Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   ISC2 Certification   /   CC Certification

CC - Certified in Cybersecurity




Start Your Exciting Cybersecurity Career with CC

Take the first step to a rewarding career with Certified in Cybersecurity (CC) from ISC2, the world’s leading cybersecurity professional organization known for the CISSP. You don’t need experience — just the passion and drive to enter a field that opens limitless opportunities around the globe.


Why Earn the CC?

If you're looking to join a dynamic and rewarding workforce, get Certified in Cybersecurity and demonstrate to employers you have the foundational knowledge and passion to join their team. This certification is ideal for:

Ideal candidates for Certified in Cybersecurity are:

What Makes Certified in Cybersecurity Your Best Move?



Course Details

1. Security Principle

  • Understand the security concepts of information assurance
    • Confidentiality
    • Integrity
    • Availability
    • Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
    • Non-repudiation
    • Privacy
  • Understand the risk management process
    • Risk management (e.g., risk priorities, risk tolerance)
    • Risk identification, assessment and treatment
  • Understand security controls
    • Technical controls
    • Administrative controls
    • Physical controls
  • Understand ISC2 Code of Ethics
    • Professional code of conduct
  • Understand governance processes
    • Policies
    • Procedures
    • Standards
    • Regulations and laws

  • Understand business continuity (BC)
    • Purpose
    • Importance
    • Components
  • Understand disaster recovery (DR)
    • Purpose
    • Importance
    • Components
  • Understand incident response
    • Purpose
    • Importance
    • Components

  • Understand physical access controls
    • Physical security controls (e.g., badge systems, gate entry, environmental design)
    • Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
    • Authorized versus unauthorized personnel
  • Understand logical access controls
    • Principle of least privilege
    • Segregation of duties
    • Discretionary access control (DAC)
    • Mandatory access control (MAC)
    • Role-based access control (RBAC)

  • Understand computer networking
    • Networks
      • Open Systems Interconnection (OSI) model
      • Transmission Control Protocol/Internet Protocol (TCP/IP) model
      • Internet Protocol version 4 (IPv4)
      • Protocol version 6 (IPv6)
      • WiFi
    • Ports
    • Applications
  • Understand network threats and attacks
    • Types of threats
      • Distributed denial-of-service (DDoS)
      • worm
      • Trojan
      • man-in-the-middle (MITM)
      • side-channel
    • Identification
      • Intrusion detection system (IDS)
      • Host-based intrusion detection system (HIDS)
      • Hetwork Intrusion Detection System (NIDS)
    • Prevention
      • Antivirus
      • Scans
      • Firewalls
      • Intrusion prevention system (IPS)
  • Understand network security infrastructure
    • On-premises
      • Power
      • Data center/closets
      • Heating
      • Ventilation, and Air Conditioning (HVAC)
      • Environmental
      • Fire suppression
      • Redundancy
      • Memorandum of understanding (MOU)/memorandum of agreement (MOA)
    • Design
      • Network segmentation Demilitarized zone (DMZ)
      • Virtual local area network (VLAN)
      • Virtual Private Network (VPN)
      • Micro-segmentation
      • defense in depth
      • Network Access Control (NAC)
      • segmentation for embedded systems
      • Internet of Things (IoT)
    • Cloud
      • Service-level agreement (SLA)
      • Managed service provider (MSP)
      • Software as a Service (SaaS)
      • Infrastructure as a Service (IaaS)
      • Platform as a Service (PaaS)
      • Hybrid

  • Understand data security
    • Encryption (e.g., symmetric, asymmetric, hashing)
    • Data handling (e.g., destruction, retention, classification, labeling)
    • Logging and monitoring security events
  • Understand system hardening
    • Configuration management (e.g., baselines, updates, patches)
  • Understand best practice security policies
    • Data handling policy
    • Password policy
    • Acceptable Use Policy (AUP)
    • Bring your own device (BYOD) policy
    • Change management policy (e.g., documentation, approval, rollback)
    • Privacy policy
  • Understand security awareness training
    • Purpose/concepts (e.g., social engineering, password protection)
    • Importance


Fees Structure : 15500 INR / 185 USD
Total No of Class : 62 Video Class
Class Duration : 54:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online