Program Highlights
InfosecTrain’s Certified in Cybersecurity (CC) training course is excellent for entry-level cybersecurity professionals. Certification in Cybersecurity demonstrates to employers that you have a thorough understanding of the appropriate technical principles and a demonstrated ability to learn while working.
16-Hour LIVE Instructor-led Training
Full 5 Domain Exam Practice
Learn with Real-world Scenarios
Highly Interactive & Dynamic Sessions
Immersive Learning
Learn from Industry Experts
Career Guidance & Mentorship
Extended Post Training Support
Access to Recorded Sessions
Learning Schedule
- upcoming classes
- corporate training
- 1 on 1 training
12 May - 22 May | Online | Weekday | 20:00 - 22:00 IST | BATCH OPEN |
Why Choose Our Corporate Training Solution
- Upskill your team on the latest tech
- Highly customized solutions
- Free Training Needs Analysis
- Skill-specific training delivery
- Secure your organizations inside-out
Why Choose 1-on-1 Training
- Get personalized attention
- Customized content
- Learn at your dedicated hour
- Instant clarification of doubt
- Guaranteed to run
Can't Find a Suitable Schedule? Talk to Our Training Advisor
- Domain 1: Security Principles (26%)
- 1.1: Understand the security concepts of information assurance
- Confidentiality
- Integrity
- Availability
- Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
- Non-repudiation
- Privacy
- 1.2: Understand the risk management process
- Risk management (e.g., risk priorities, risk tolerance)
- Risk identification, assessment, and treatment
- 1.3: Understand security controls
- Technical controls
- Administrative controls
- Physical controls
- 1.4: Understand (ISC)² Code of Ethics
- Professional code of conduct
- 1.4: Understand governance processes
- Policies
- Procedures
- Standards
- Regulations and laws
- 1.1: Understand the security concepts of information assurance
- Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts (10%)
- 2.1: Understand business continuity (BC)
- Purpose
- Importance
- Components
- 2.2: Understand disaster recovery (DR)
- Purpose
- Importance
- Components
- 2.3: Understand incident response
- Purpose
- Importance
- Components
- 2.1: Understand business continuity (BC)
- Domain 3: Access Controls Concepts (22%)
- 3.1: Understand physical access controls
- Physical security controls (e.g., badge systems, gate entry, environmental design)
- Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
- Authorized versus unauthorized personnel
- 3.2: Understand logical access controls
- Principle of least privilege
- Segregation of duties
- Discretionary access control (DAC)
- Mandatory access control (MAC)
- Role-based access control (RBAC)
- 3.1: Understand physical access controls
- Domain 4: Network Security (24%)
- 4.1: Understand computer networking
- Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi) Ports
- Applications
- 4.2: Understand network threats and attacks
- Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
- Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
- Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
- 4.3: Understand network security infrastructure
- On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
- Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
- Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)
- 4.1: Understand computer networking
- Domain 5: Security Operations (18%)
- 5.1: Understand data security
- Encryption (e.g., symmetric, asymmetric, hashing)
- Data handling (e.g., destruction, retention, classification, labeling)
- Logging and monitoring security events
- 5.2: Understand system hardening
- Configuration management (e.g., baselines, updates, patches)
- 5.3: Understand best practice security policies
- Data handling policy
- Password policy
- Acceptable Use Policy (AUP)
- Bring your own device (BYOD) policy
- Change management policy (e.g., documentation, approval, rollback)
- Privacy policy
- 5.4: Understand security awareness training
- Purpose/concepts (e.g., social engineering, password protection)
- Importance
- 5.1: Understand data security
How We Help You Succeed
Vision
Goal
Skill-Building
Mentoring
Direction
Support
Success
Your Trusted Instructors

10+ Years Of Experience
Words Have Power

Overall, the CC training was fantastic, led by a highly knowledgeable instructor who simplified complex topics, even for those of us with no prior IT experience. The supportive environment and well-structured approach made learning effective and enjoyable. It was a great experience!

The training was great, easy to follow, and helped me understand the concepts better. I feel more confident now.

The CC course is exceptional and tailored in such a way that everyone, regardless of their background, can easily understand the concepts. The structure, content delivery, and real-world examples make it highly effective and suitable for both beginners and professionals alike.

The trainer for this CC course was highly knowledgeable and extremely cooperative in clarifying doubts. They consistently went the extra mile to ensure every concept was clearly understood by all participants. Their dedication and teaching approach made the learning experience smooth and effective. They are definitely an asset to the organization she represents.
Success Speaks Volumes
Get a Sample Certificate

Frequently Asked Questions
What is (ISC)² Certified in Cybersecurity℠ exam?
The (ISC)² Certified in Cybersecurity exam is an entry-level certification designed to validate foundational cybersecurity knowledge. It proves that the holder possesses the foundational knowledge and skills necessary for entry—or junior-level roles in cybersecurity, showcasing their readiness to learn and advance in the field.
Who should take the CC exam?
The exam is ideal for newcomers to the cybersecurity field, including recent graduates, IT professionals seeking to transition into cybersecurity, and anyone interested in understanding basic cybersecurity principles.
What are the prerequisites for the CC exam?
No prerequisites are required to earn the Certified in Cybersecurity certification.
How can I register for the CC exam?
- Create an account with Pearson VUE, the exclusive global administrator of (ISC)² exams.
- Select the certification: CC: Certified in Cybersecurity.
- Select your testing location and schedule your exam.
- Enter the promo code you’ve obtained after submitting the candidate application form.
What topics are covered in the CC exam?
The course covered five domains:
- Security Principles
- Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
- Access Controls Concepts
- Network Security
- Security Operations
How long is the CC exam, and what is the format?
The exam is formatted with multiple-choice questions and lasts 2 hours.
What is the passing score for the CC exam?
The passing score is 700 out of 1000.
What study materials are recommended for the CC exam?
There are various study materials available for the CC exam, including:
- Textbooks
- Free study guides
- InfosecTrain’s online instructor-led training
- Online courses
- Free practice question papers
Is there a recertification requirement for the CC certification?
Yes, like most professional certifications, maintaining the CC certification requires meeting continuing professional education (CPE) credits and paying an annual maintenance fee to ensure the certification holder stays current in the field.
What opportunities can arise from being certified in cybersecurity?
Earning a CC certification can open up entry-level roles in cybersecurity, including:
- Information Security Analyst
- Security Consultant
- Penetration Tester
- Incident Responder
- Security Architect