Dê o primeiro passo para uma carreira gratificante em segurança da informação com a certificação Certified in Cybersecurity (CC) da ISC2, a principal organização profissional de segurança cibernética do mundo conhecida pelas prestigiadas e renomadas certificações CISSP e CCSP.
Module 00 – About Certified in Cybersecurity (CC) Certification by ISC2 (Open)
Boas-vindas ao treinamento Certificação em Segurança Cibernética (CC) da ISC2
Aulas
Certified in Cybersecurity Entry-Level Certification – Official Video Visualização Welcome – Video Overview Study Plan and Exam Preparation – Video Study Plan and Exam Preparation Download Certified in Cybersecurity Exam OutlineModule 01 – Security Principals
Conceitos e Principais Princípios da Segurança Cibernética
Aulas
Welcome – Video Study Group CC – WhatsApp Overview CIA Triad Confidentiality – Video Confidentiality Integrity – Video Integrity Availability – Video Availability Authentication – Video Authentication Authorization – Video Authorization Non-repudiation – Video Non-repudiation Privacy – Video Privacy Risk Management – Video Risk Management Information Security Risk – Video Information Security Risk Risk Management Terminology – Video Risk Management Terminology Risk Treatment – Video Risk Treatment Risk Analysis – Video Risk Analysis Risk Tolerance – Video Risk Tolerance Security Controls – Video Security Controls Governance – Video Governance Regulations and Laws – Video Regulations and Laws HIPAA – Video HIPAA GDPR – Video GDPR Standards – Video Standards Policies Procedures – Video Procedures ISC2 Code of Ethics – Video ISC2 Code of Ethics Mock Questions Discussion Questions – Module 01Module 02 – Incident Response, Business Continuity and Disaster Recovery
Conceitos Fundamentais sobre Resposta à Incidentes, Continuidade dos Negócios e Recuperação de Desastres
Aulas
Welcome – Video Overview Business Continuity Business Impact Analysis (BIA) – Video Business Impact Analysis (BIA) Recovery Point Objective (RPO) – Video Recovery Point Objective (RPO) Recovery Time Objective (RTO) – Video Recovery Time Objective (RTO) Mean Time to Repair – Video Mean Time to Repair (MTTR) Mean Time Between Failures (MTBF) – Video Mean Time Between Failures (MTBF) Incident Response – Video Incident Response Incident Terminology – Video Incident Terminology Ransomware Attack – Video Ransomware Attack Service Level Agreement (SLA) – Video Service Level Agreement (SLA) Backup and Recovery – Video Backup and Recovery Mock Questions Discussion Questions – Module 02Module 03 – Access Control Concepts
Conceitos e Fundamentos sobre Controle de Acesso
Aulas
Welcome – Video Overview Access Control Concepts – Video Access Control Concepts Defense in Depth – Video Defense in Depth Access Control – Video Access Control Logical Access Controls – Video Logical Access Controls Physical Access Controls – Video Physical Access Controls Perimeter Protection – Video Perimeter Protection Access Control System – Video Access Control System Security Guards – Video Security Guards Surveillance Cameras – Video Surveillance Cameras Lighting – Video Lighting Alarm Systems – Video Alarm Systems Security Policies and Procedures – Video Security Policies and Procedures Regular Security Assessments and Audits – Video Regular Security Assessments and Audits Visitor Management – Video Visitor Management Law Enforcement and Emergency Responders – Video Law Enforcement and Emergency Responders Mock Questions – Module 03 Discussion Questions – Module 03Module 04 – Network Security
Conceitos e Fundamentos sobre Segurança em Redes de Computadores e Internet
Aulas
Welcome – Video Overview Computer Network – Video Computer Network TCP/IP Model – Video TCP/IP Model OSI Model – Video OSI Model Network Devices – Video Network Devices Device Address – Video Device Address Transmission Control Protocol / Internet Protocol (TCP/IP) – Video Transmission Control Protocol / Internet Protocol (TCP/IP) User Datagram Protocol (UDP) – Video User Datagram Protocol (UDP) IPv4 Protocol – Video IPv4 Protocol IPv6 Protocol – Video IPv6 Protocol File Transfer Protocol (FTP / SFTP) – Video File Transfer Protocol (FTP / SFTP) Secure Shell Protocol (SSH) – Video Secure Shell Protocol (SSH) Domain Name System (DNS / DNSSec) – Video Domain Name System (DNS / DNSSec) Internet Control Message Protocol (ICMP) – Video Internet Control Message Protocol (ICMP) Remote Desktop Protocol (RDP) – Video Remote Desktop Protocol (RDP) Hypertext Transfer Protocol (HTTP) – Video Hypertext Transfer Protocol (HTTP) Cloud Access Security Broker (CASB ) – Video Cloud Access Security Broker (CASB ) Heating, Ventilation, and Air Conditioning (HVAC) – Video Heating, Ventilation, and Air Conditioning (HVAC) Internet of Things (IoT) – Video Internet of Things (IoT) Cloud Computing – Video Cloud Computing Cloud Deployment Models – Video Cloud Deployment Models Mock Questions – Module 04 Discussion Questions – Module 04Módulo 05 – Security Operations
Conceitos e Fundamentos sobre Segurança em Operações na Sustentação de Serviços de Tecnologia da Informação
Aulas
Welcome – Video Overview Data Handling – Video Data Handling Data Lifecycle – Video Data Lifecycle Data Classification – Video Data Classification Data Sensibility Levels – Video Data Sensibility Levels Data Retention – Video Data Retention Data Destruction – Video Data Destruction Logging and Monitoring Security Events – Video Logging and Monitoring Security Events Cryptography – Video Cryptography Digital Signature – Video Digital Signature Hashing – Video Hashing System Hardening – Video System Hardening Inventory & Assessment – Video Inventory & Assessment Password Policy – Video Password Policy Acceptable Use Policy (AUP) – Video Acceptable Use Policy (AUP) Bring Your Own Device (BYOD) Policy – Video Bring Your Own Device (BYOD) Policy Privacy Policy – Video Privacy Policy Change Management – Video Change Management Security Awareness Training – Video Security Awareness Training Education, Training and Awareness – Video Education, Training and Awareness Social Engineering – Video Social Engineering Software Development Methodologies – Video Software Development Methodologies Mock Questions – Module 05 Discussion Questions – Module 05Module 06 – Final Exam & Certificate
Final Exame and Certificate