/0. Websites you may like/
|
[CourseClub.Me].url
|
0.1 KB
|
[FreeCourseSite.com].url
|
0.1 KB
|
[GigaCourse.Com].url
|
0.0 KB
|
/01 - Introduction/
|
001 2023-CC-Domain-1-Study-guide-by-ThorTeaches.com-v1.1.pdf
|
1.4 MB
|
001 2023-CC-Domain-2-Study-guide-by-ThorTeaches.com-v1.1.pdf
|
833.2 KB
|
001 2023-CC-Domain-3-Study-guide-by-ThorTeaches.com-v1.1.pdf
|
1.2 MB
|
001 2023-CC-Domain-4-Study-guide-by-ThorTeaches.com-v1.1.pdf
|
4.6 MB
|
001 2023-CC-Domain-5-Study-guide-by-ThorTeaches.com-v1.1.pdf
|
772.7 KB
|
001 2023-CC-Mnemonics-by-ThorTeaches.pdf
|
288.5 KB
|
001 Introduction and download your free study guides.mp4
|
12.1 MB
|
001 Introduction and download your free study guides_en.srt
|
1.2 KB
|
002 Connect with me on Social media and the Udemy ratings system.mp4
|
12.7 MB
|
002 Connect with me on Social media and the Udemy ratings system_en.srt
|
2.9 KB
|
003 How to get the most out of my courses and the Udemy interface.mp4
|
30.7 MB
|
003 How to get the most out of my courses and the Udemy interface_en.srt
|
4.0 KB
|
004 How to approach certification studying.mp4
|
27.8 MB
|
004 How to approach certification studying_en.srt
|
6.2 KB
|
005 General Certified in Cybersecurity (CC) links.html
|
3.2 KB
|
/02 - Domain 1 Security Principles/
|
001 Domain 1 - What we will be covering.mp4
|
10.9 MB
|
001 Domain 1 - What we will be covering_en.srt
|
1.3 KB
|
002 The differences between Information Security, IT Security, and Cybersecurity.mp4
|
58.7 MB
|
002 The differences between Information Security, IT Security, and Cybersecurity_en.srt
|
10.5 KB
|
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1.mp4
|
22.5 MB
|
003 The CIA Triad - Confidentiality, Integrity, and Availability - part 1_en.srt
|
11.5 KB
|
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2.mp4
|
19.5 MB
|
004 The CIA Triad - Confidentiality, Integrity, and Availability - part 2_en.srt
|
13.2 KB
|
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3.mp4
|
9.9 MB
|
005 The CIA Triad - Confidentiality, Integrity, and Availability - part 3_en.srt
|
6.5 KB
|
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4.mp4
|
24.5 MB
|
006 The CIA Triad - Confidentiality, Integrity, and Availability - part 4_en.srt
|
16.4 KB
|
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5.mp4
|
13.3 MB
|
007 The CIA Triad - Confidentiality, Integrity, and Availability - part 5_en.srt
|
6.6 KB
|
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1.mp4
|
46.4 MB
|
008 IAAA -Identification, Authentication, Authorization, and Accountability - part 1_en.srt
|
14.0 KB
|
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2.mp4
|
22.6 MB
|
009 IAAA -Identification, Authentication, Authorization, and Accountability - part 2_en.srt
|
5.1 KB
|
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3.mp4
|
36.0 MB
|
010 IAAA -Identification, Authentication, Authorization, and Accountability - part 3_en.srt
|
13.3 KB
|
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4.mp4
|
71.2 MB
|
011 IAAA -Identification, Authentication, Authorization, and Accountability - part 4_en.srt
|
15.5 KB
|
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5.mp4
|
19.7 MB
|
012 IAAA -Identification, Authentication, Authorization, and Accountability - part 5_en.srt
|
7.3 KB
|
013 Privacy.mp4
|
16.9 MB
|
013 Privacy_en.srt
|
10.2 KB
|
014 Risk Management - part 1.mp4
|
13.6 MB
|
014 Risk Management - part 1_en.srt
|
8.7 KB
|
015 Risk Management - part 2.mp4
|
31.8 MB
|
015 Risk Management - part 2_en.srt
|
14.7 KB
|
016 Risk Management - part 3.mp4
|
28.1 MB
|
016 Risk Management - part 3_en.srt
|
17.4 KB
|
017 Risk Management - part 4.mp4
|
32.3 MB
|
017 Risk Management - part 4_en.srt
|
16.4 KB
|
018 Risk Management - part 5.mp4
|
49.6 MB
|
018 Risk Management - part 5_en.srt
|
14.8 KB
|
019 Risk Management - part 6.mp4
|
25.2 MB
|
019 Risk Management - part 6_en.srt
|
10.4 KB
|
020 Access Control Categories and Types - part 1.mp4
|
29.6 MB
|
020 Access Control Categories and Types - part 1_en.srt
|
14.6 KB
|
021 Access Control Categories and Types - part 2.mp4
|
41.2 MB
|
021 Access Control Categories and Types - part 2_en.srt
|
17.4 KB
|
022 The Ethics of your organizations and (ISC)2.mp4
|
18.6 MB
|
022 The Ethics of your organizations and (ISC)2_en.srt
|
7.0 KB
|
023 Governance vs. Management.mp4
|
47.7 MB
|
023 Governance vs. Management_en.srt
|
13.9 KB
|
024 Laws and regulations - part 1.mp4
|
81.2 MB
|
024 Laws and regulations - part 1_en.srt
|
14.2 KB
|
025 Laws and regulations - part 2.mp4
|
58.2 MB
|
025 Laws and regulations - part 2_en.srt
|
15.4 KB
|
026 Security governance principles.mp4
|
63.2 MB
|
026 Security governance principles_en.srt
|
17.9 KB
|
027 What we covered in Domain 1.mp4
|
8.7 MB
|
027 What we covered in Domain 1_en.srt
|
1.0 KB
|
028 Certified in Cybersecurity (CC) Domain 1 links.html
|
5.0 KB
|
/03 - Domain 2 Business Continuity, Disaster Recovery, and Incident Response/
|
001 Domain 2 - What we will be covering.mp4
|
9.6 MB
|
001 Domain 2 - What we will be covering_en.srt
|
1.3 KB
|
002 BCP - Business Continuity Planning - Part 1.mp4
|
42.1 MB
|
002 BCP - Business Continuity Planning - Part 1_en.srt
|
12.0 KB
|
003 BCP - Business Continuity Planning - Part 2.mp4
|
32.5 MB
|
003 BCP - Business Continuity Planning - Part 2_en.srt
|
21.2 KB
|
004 BCP - Business Continuity Planning - Part 3.mp4
|
47.7 MB
|
004 BCP - Business Continuity Planning - Part 3_en.srt
|
20.6 KB
|
005 DRP - Disaster Recovery Planning - Part 1.mp4
|
47.1 MB
|
005 DRP - Disaster Recovery Planning - Part 1_en.srt
|
20.2 KB
|
006 DRP - Disaster Recovery Planning - Part 2.mp4
|
39.5 MB
|
006 DRP - Disaster Recovery Planning - Part 2_en.srt
|
9.7 KB
|
007 DRP - Disaster Recovery Planning - Part 3.mp4
|
49.4 MB
|
007 DRP - Disaster Recovery Planning - Part 3_en.srt
|
16.3 KB
|
008 DRP - Disaster Recovery Planning - Part 4.mp4
|
67.6 MB
|
008 DRP - Disaster Recovery Planning - Part 4_en.srt
|
21.5 KB
|
009 Incidents Response - Part 1.mp4
|
37.6 MB
|
009 Incidents Response - Part 1_en.srt
|
21.4 KB
|
010 Incidents Response - Part 2.mp4
|
29.9 MB
|
010 Incidents Response - Part 2_en.srt
|
17.0 KB
|
011 Incidents Response - Part 3.mp4
|
19.4 MB
|
011 Incidents Response - Part 3_en.srt
|
13.4 KB
|
012 Incidents Response - Part 4.mp4
|
24.3 MB
|
012 Incidents Response - Part 4_en.srt
|
18.4 KB
|
013 Incidents Response - Part 5.mp4
|
46.2 MB
|
013 Incidents Response - Part 5_en.srt
|
12.6 KB
|
014 What we covered in Domain 2.mp4
|
7.3 MB
|
014 What we covered in Domain 2_en.srt
|
1.0 KB
|
015 Certified in Cybersecurity (CC) Domain 2 links.html
|
2.2 KB
|
/04 - Domain 3 Access Controls Concepts/
|
001 Domain 3 - What we will be covering.mp4
|
7.9 MB
|
001 Domain 3 - What we will be covering_en.srt
|
1.2 KB
|
002 Physical Security - part 1.mp4
|
45.6 MB
|
002 Physical Security - part 1_en.srt
|
19.5 KB
|
003 Physical Security - part 2.mp4
|
46.0 MB
|
003 Physical Security - part 2_en.srt
|
12.1 KB
|
004 Physical Security - part 3.mp4
|
29.1 MB
|
004 Physical Security - part 3_en.srt
|
20.7 KB
|
005 Physical Security - part 4.mp4
|
26.3 MB
|
005 Physical Security - part 4_en.srt
|
14.6 KB
|
006 Physical Security - part 5.mp4
|
23.7 MB
|
006 Physical Security - part 5_en.srt
|
12.3 KB
|
007 Logical Access Control - Part 1.mp4
|
28.4 MB
|
007 Logical Access Control - Part 1_en.srt
|
14.8 KB
|
008 Logical Access Control - Part 2.mp4
|
19.1 MB
|
008 Logical Access Control - Part 2_en.srt
|
12.6 KB
|
009 Logical Access Control - Part 3.mp4
|
82.3 MB
|
009 Logical Access Control - Part 3_en.srt
|
19.5 KB
|
010 Logical Access Control - Part 4.mp4
|
46.1 MB
|
010 Logical Access Control - Part 4_en.srt
|
13.4 KB
|
011 Logical Access Control - Part 5.mp4
|
85.1 MB
|
011 Logical Access Control - Part 5_en.srt
|
19.1 KB
|
012 What we covered in Domain 3.mp4
|
7.2 MB
|
012 What we covered in Domain 3_en.srt
|
1.1 KB
|
013 Certified in Cybersecurity Domain (CC) 3 links.html
|
5.2 KB
|
/.../0. Websites you may like/
|
[CourseClub.Me].url
|
0.1 KB
|
[FreeCourseSite.com].url
|
0.1 KB
|
[GigaCourse.Com].url
|
0.0 KB
|
/05 - Domain 4 Network Security/
|
001 Domain 4 - What we will be covering.mp4
|
8.6 MB
|
001 Domain 4 - What we will be covering_en.srt
|
1.1 KB
|
002 Network Basics and Definitions - Part 1.mp4
|
46.7 MB
|
002 Network Basics and Definitions - Part 1_en.srt
|
19.0 KB
|
003 Network Basics and Definitions - Part 2.mp4
|
40.7 MB
|
003 Network Basics and Definitions - Part 2_en.srt
|
16.9 KB
|
004 The OSI Model - Part 1.mp4
|
105.9 MB
|
004 The OSI Model - Part 1_en.srt
|
26.0 KB
|
005 The OSI Model - Part 2.mp4
|
52.2 MB
|
005 The OSI Model - Part 2_en.srt
|
13.7 KB
|
006 The OSI Model - Part 3.mp4
|
59.6 MB
|
006 The OSI Model - Part 3_en.srt
|
13.0 KB
|
007 The TCPIP model.mp4
|
51.1 MB
|
007 The TCPIP model_en.srt
|
15.0 KB
|
008 IP addresses, port numbers, and MAC addresses - Part 1.mp4
|
48.1 MB
|
008 IP addresses, port numbers, and MAC addresses - Part 1_en.srt
|
19.0 KB
|
009 IP addresses, port numbers, and MAC addresses - Part 2.mp4
|
25.5 MB
|
009 IP addresses, port numbers, and MAC addresses - Part 2_en.srt
|
9.3 KB
|
010 IP addresses, port numbers, and MAC addresses - Part 3.mp4
|
21.9 MB
|
010 IP addresses, port numbers, and MAC addresses - Part 3_en.srt
|
7.7 KB
|
011 IP support protocols - Part 1.mp4
|
48.8 MB
|
011 IP support protocols - Part 1_en.srt
|
12.5 KB
|
012 IP support protocols - Part 2.mp4
|
35.5 MB
|
012 IP support protocols - Part 2_en.srt
|
10.3 KB
|
013 Cables - Part 1.mp4
|
23.4 MB
|
013 Cables - Part 1_en.srt
|
12.3 KB
|
014 Cables - Part 2.mp4
|
48.2 MB
|
014 Cables - Part 2_en.srt
|
13.6 KB
|
015 LAN topologies.mp4
|
27.5 MB
|
015 LAN topologies_en.srt
|
14.5 KB
|
016 Wi-Fi.mp4
|
54.3 MB
|
016 Wi-Fi_en.srt
|
16.5 KB
|
017 Wireless networks - Part 1.mp4
|
21.0 MB
|
017 Wireless networks - Part 1_en.srt
|
11.8 KB
|
018 Wireless networks - Part 2.mp4
|
42.5 MB
|
018 Wireless networks - Part 2_en.srt
|
10.6 KB
|
019 VLANs and Routers - Part 1.mp4
|
43.4 MB
|
019 VLANs and Routers - Part 1_en.srt
|
12.3 KB
|
020 VLANs and Routers - Part 2.mp4
|
44.6 MB
|
020 VLANs and Routers - Part 2_en.srt
|
14.6 KB
|
021 VPNs, NAC, and third-party connectivity.mp4
|
51.7 MB
|
021 VPNs, NAC, and third-party connectivity_en.srt
|
22.1 KB
|
022 SDN, SD-WAN, and SDX.mp4
|
39.5 MB
|
022 SDN, SD-WAN, and SDX_en.srt
|
15.9 KB
|
023 Attacks and attackers - Part 1.mp4
|
30.7 MB
|
023 Attacks and attackers - Part 1_en.srt
|
13.9 KB
|
024 Attacks and attackers - Part 2.mp4
|
39.5 MB
|
024 Attacks and attackers - Part 2_en.srt
|
20.8 KB
|
025 Attacks and attackers - Part 3.mp4
|
67.7 MB
|
025 Attacks and attackers - Part 3_en.srt
|
16.1 KB
|
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1.mp4
|
27.8 MB
|
026 Intrusion Detection and Prevention systems (IDS-IPS) - Part 1_en.srt
|
12.0 KB
|
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2.mp4
|
37.7 MB
|
027 Intrusion Detection and Prevention systems (IDS-IPS) - Part 2_en.srt
|
15.7 KB
|
028 SIEM and SOAR systems.mp4
|
27.5 MB
|
028 SIEM and SOAR systems_en.srt
|
10.7 KB
|
029 Honeynets and Honeypots.mp4
|
11.4 MB
|
029 Honeynets and Honeypots_en.srt
|
5.6 KB
|
030 Firewalls - Part 1.mp4
|
30.4 MB
|
030 Firewalls - Part 1_en.srt
|
9.5 KB
|
031 Firewalls - Part 2.mp4
|
36.5 MB
|
031 Firewalls - Part 2_en.srt
|
17.1 KB
|
032 0-day attacks and exploits.mp4
|
58.8 MB
|
032 0-day attacks and exploits_en.srt
|
14.1 KB
|
033 Vulnerability Scanning.mp4
|
17.2 MB
|
033 Vulnerability Scanning_en.srt
|
8.6 KB
|
034 Virtualization, Cloud, and Distributed Computing - Part 1.mp4
|
30.7 MB
|
034 Virtualization, Cloud, and Distributed Computing - Part 1_en.srt
|
12.6 KB
|
035 Virtualization, Cloud, and Distributed Computing - Part 2.mp4
|
27.8 MB
|
035 Virtualization, Cloud, and Distributed Computing - Part 2_en.srt
|
14.2 KB
|
036 Virtualization, Cloud, and Distributed Computing - Part 3.mp4
|
22.6 MB
|
036 Virtualization, Cloud, and Distributed Computing - Part 3_en.srt
|
10.2 KB
|
037 Virtualization, Cloud, and Distributed Computing - Part 4.mp4
|
61.4 MB
|
037 Virtualization, Cloud, and Distributed Computing - Part 4_en.srt
|
18.0 KB
|
038 Virtualization, Cloud, and Distributed Computing - Part 5.mp4
|
91.7 MB
|
038 Virtualization, Cloud, and Distributed Computing - Part 5_en.srt
|
19.4 KB
|
039 The Internet of Things (IoT).mp4
|
20.9 MB
|
039 The Internet of Things (IoT)_en.srt
|
10.6 KB
|
040 Asset tracking and hardware hardening.mp4
|
25.7 MB
|
040 Asset tracking and hardware hardening_en.srt
|
14.9 KB
|
041 Electricity.mp4
|
61.0 MB
|
041 Electricity_en.srt
|
18.3 KB
|
042 Backups - Part 1.mp4
|
35.1 MB
|
042 Backups - Part 1_en.srt
|
18.5 KB
|
043 Backups - Part 2.mp4
|
31.6 MB
|
043 Backups - Part 2_en.srt
|
14.5 KB
|
044 Fault tolerance, redundancy, and resiliency - Part 1.mp4
|
20.6 MB
|
044 Fault tolerance, redundancy, and resiliency - Part 1_en.srt
|
11.2 KB
|
045 Fault tolerance, redundancy, and resiliency - Part 2.mp4
|
23.1 MB
|
045 Fault tolerance, redundancy, and resiliency - Part 2_en.srt
|
17.3 KB
|
046 Fault tolerance, redundancy, and resiliency - Part 3.mp4
|
24.2 MB
|
046 Fault tolerance, redundancy, and resiliency - Part 3_en.srt
|
10.9 KB
|
047 Fire suppression - Part 1.mp4
|
19.5 MB
|
047 Fire suppression - Part 1_en.srt
|
10.6 KB
|
048 Fire suppression - Part 2.mp4
|
31.9 MB
|
048 Fire suppression - Part 2_en.srt
|
14.8 KB
|
049 Secure design principles - Part 1.mp4
|
60.1 MB
|
049 Secure design principles - Part 1_en.srt
|
15.0 KB
|
050 Secure design principles - Part 2.mp4
|
37.8 MB
|
050 Secure design principles - Part 2_en.srt
|
17.5 KB
|
051 What we covered in Domain 4.mp4
|
7.8 MB
|
051 What we covered in Domain 4_en.srt
|
1.2 KB
|
052 Certified in Cybersecurity (CC) Domain 4 links.html
|
13.8 KB
|
/06 - Domain 5 Security Operations/
|
001 Domain 5 - What we will be covering.mp4
|
6.7 MB
|
001 Domain 5 - What we will be covering_en.srt
|
1.0 KB
|
002 Configuration Management.mp4
|
16.0 MB
|
002 Configuration Management_en.srt
|
11.8 KB
|
003 Patch Management.mp4
|
29.7 MB
|
003 Patch Management_en.srt
|
22.0 KB
|
004 Change Management.mp4
|
44.7 MB
|
004 Change Management_en.srt
|
21.8 KB
|
005 Cryptography - Part 1.mp4
|
33.2 MB
|
005 Cryptography - Part 1_en.srt
|
15.5 KB
|
006 Cryptography - Part 2.mp4
|
53.6 MB
|
006 Cryptography - Part 2_en.srt
|
12.0 KB
|
007 Cryptography - Part 3.mp4
|
34.3 MB
|
007 Cryptography - Part 3_en.srt
|
11.1 KB
|
008 Hashing.mp4
|
19.9 MB
|
008 Hashing_en.srt
|
10.6 KB
|
009 Attacks on our cryptography.mp4
|
29.2 MB
|
009 Attacks on our cryptography_en.srt
|
15.7 KB
|
010 Data handling, data storage and data retention - Part 1.mp4
|
59.7 MB
|
010 Data handling, data storage and data retention - Part 1_en.srt
|
15.6 KB
|
011 Data handling, data storage and data retention - Part 2.mp4
|
41.1 MB
|
011 Data handling, data storage and data retention - Part 2_en.srt
|
17.2 KB
|
012 Data handling, data storage and data retention - Part 3.mp4
|
29.7 MB
|
012 Data handling, data storage and data retention - Part 3_en.srt
|
9.3 KB
|
013 Administrative (Directive) Controls.mp4
|
92.2 MB
|
013 Administrative (Directive) Controls_en.srt
|
27.0 KB
|
014 Training and awareness.mp4
|
29.5 MB
|
014 Training and awareness_en.srt
|
14.7 KB
|
015 Social Engineering attacks - Part 1.mp4
|
33.0 MB
|
015 Social Engineering attacks - Part 1_en.srt
|
17.9 KB
|
016 Social Engineering attacks - Part 2.mp4
|
43.6 MB
|
016 Social Engineering attacks - Part 2_en.srt
|
18.4 KB
|
017 What we covered in Domain 5.mp4
|
8.9 MB
|
017 What we covered in Domain 5_en.srt
|
1.4 KB
|
018 Certified in Cybersecurity (CC) Domain 5 links.html
|
5.8 KB
|
/07 - Domain recaps/
|
001 Domain 1 recap Certified in Cybersecurity (CC).mp4
|
126.1 MB
|
001 Domain 1 recap Certified in Cybersecurity (CC)_en.srt
|
34.6 KB
|
002 Domain 2 recap Certified in Cybersecurity (CC).mp4
|
91.8 MB
|
002 Domain 2 recap Certified in Cybersecurity (CC)_en.srt
|
28.6 KB
|
003 Domain 3 recap Certified in Cybersecurity (CC).mp4
|
92.9 MB
|
003 Domain 3 recap Certified in Cybersecurity (CC)_en.srt
|
21.6 KB
|
004 Domain 4 recap Certified in Cybersecurity (CC).mp4
|
427.8 MB
|
004 Domain 4 recap Certified in Cybersecurity (CC)_en.srt
|
128.7 KB
|
005 Domain 5 recap Certified in Cybersecurity (CC).mp4
|
169.4 MB
|
005 Domain 5 recap Certified in Cybersecurity (CC)_en.srt
|
51.6 KB
|
/08 - The study process, material, tips, tricks and practice tests!/
|
001 Why you should want to get Certified in Cybersecurity.mp4
|
18.9 MB
|
001 Why you should want to get Certified in Cybersecurity_en.srt
|
9.5 KB
|
002 Scheduling your exam and what to expect.mp4
|
44.8 MB
|
002 Scheduling your exam and what to expect_en.srt
|
9.4 KB
|
003 What to expect on exam day and after.mp4
|
34.8 MB
|
003 What to expect on exam day and after_en.srt
|
14.0 KB
|
004 I passed the exam now what.mp4
|
21.3 MB
|
004 I passed the exam now what_en.srt
|
8.9 KB
|
005 I failed the exam now what.mp4
|
25.7 MB
|
005 I failed the exam now what_en.srt
|
16.8 KB
|
006 CC-Fillable-study-plan-2023.pdf
|
379.9 KB
|
006 CC-Study-plan-by-ThorTeaches.xlsx
|
10.8 KB
|
006 How to approach practice questions.mp4
|
124.3 MB
|
006 How to approach practice questions_en.srt
|
18.7 KB
|
007 How to design your career and certification path.mp4
|
78.0 MB
|
007 How to design your career and certification path_en.srt
|
24.3 KB
|
Total files 294
|