Training with Iverson classes

Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

At Iverson, our focus is on providing high-quality IT training to corporate customers, meeting their learning needs and helping them to achieve their training objectives. Iverson has the flexibility to provide training solutions whether for a single individual or the largest corporation in a well-paced or accelerated training programme.

Our courses continue to evolve along with the fast-changing technological advances. Our instructor-led training services are available on a public and a private (in-company) basis. Some of our courses are also available as online, on demand, and hybrid training.

CC : Certified in Cybersecurity Entry-Level Certification Training

Please let us know your name.
Please let us know your email address.
Invalid Input
Invalid Input
Invalid Input


With no experience required, it opens opportunities in the field to a much broader range of candidates, including recent graduates, career changers and IT professionals. CC starts newcomers on their path to advanced cybersecurity certifications like the CISSP and future leadership roles.

Official (ISC)² Certified in Cybersecurity (CC) Entry-Level Certification Training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry- or junior-level cybersecurity role. 

Audience Profile

CC training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam. There are no prerequisites.



At Course Completion

After completing this course, learners will be able to:   

• Discuss the foundational concepts of cybersecurity principles.  

• Recognize foundational security concepts of information assurance.  

• Define risk management terminology and summarize the process.  

• Relate risk management to personal or professional practices.  

• Classify types of security controls.  

• Distinguish between policies, procedures, standards, regulations and laws.  

• Demonstrate the relationship among governance elements.  

• Analyze appropriate outcomes according to the canons of the (ISC)² Code of Ethics when given examples.  

• Practice the terminology of and review security policies.  

• Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.  

• Recall the terms and components of incident response.  

• Summarize the components of a business continuity plan.  

• Identify the components of disaster recovery.  

• Practice the terminology and review concepts of business continuity, disaster recovery and incident response.  

• Select access controls that are appropriate in a given scenario.  

• Relate access control concepts and processes to given scenarios.  

• Compare various physical access controls.  

• Describe logical access controls.  

• Practice the terminology and review concepts of access controls.  

• Explain the concepts of network security.  

• Recognize common networking terms and models.  

• Identify common protocols and port and their secure counterparts.  

• Identify types of network (cyber) threats and attacks.  

• Discuss common tools used to identify and prevent threats.  

• Identify common data center terminology.  

• Recognize common cloud service terminology.  

• Identify secure network design terminology.  

• Practice the terminology and review concepts of network security.  

• Explain concepts of security operations.  

• Discuss data handling best practices.  

• Identify key concepts of logging and monitoring.  

• Summarize the different types of encryption and their common uses.  

• Describe the concepts of configuration management.  

• Explain the application of common security policies.  

• Discuss the importance of security awareness training.  

• Practice the terminology and review concepts of network operations.  

Course Outline

RM5,500.00(+RM440.00 Tax)
* Training Dates:

* Price includes Exam

Course Information
2 Days
Certified in Cybersecurity Entry-Level Certification Training

25-26 Mar 2024

24-25 Jun 2024

19-20 Aug 2024

14-15 Oct 2024

PMP, Project Management Professional (PMP), CAPM, Certified Associate in Project Management (CAPM) are registered marks of the Project Management Institute, Inc.

We are using cookies to give you the best experience on our site. By continuing to use our website without changing the settings, you are agreeing to use of cookies.
Ok Decline