Overview

Official (ISC)2 Entry-Level Cybersecurity Certification Training Official (ISC)² entry-level cybersecurity certification training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry-or junior-level cybersecurity role. About Certification From the global leader in cybersecurity credentials, the (ISC)2entry-level cybersecurity certification breaks down traditional barriers to entry, enabling candidates to build confidence and enter their first cybersecurity role prepared to succeed. It demonstrates a solid knowledge of the foundational concepts in information security, determined by experts and practitioners working in the field.

Training Includes:

  • 8 hours of live instruction
  • Peer discussions
  • Knowledge checks and end-of-chapter quizzes
  • Pre-and post-course assessments
  • Applied scenarios
  • Chapter-by-chapter study sheets with key points, terms and definitions
  • Flash cards
  • Exam voucher

Read more

Prerequisites

There are no prerequisites for this course.

Who Should Attend?

The course is ideal for students, prospective employees, entry-level professionals, and career changes seeking to start their path toward cybersecurity leadership by taking the (ISC)² entry-level cybersecurity exam.

Read more

Delegates will learn how to

After completing this course, the learner will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.

This course covers the following chapters and modules:

  • Domain 1: Security Principles
  • Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
  • Domain 3: Access Controls Concepts
  • Domain 4: Network Security
  • Domain 5: Security Operations

Read more

Outline

This course covers the following chapters and modules:


Chapter 1: Security Principles

  • Module 1: Understand the security concepts of information assurance
  • Module 2: Understand the risk management concepts
  • Module 3: Understand security controls
  • Module 4: Understand governance processes
  • Module 5: Understand (ISC)² Code of Ethics


Chapter 2: Incident Response, Business Continuity (BC), and Disaster Recovery (DR)

  • Module 1: Understand incident response
  • Module 2: Understand business continuity (BC)
  • Module 3: Understand disaster recovery (DR)


Chapter 3: Access Controls Concepts

  • Module 1: Understand access control concepts
  • Module 2: Understand physical access controls
  • Module 3: Understand logical access controls


Chapter 4: Network Security

  • Module 1: Understand computer networking
  • Module 2: Understand network threats and attacks
  • Module 3: Understand network security infrastructure


Chapter 5: Security Operations

  • Module 1: Understand data security
  • Module 2: Understand system hardening
  • Module 3: Understand best practice security policies
  • Module 4: Understand security awareness training


Chapter 6: Course Summary and Exam Details

  • Module 1: Work experience requirements
  • Module 2: Scheduling the exam
  • Module 3: Before the exam
  • Module 4: After the exam
  • Module 5: Exam Tips
  • Module 6: Review

Summary Note: Course materials are organized by chapter, not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline.

The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.

Read more

We are an (ISC)2 accredited CPE submitter.

QA is proud to be an (ISC)2 Official Training Partner.

Want to see all our (ISC)2 courses?

Learn more

ELCAS Enhanced Learning Credits Administration Service

QA is an approved training provider for ELCAS, proud to support service leavers in their transition into the tech industry.

Learn more

Why choose QA

Special Notices

This is an official ISC2 course, with the exam voucher included.

To see all our ISC2 courses, please click here.

Dates & Locations

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

Required Star = Required
Certification = Certification
AI Security & Governance
Application Security
Cyber Blue Team
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
OffSec
Privacy Professional
Reverse Engineer
Secure Coding
Security Architect
Security Auditor
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing

Cyber Defensive Operations learning paths

Want to boost your career in Cyber Defensive Operations? View QA's learning pathways below, specially designed to give you the skills to succeed.

Required Star = Required
Certification = Certification
Cyber Blue Team
DFIR Digital Forensics & Incident Response
Security Tech Generalist

Frequently asked questions

See all of our FAQs

How can I create an account on myQA.com?

There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.

If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".

If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.

Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.

How do QA’s virtual classroom courses work?

Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.

We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details