(ISC)2 Certified in Cybersecurity Training in Hong Kong

  • Learn via: Classroom
  • Duration: 1 Day
  • Level: Fundamentals
  • Price: From €747+VAT
We can host this training at your preferred location. Contact us!

Official (ISC)2 Entry-Level Cybersecurity Certification Training Official (ISC)² entry-level cybersecurity certification training will review the content covered in the exam. It prepares candidates by building a solid foundation of knowledge they need to pass the exam and ultimately land an entry-or junior-level cybersecurity role. About Certification From the global leader in cybersecurity credentials, the (ISC)2entry-level cybersecurity certification breaks down traditional barriers to entry, enabling candidates to build confidence and enter their first cybersecurity role prepared to succeed. It demonstrates a solid knowledge of the foundational concepts in information security, determined by experts and practitioners working in the field.

Training Includes:

  • 8 hours of live instruction
  • Peer discussions
  • Knowledge checks and end-of-chapter quizzes
  • Pre-and post-course assessments
  • Applied scenarios
  • Chapter-by-chapter study sheets with key points, terms and definitions
  • Flash cards
  • Exam voucher

There are no prerequisites for this course.

Who Should Attend?

The course is ideal for students, prospective employees, entry-level professionals, and career changes seeking to start their path toward cybersecurity leadership by taking the (ISC)² entry-level cybersecurity exam.

After completing this course, the learner will have obtained awareness of the topics covered in the entry-level cybersecurity certification exam outline Domains, Modules & Chapters.

This course covers the following chapters and modules:

  • Domain 1: Security Principles
  • Domain 2: Business Continuity (BC), Disaster Recovery (DR), & Incident Response Concepts
  • Domain 3: Access Controls Concepts
  • Domain 4: Network Security
  • Domain 5: Security Operations

This course covers the following chapters and modules:


Chapter 1: Security Principles

  • Module 1: Understand the security concepts of information assurance
  • Module 2: Understand the risk management concepts
  • Module 3: Understand security controls
  • Module 4: Understand governance processes
  • Module 5: Understand (ISC)² Code of Ethics


Chapter 2: Incident Response, Business Continuity (BC), and Disaster Recovery (DR)

  • Module 1: Understand incident response
  • Module 2: Understand business continuity (BC)
  • Module 3: Understand disaster recovery (DR)


Chapter 3: Access Controls Concepts

  • Module 1: Understand access control concepts
  • Module 2: Understand physical access controls
  • Module 3: Understand logical access controls


Chapter 4: Network Security

  • Module 1: Understand computer networking
  • Module 2: Understand network threats and attacks
  • Module 3: Understand network security infrastructure


Chapter 5: Security Operations

  • Module 1: Understand data security
  • Module 2: Understand system hardening
  • Module 3: Understand best practice security policies
  • Module 4: Understand security awareness training


Chapter 6: Course Summary and Exam Details

  • Module 1: Work experience requirements
  • Module 2: Scheduling the exam
  • Module 3: Before the exam
  • Module 4: After the exam
  • Module 5: Exam Tips
  • Module 6: Review

Summary Note: Course materials are organized by chapter, not domain, which may result in domains or individual domain topics being covered in a different order than what appears in the exam outline.

The chapter structure allows us to properly cover the exam domains while supporting a more cohesive learning experience.



Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Hong Kong facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
25 May 2024
Hong Kong, Kowloon, Tsuen Wan
1 Day
Classroom / Virtual Classroom
30 May 2024
Hong Kong, Kowloon, Tsuen Wan
€747 +VAT Book Now
Classroom / Virtual Classroom
17 June 2024
Hong Kong, Kowloon, Tsuen Wan
€747 +VAT Book Now
Classroom / Virtual Classroom
01 July 2024
Hong Kong, Kowloon, Tsuen Wan
1 Day
Classroom / Virtual Classroom
17 July 2024
Hong Kong, Kowloon, Tsuen Wan
1 Day
Classroom / Virtual Classroom
22 July 2024
Hong Kong, Kowloon, Tsuen Wan
€747 +VAT Book Now
Classroom / Virtual Classroom
15 August 2024
Hong Kong, Kowloon, Tsuen Wan
1 Day
Classroom / Virtual Classroom
22 August 2024
Hong Kong, Kowloon, Tsuen Wan
1 Day
(ISC)2 Certified in Cybersecurity Training Course in Hong Kong

Hong Kong is officially known as the Hong Kong Special Administrative Region of the People's Republic of China (HKSAR) and is a city and special administrative region of China on the eastern Pearl River Delta in South China. Hong Kong is one of the most densely populated places in the world, with over 7.5 million population. The official languages of the HKSAR are Chinese and English. Hong Kong is a highly developed territory and ranks fourth on the United Nations Human Development Index and the residents of Hong Kong have the highest life expectancies in the world.

The best time to visit Hong Kong is from September to December, since the temperatures, averaging between 19 to 28 degree Celsius. During this outdoor activities-friendly travelling season, you can take a walk along Victoria Harbour, visit the islands of Lantau, Lamma and Cheung Chau and participate in the Mid-Autumn Festival. Top choices of the tourists to visit in Hong Kong are Big Buddha statue, Wong Tai Sin Temple, Repulse Bay and the Beaches and Hong Kong Disneyland.

Explore our diverse range of IT courses, encompassing programming, software development, cyber security, data science, business skills, and Agile/Scrum. Wherever you are in Hong Kong, our seasoned instructors will bring practical training and expert knowledge to your preferred training venue.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.