
  • Instructor Excellence Unleashed!
    Learn from the best with Learnfly's certified instructors. The platform ensures that knowledge is imparted by industry experts.
    Daniel L.

    4.0

    DL
  • Achievement Unlocked!
    Learnfly not only offers courses but also recognizes your efforts with course completion certificates. A sense of accomplishment with every course finished.
    Maya H.

    4.6

    MH
  • Learning Revolution!
    Learnfly's platform is a revolution in education. Access to unlimited courses at affordable rates is a game-changer.
    Ethan W.

    4.7

    EW
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner 0:10:40
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner 3:28:56
  • the-complete-xmpp-course-chat-server-setup-android-ios-apps

    The Complete XMPP Course: Chat Serv...

    By : Abhilash Nelson

    Lectures 10 Beginner 0:47:3

Students learning on Learnfly works with Fortune 500 companies around the globe.

  • Learnfly | a-l-1a Icons
  • Learnfly | a-l-2a Icons
  • Learnfly | a-l-3a Icons
  • Learnfly | a-l-4a Icons
  • Learnfly | a-l-6a Icons
  • Learnfly | a-l-7a Icons
Sign Up & Start Learning
Learnfly | Sign Up Icons
Learnfly | Sign Up Icons
Learnfly | Sign Up Icons




By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.
Learnfly | Sign Up Icons