Video: ISC² Certified in Cybersecurity (CC): Everything You Need to Know
https://youtu.be/tdJWg48zc8w
https://youtu.be/tdJWg48zc8w
To accompany the recent vodcast, I am sharing the resources that I used to pass my CISSP. To understand how I used each of the resources below, please listen to…
False Rejection Rate (FRR) The number of times biometric authentication has falsely rejected a legitimate user Also known as false negative Also known as a Type I Error False Acceptance…
Documentation types listed in order of most importance: Policy Mandatory document Used by senior management to show that they have exercised due diligence Defines the scope of the required security…
Full Backups A full data backup of all the data from a device Archive bit changed from 1 to 0 once the data has been backed up Differential Backups A…
Change Log LogDateAdded cost/benefit analysis example updates and also added a cost/benefit analysis exercise17/04/23Added definitions for 'safeguards' and 'countermeasures' and included links for reference17/04/23Added more examples12/05/23 NoteThe word Safeguard and…
Many people have reached out to me and asked where they can find the exam code for the ISC2 Certified in Cybersecurity (CC) certification. ISC2 haven't made it very clear…
In this video, I discuss the resources used that helped me pass the ICS2 Certified in Cybersecurity certification and we take a look at what you need to give yourself…
https://youtu.be/6MnyJtUFFjo cc-to-cissp-domains
https://youtu.be/81SA98_faG8 entry-level-ultimate_guide-digitalDownload