Certified Cyber Security Professional

sigle-CCSP (1)
249 $

ExpertEduc is now offering the professional certification in Cybersecurity, Certified Cyber Security Professional- CCSP, where you will learn the fundamental concepts of Cybersecurity and implement the practice of protecting systems, networks and programs from digital attacks. These cyber-attacks generally aim to access, change or destroy confidential information ; extort money from users; or interrupt normal business processes.

The implementation of effective cybersecurity measures is particularly challenging today because there are more devices than people, and the attackers are becoming more innovative. This certification will help you understand the basic functions of a security framework and the importance of establishing cybersecurity to protect information based on the three pillars of data security.

Learning Objetives

– Fundamental Concepts of Cybersecurity NIST

– Introduction to cybersecurity framework.

– Risk management and the cybersecurity framework.

– Implementation of the cybersecurity framework.

– Establish or improve communicative cybersecurity.

– Methodology to protect privacy and civil liberties.

– Self-assessment of cybersecurity risk with the framework.

Audience Profile

Anyone interested in expanding their knowledge to learn more about the importance of cybersecurity and learn how to avoid all types of threats, that put at risk the information that is processed, transported and stored on any device.

Exam Details

– Format: Multiple choice.

– Questions: 60.

– Language: English / French.

– Pass Score: 65%

– Duration: 75 minutes máximum.

– Delivery: This examination is available Online.

– Supervised: It will be at the Partner’s discretion.


There are no formal prerequisites for this certification.


Domain 1: Cyber Security Concepts

Cyber Security Concepts is the first area covered in this CCSP certification program. The different areas or topics that candidates should learn are found below:

Domain 1 Lessons

Cybersecurity principles used to manage risks associated with the use, processing, storage, and transmission of information or data.

Security Management

Risk management process, including risk assessment steps and methods.

Threat actors

Cybersecurity roles

Common adversarial tactics, techniques and procedures (TTPs)

Relevant laws, policies, procedures, and governance requirements.

Cybersecurity Controls

Domain 2: Cybersecurity Architecture Principles

Domain 2 focuses on the principles of cybersecurity architecture, and students will learn the following topics:

Domain 2 Lessons

Network design process, to include an understanding of security objectives, business objectives, and tradeoffs.

Methods, tools, and techniques for designing security systems.

Network access, identity and access management

Information technology (IT) security principles and methods

Concepts of network security architecture, including topology, protocols, components and principles

Malware analysis concepts and methodology

Intrusion detection methods and techniques for detecting host and network intrusions through intrusion detection technologies

Defense-in-depth principles and network security architecture

Encryption algorithms


Encryption methodologies

The process of traffic flow through the network (e.g., transmission and encapsulation)

Network protocols, dynamic host configuration protocol and directory services

Domain 3: Network, System, Application and Data Security

This is the third area covered in this course, and it is called Network, System, Application and Data Security. Students can expect to review the following topics:

Domain 3 lessons

Vulnerability assessment tools and their capabilities

Basic system, network, and operating system hardening techniques

Risk associated with virtualities

Penetration testing

Network systems management principles, modules, methods and tools

Remote access technology

Unix command line

Threats and vulnerabilities to system and application security

Principles of systems life cycle management, including software security and usability

Specialized local system requirements for security, performance and reliability.

Threats and vulnerabilities to system and application security

Social dynamics of computer attackers in a global context

Secure configuration management techniques

Capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media and related hardware.

Communication methods, principles and concepts that support the network infrastructure

Common networking protocols and services and their interaction to provide network communications.

The different types of network communications

Virtualization technologies and development and maintenance of virtual machines

Application security

Risk threat assessment

Domain 4: Incident Response

Incident Response is the fourth area examined in this course and focuses on the following areas:

Domain 4 lessons

Incident Categories and Response

Business Continuity/Disaster Recovery

Incident response and handling methods

Security Event Correlation Tools

Digital evidence capture and preservation processes

Types of digital forensic data

Basic concepts and practices for handling digital forensic data

Anti-forensic Tactics, Techniques and Procedures (TTPS)

Common configuration of forensic tools and supporting applications

Methods of network traffic analysis

Which system files contain relevant information and where to find these system files

Domain 5: Security Implications and Adoption of Evolving Technologies

Security implications and the adoption of evolving technologies is the fifth and final area covered in this formal CSX Fundamentals training program. It is in this area that students can expect to learn about the following topics:

Domain 5 Lessons

Emerging technologies and associated security issues, risks and vulnerabilities

Risk associated with mobile computing

Cloud concepts around data and collaboration

Risk of moving applications and infrastructure to the cloud

Risk associated with outsourcing

Supply chain risk management processes and practices

Course Content

Time: 10 weeks

Curriculum is empty



0 rating

5 stars
4 stars
3 stars
2 stars
1 star
249 $