0% found this document useful (0 votes)
525 views7 pages

ISC2 CC Full Study Guide

this contain a well detailed guide for issc2

Uploaded by

wisdomnwaokolol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
525 views7 pages

ISC2 CC Full Study Guide

this contain a well detailed guide for issc2

Uploaded by

wisdomnwaokolol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ISC2 Certified in Cybersecurity (CC) –

Comprehensive Study Guide

Covers Domains 1–5 with explanations, examples, practice questions, and references.
Domain 1: Security Principles
1 Covers CIA Triad (Confidentiality, Integrity, Availability).
2 Principles of least privilege, separation of duties, defense in depth.
3 Governance, risk management, compliance basics.
4 Threats vs vulnerabilities vs risks.
5 Ethical responsibilities of security professionals.
6 Exam focus: CIA, access control principles, governance, ethics.
Domain 2: Business Continuity (BC), Disaster
Recovery (DR), and Incident Response Concepts
1 Key metrics: RPO (Recovery Point Objective), RTO (Recovery Time Objective).
2 Business Impact Analysis (BIA).
3 Disaster recovery strategies: hot/warm/cold sites, cloud resilience.
4 Incident response steps: Preparation, Detection, Containment, Eradication, Recovery, Lessons
Learned.
5 Backup strategies: full, incremental, differential.
6 Exam focus: correct DR site, difference between BCP/DR, IR steps.
Domain 3: Access Control Concepts
1 Authentication factors: something you know/have/are/do/where you are.
2 MFA requires at least two *different* factor types.
3 Identity lifecycle: provision, review, de-provision.
4 Access control models: DAC, MAC, RBAC, ABAC.
5 Federation: SAML, OIDC, Kerberos.
6 Logging, SIEM, centralized tamper-proof logs.
7 Exam focus: MFA, access control models, privilege creep.
Domain 4: Network Security
1 OSI & TCP/IP models, common ports (80, 443, 22, etc.).
2 Secure protocols: SSH, HTTPS, SFTP.
3 Network design: defense in depth, DMZ, VLANs, zero trust.
4 Devices: firewalls, IDS/IPS, proxies, load balancers.
5 Secure comms: TLS, IPSec, VPNs.
6 Wireless security: WPA2/WPA3, 802.1X enterprise auth.
7 Common attacks: DoS, MITM, spoofing, sniffing.
8 Monitoring: SIEM, honeypots, NetFlow.
9 Exam focus: OSI mapping, secure designs, mitigations.
Domain 5: Security Operations
1 SOC functions: monitoring, incident detection, escalation.
2 Incident Response steps (NIST SP 800-61).
3 Business continuity & disaster recovery: BCP/DRP planning, backups, redundancy.
4 Change/configuration management, version control.
5 Vulnerability management: scanning, patching, pen testing.
6 Security awareness training.
7 Vendor/supply chain security.
8 Metrics: MTTD, MTTR.
9 Exam focus: IR order, RPO vs RTO, backup types, change mgmt.
References & Further Reading
1 ISC2 Certified in Cybersecurity (CC) Official Study Guide – Wiley.
2 NIST SP 800-61 Rev.2 – Incident Handling Guide.
3 NIST SP 800-34 Rev.1 – Contingency Planning Guide.
4 NIST SP 800-41 Rev.1 – Firewall Policy Guidelines.
5 NIST SP 800-207 – Zero Trust Architecture.
6 ISO/IEC 27035 – Incident Management.
7 RFC 4301 – IPSec Security Architecture.
8 Cisco SAFE Network Design Principles – [Link]
9 OWASP Networking & Secure Operations Guidelines – [Link]
10 SANS Institute Whitepapers – [Link]
11 CompTIA Security+ SY0-701 Objectives for cross-reference.

You might also like