Technology24 min read

ISC2 CC Certified in Cybersecurity Guide (FREE 2026)

Complete 2026 guide to the ISC2 Certified in Cybersecurity (CC) exam: domains, cost (free via 1MCC or $199), pass rate, study plan, CC vs Security+, and 200+ free practice questions.

Ran Chen, EA, CFP®April 21, 2026

Key Facts

  • The ISC2 Certified in Cybersecurity (CC) exam costs $199 USD at full price, but is currently free via the One Million Certified in Cybersecurity (1MCC) program.
  • The CC exam is 2 hours long with 100-125 items delivered via Computerized Adaptive Testing at Pearson VUE; a scaled score of 700/1000 is required to pass.
  • CC domain weights are Security Principles 26%, Access Controls 22%, Network Security 24%, Security Operations 18%, Business Continuity/DR/IR 10%. Source: ISC2.
  • No work experience is required to sit for the CC exam. It is the only major ISC2 certification without an experience prerequisite for certification.
  • After passing, candidates have 9 months to agree to the ISC2 Code of Ethics and submit the certification application, or they must retake the exam.
  • The Annual Maintenance Fee for CC-only holders is $50 USD. First-year 1MCC Candidates pay $0, then $50 annually thereafter.
  • CC certification is valid for 3 years and requires 45 CPE credits over the cycle (15 per year recommended) to renew without retesting. Source: ISC2 CPE Handbook.
  • Effective September 1, 2026, ISC2 will release a refreshed CC Exam Outline. Candidates testing before that date use the current 5-domain outline.
  • If a candidate fails the free 1MCC attempt, retakes cost the full $199 and ISC2 requires a 30-day wait between attempts. Source: ISC2 Retake Policy.
  • The U.S. BLS projects 29% job growth for Information Security Analysts from 2024-2034, with a 2024 median annual wage of $124,910. Source: BLS OOH.

ISC2 CC in 2026: The FREE Entry Point to Cybersecurity

The ISC2 Certified in Cybersecurity (CC) is the most accessible cybersecurity certification on the planet right now. Through ISC2's One Million Certified in Cybersecurity (1MCC) initiative, the official self-paced training and the exam are both free — an offering worth roughly $400 — with no experience prerequisites and no expiration date on the voucher once issued.

If you want to break into cybersecurity in 2026 but don't know where to start, CC is the clearest signal on the market. This guide walks you through everything: the exam blueprint, domain-by-domain high-yield topics, a realistic 4-8 week study plan, how CC stacks up against Security+, and the exact steps to go from $0 to certified.

free ISC2 CC practice questionsPractice questions with detailed explanations

ISC2 CC Exam at a Glance (2026)

DetailInfo
Certification BodyISC2 (International Information System Security Certification Consortium)
Exam FormatComputerized Adaptive Testing (CAT)
Questions100-125 (multiple choice + advanced items)
Time Limit2 hours (120 minutes)
Passing Score700/1000 (scaled, compensatory)
Standard Fee$199 USD
Via 1MCC ProgramFREE (training + one exam attempt)
Annual Maintenance Fee (AMF)$50/year (CC-only holders)
DeliveryPearson VUE test centers only
LanguagesEnglish, Chinese, Japanese, German, Spanish
Experience RequiredNone
Age Requirement16+
Certification Cycle3 years
CPE Requirement45 CPE credits over 3 years
AccreditationANAB / ISO/IEC 17024
PrerequisitesNone
Retake Policy30-day wait; max 3 attempts per 12 months

Source: ISC2 CC Exam Outline, April 2026.

Heads up: ISC2 will release a refreshed CC Exam Outline effective September 1, 2026. If you test before that date, the current 5-domain outline below applies. If you test after, check the updated outline on isc2.org/certifications/cc — the core domains (and their 26/10/22/24/18 weights) remain, but the refresh integrates AI Security concepts across every domain (see "AI Security on the 2026 CC Exam" section below).

September 1, 2026 Outline Change: What's New

On April 2, 2026, ISC2 published Exam Guidance for Artificial Intelligence (isc2.org/Insights/2026/04/ISC2-Publishes-Exam-Guidance-AI) mapping how AI security concepts are incorporated into 50+ ISC2 exam domains — including all 5 CC domains. If you test on or after September 1, 2026, expect the following additions:

  • Domain 1 Security Principles — applying CIA triad to AI systems, data integrity to prevent model poisoning, ethical AI, transparency, bias in automated decisioning.
  • Domain 2 BC/DR/IR — backing up AI model weights and training datasets (not just data); model drift as a continuity risk; AI-related incidents.
  • Domain 3 Access Controls — authenticating and authorizing AI agents and service accounts; least privilege for ML pipelines.
  • Domain 4 Network Security — securing AI API endpoints; prompt-injection awareness at the network boundary.
  • Domain 5 Security OperationsSIEM + AI for alert triage, reducing alert fatigue, distinguishing AI-automated blocks from events requiring human action.

If you test before September 1, 2026, these AI topics may still appear as unscored beta items but will not count against you. ISC2 has also shipped an AI-adaptive version of the official self-paced training (announced March 2024, enhanced 2026) — the course now tailors pathways based on your prior knowledge and learning speed.


Why CC Is the #1 Entry-Level Cybersecurity Credential in 2026

Not all entry-level certs are created equal. Here's why CC stands out:

  1. It's free. The 1MCC program has delivered millions of free training seats since launch, and as of April 2026 it is still running.
  2. It's vendor-neutral. Unlike Cisco CyberOps or Microsoft SC-900, CC is not tied to a single vendor's product line — everything you learn applies across AWS, Azure, on-prem, and hybrid environments.
  3. It's ISO/IEC 17024 accredited through ANAB — the same accreditation that backs CISSP, CCSP, and SSCP. Employers and government agencies recognize ANAB-accredited credentials as meeting international standards.
  4. It's from ISC2 — the same organization behind CISSP, which means CC is your direct on-ramp to the most respected cybersecurity certification pathway in the world.
  5. No experience required. CompTIA Security+ is technically "no-experience-required," but most hiring managers expect 2+ years of IT experience behind it. CC was purpose-built for true beginners.
  6. Built for the workforce gap. ISC2's 2025 Cybersecurity Workforce Study estimated a global shortfall of 4+ million cybersecurity professionals. CC is ISC2's flagship answer to that gap.

The test question: Can you work after passing CC? Yes — entry-level SOC analyst, IT security support, help desk security, GRC coordinator, and cybersecurity intern roles all explicitly list CC as an acceptable credential in 2026 job postings.


Who Should Take the ISC2 CC Exam?

Candidate ProfileWhy CC Fits
College students (including high schoolers 16+)Zero work experience required; free via 1MCC; builds resume before first internship
Career changers (teachers, military, healthcare, finance)Low-risk entry point; validates commitment to the field to hiring managers
Help desk / IT support staffNatural stepping stone to a SOC role; content overlaps with daily IT work
Sysadmins pivoting to securityFills governance, risk, and policy gaps that pure IT background lacks
Developers moving to AppSecGrounds you in CIA, access controls, and network security vocabulary
Managers who oversee ITGives you shared vocabulary with your security team without deep technical study
International candidatesANAB/ISO 17024 accreditation is recognized globally; exam offered in 5 languages

If you have 3+ years of hands-on security experience, skip CC and go directly to Security+ or SSCP — the content will feel too basic.


Eligibility & Endorsement Process

Eligibility to Sit the Exam

  • Age: Minimum 16 years old. Candidates aged 16-17 must have a parent/guardian complete ISC2's minor consent process.
  • Experience: Zero — this is the only major ISC2 cert with no work-experience path.
  • Education: None required.
  • Background check: You agree to ISC2 Code of Ethics; no formal background check.

Endorsement (The 9-Month Clock)

Unlike SSCP and CISSP — which require endorsement by an existing ISC2 member — CC endorsement is a self-completed form where you attest to the ISC2 Code of Ethics and confirm your identity.

You have 9 months from your exam pass date to:

  1. Submit your certification application through your ISC2 account.
  2. Agree to the ISC2 Code of Ethics (4 canons — protect society, act honorably, provide diligent service, advance the profession).
  3. Pay the $50 Annual Maintenance Fee (AMF).

Miss the 9-month window → you must retake the exam.

"Associate of ISC2" — Does It Apply to CC?

For CISSP and SSCP, candidates who pass but lack experience become "Associate of ISC2" while accumulating required years. CC has no experience requirement, so Associate status does not apply — you go straight to full certified member status upon endorsement.


ISC2 CC Exam Content: The 5 Domains

Here is the official 2026 blueprint with domain weights, subtopics, and high-yield drills.

DomainWeightApprox. # of Questions*
1. Security Principles26%~26-32
2. Business Continuity, DR & Incident Response10%~10-13
3. Access Controls Concepts22%~22-28
4. Network Security24%~24-30
5. Security Operations18%~18-23
Total100%100-125

*Estimates based on CAT delivery — your exam may have a different mix.

Domain 1: Security Principles (26%) — The Heaviest Domain

This is the conceptual foundation of cybersecurity and by weight the single largest domain. If you only had time to prepare for one domain, this would be it. Expect lots of vocabulary and scenario-matching questions where several answer options sound correct but only one is best.

Subtopics you must master:

  • CIA Triad — Confidentiality, Integrity, Availability. Know examples of each and which controls protect which property (e.g., encryption → confidentiality; hashing → integrity; redundancy → availability). Some ISC2 materials add Authenticity and Non-repudiation as extensions; know them but remember the core three.
  • AAA — Authentication (who you are), Authorization (what you can do), Accounting (what you did). Do not confuse with IAAA (Identification + AAA) used in some sources. Non-repudiation (you cannot deny the action) and privacy complete the picture.
  • MFA factors: something you know (password, PIN), have (token, smart card), are (fingerprint, retina, face), do (typing pattern, gait), somewhere you are (geolocation, network). True MFA requires factors from two different categories — two passwords is NOT MFA.
  • Risk management lifecycle: identification → assessment → treatment (accept, avoid, transfer, mitigate) → monitoring. Know the difference between risk appetite (what leadership will tolerate) and risk tolerance (acceptable variation).
  • Threats, vulnerabilities, and exploits — a threat exploits a vulnerability to harm an asset. Risk = Threat × Vulnerability × Impact.
  • Security controls taxonomy: technical (firewall, encryption), administrative (policy, training), physical (lock, guard, CCTV). Also: preventive (stop before), detective (notice during), corrective (fix after), deterrent (discourage), compensating (substitute), recovery (restore).
  • Governance documents hierarchy: policy (what — mandatory, broad) → standard (how much — mandatory, specific) → procedure (how — step by step) → guideline (recommendation — optional). Policies come from top-down leadership; procedures from the teams doing the work.
  • Regulations & laws: GDPR (EU privacy), HIPAA (US healthcare), PCI DSS (payment cards — industry standard, not a law), SOX (US publicly traded companies), FERPA (US student records), GLBA (US financial services), CCPA/CPRA (California privacy).
  • Privacy principles — data minimization, purpose limitation, consent, right to be forgotten, data subject rights.
  • ISC2 Code of Ethics — four canons in order: Society → Honorably → Service → Profession. When canons conflict, the earlier one wins. Expect at least one direct question.

High-yield drill: Given a breach scenario, name which CIA property was violated and which control type (preventive/detective/corrective) would have stopped it. Example: Attacker steals a laptop with unencrypted data → Confidentiality violated; encryption (preventive technical control) would have stopped it.

Domain 2: Business Continuity, Disaster Recovery & Incident Response (10%) — The Smallest Domain

Lightest domain by weight, but do not skip — 10-13 questions is still enough to make or break a pass, and the topics are often unfamiliar to non-IT candidates so every point counts.

Subtopics:

  • BC vs DR: Business Continuity = keep the business running (people, processes, offices) during disruption; Disaster Recovery = restore IT systems, data, and infrastructure after disruption. BC is the umbrella; DR is the technical subset.
  • Key metrics:
    • RTO (Recovery Time Objective) — how fast systems must be back up (clock time).
    • RPO (Recovery Point Objective) — how much data loss is tolerable (data currency).
    • MTD (Maximum Tolerable Downtime) — hard ceiling before business fails; RTO must be less than MTD.
    • MTBF (Mean Time Between Failures) and MTTR (Mean Time to Repair) — reliability metrics.
    • WRT (Work Recovery Time) — time to verify systems after DR before resuming normal ops.
  • BIA (Business Impact Analysis) — identifies critical processes, their dependencies, and the RTO/RPO required for each. BIA comes BEFORE the BC/DR plan, not after.
  • Incident Response lifecycle (NIST SP 800-61): Preparation → Detection & Analysis → Containment → Eradication → Recovery → Post-Incident Activity (Lessons Learned). Memorize the order.
  • First responder priorities: protect life and safety first, then contain the incident, then preserve evidence, then eradicate.
  • Backup types:
    • Full — everything, slow to create, fast to restore.
    • Incremental — only what changed since the last backup (of any type), fast to create, slow to restore (need full + every incremental).
    • Differential — only what changed since the last FULL backup, medium to create, medium to restore (need full + latest differential).
    • Synthetic full — merged full built from incrementals.
  • 3-2-1 rule: 3 copies of data, on 2 different media, with 1 off-site.
  • Site types: hot (live, fully staffed, expensive, minutes RTO), warm (equipment + network, partial data, hours RTO), cold (empty space + power, days/weeks RTO, cheapest), mobile (trailer delivered), reciprocal/cloud (partner agreement or cloud failover).
  • Exercise types (increasing realism): checklist → structured walk-through → tabletop → simulation → parallel → full interruption test.
  • Evidence handling — chain of custody, write-blockers for disk imaging, hashing for integrity.

High-yield drill: Given RTO = 4 hours and RPO = 1 hour, which backup strategy and recovery site meet both? (Answer: continuous or hourly snapshot replication to a hot or warm site.)

Domain 3: Access Controls Concepts (22%) — The Identity Core

Access controls are how security is implemented in practice. Expect 22-28 questions covering both physical and logical controls, with heavy focus on which model fits which scenario.

Subtopics:

  • Physical access controls
    • CPTED (Crime Prevention Through Environmental Design) — natural surveillance, natural access control, territorial reinforcement.
    • Deterrents: signs, lighting, fences.
    • Barriers: bollards (vehicle), turnstiles, revolving doors, mantraps/access control vestibules (prevent tailgating).
    • Detection: CCTV, motion sensors, alarms.
    • Identification: badges (proximity, smart cards), biometrics (fingerprint, retina, facial, palm vein).
    • Compensating controls: guards, dogs, visitor escorts and logs.
  • Logical access controls — usernames, passwords (complexity, length, history, lockout), tokens (hard/soft, TOTP/HOTP), smart cards (PIV/CAC), certificates (PKI), SSO, federation (SAML, OAuth, OIDC).
  • The three As (not to be confused with AAA):
    1. Identification — claiming an identity (username).
    2. Authentication — proving it (factors).
    3. Authorization — what you can do (permissions).
  • Access control models — memorize all five:
    • DAC (Discretionary Access Control) — owner decides. Flexible but weak. Example: Windows NTFS file permissions, Linux chmod, Google Drive sharing.
    • MAC (Mandatory Access Control) — system enforces based on labels/clearance; users cannot override. Most restrictive. Example: military classification (Unclassified → Confidential → Secret → Top Secret), SELinux, AppArmor.
    • RBAC (Role-Based Access Control) — access by job role; users inherit permissions from their role. Most common in enterprises. Example: all "Nurses" can view patient charts.
    • ABAC (Attribute-Based Access Control) — policies evaluate attributes of user, resource, environment, and action. Flexible, dynamic. Example: AWS IAM policies, Azure Conditional Access.
    • Rule-Based — explicit rules evaluated in order. Example: firewall ACLs, router access lists.
  • Principle of least privilege — minimum access to do the job, nothing more.
  • Separation of duties (SoD) — no single person can complete a sensitive process alone (e.g., one person creates vendor, another approves payment).
  • Need to know — even with clearance, only see what the task requires.
  • Job rotation and mandatory vacations — fraud detection controls.
  • Privileged account management (PAM) — admin, service, and root accounts; just-in-time access; vaulting; session recording.
  • Password policies — length ≥ 12 chars preferred over complexity; passphrase over password; NIST SP 800-63B no longer mandates periodic rotation if no compromise suspected.

High-yield drill: Match the scenario to the model — "Users in the Finance department can read payroll files" → RBAC. "Only users with a Top Secret clearance can read this file" → MAC. "Allow access if user department = 'Sales' AND time is between 9-5 AND device is managed" → ABAC.

Domain 4: Network Security (24%) — The Second Heaviest Domain

Expect 24-30 questions on networking fundamentals and defensive architecture. If you do not have a networking background, this will be your hardest domain — budget extra time.

Subtopics:

  • OSI model (7 layers) — Physical, Data Link, Network, Transport, Session, Presentation, Application. Memorize mnemonic: Please Do Not Throw Sausage Pizza Away. Know at least one protocol or device per layer:
    • L1 Physical — cables, hubs, repeaters.
    • L2 Data Link — MAC addresses, switches, frames, ARP, 802.1X.
    • L3 Network — IP addresses, routers, packets, ICMP, OSPF.
    • L4 Transport — TCP (reliable) / UDP (fast), segments, port numbers.
    • L5 Session — NetBIOS, RPC, session establishment and teardown.
    • L6 Presentation — encryption, compression, encoding (ASCII, Unicode, JPEG).
    • L7 Application — HTTP, DNS, FTP, SMTP, SSH user-facing protocols.
  • TCP/IP model (4 layers) — Link, Internet, Transport, Application. Simpler than OSI; often mapped onto it.
  • TCP 3-way handshake — SYN → SYN/ACK → ACK. 4-way teardown — FIN/ACK. Understand why TCP is "connection-oriented" and UDP is "connectionless."
  • Common ports: 20/21 FTP, 22 SSH/SFTP, 23 Telnet (insecure), 25 SMTP, 53 DNS, 67/68 DHCP, 69 TFTP, 80 HTTP, 110 POP3, 123 NTP, 143 IMAP, 161/162 SNMP, 389 LDAP, 443 HTTPS, 445 SMB, 636 LDAPS, 3389 RDP.
  • IP addressing — IPv4 (32-bit, dotted decimal) vs IPv6 (128-bit, hex). Public vs private ranges: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16. Loopback 127.0.0.1. APIPA 169.254.x.x.
  • NAT/PAT — Network Address Translation hides internal IPs; Port Address Translation maps many private IPs to one public IP.
  • DHCP — Discover → Offer → Request → Acknowledge (DORA).
  • DNS — hierarchical, UDP 53 (queries) / TCP 53 (zone transfers). Know record types: A (IPv4), AAAA (IPv6), MX (mail), CNAME (alias), TXT (SPF/DKIM).
  • Network deviceshub (L1, dumb repeater, one collision domain), switch (L2, MAC table, separate collision domains), router (L3, IP, separate broadcast domains), firewall (stateful vs stateless vs next-gen/NGFW with app-layer inspection), proxy (forward, reverse), load balancer, WAF (web application firewall).
  • IDS vs IPSIDS detects and alerts (passive, out-of-band); IPS blocks (inline, in-band). Both can be signature-based (known patterns) or anomaly/behavior-based (deviation from baseline).
  • Network segmentationVLANs (logical separation at L2), DMZ/screened subnet (public-facing buffer zone), zero trust microsegmentation ("never trust, always verify"), air-gapping.
  • VPNIPSec (tunnel mode encrypts entire packet, transport mode encrypts payload only; ESP provides confidentiality + integrity, AH provides integrity only), SSL/TLS VPN (clientless, browser-based), site-to-site (branch offices) vs remote-access (individual users), split tunnel vs full tunnel.
  • Wireless securityWEP (RC4 — broken, do NOT use), WPA (TKIP), WPA2 (CCMP/AES), WPA3 (SAE — current standard). SSID hiding and MAC filtering are weak security-by-obscurity controls.
  • Cloud security basicsshared responsibility model: IaaS (customer owns OS up), PaaS (customer owns app + data), SaaS (customer owns data + access). Cloud concepts: CASB (Cloud Access Security Broker), SASE (Secure Access Service Edge), SSE (Security Service Edge).
  • Cloud deployment models — public, private, community, hybrid.
  • Common network attacksDDoS (volumetric, protocol, application-layer), MITM (man-in-the-middle), ARP poisoning/spoofing, DNS spoofing/cache poisoning, packet sniffing, on-path, evil twin WiFi, replay, SYN flood, Smurf, ping of death.
  • Threat actors — script kiddies, hacktivists, organized crime, insider threats, nation-state/APT.

High-yield drill: Given an attack signature, identify which defensive layer (firewall, IDS/IPS, segmentation, encryption) would stop it. Example: ARP spoofing on a flat network → VLAN segmentation + dynamic ARP inspection.

Domain 5: Security Operations (18%) — The Day-to-Day Tools

This domain covers what security practitioners do every day — protecting data, configuring systems, training users, and responding to what the monitoring reveals.

Subtopics:

  • Data handling lifecycle — create → store → use → share → archive → destroy. Different controls apply at each stage (e.g., encryption in transit vs at rest vs in use).
  • Data statesat rest (disk), in transit/motion (network), in use/processing (RAM/CPU). Each state needs different controls.
  • Data classificationprivate sector: public, internal, confidential, restricted; US government: Unclassified, CUI (Controlled Unclassified Information), Confidential, Secret, Top Secret.
  • Data rolesowner (accountable, classifies data), custodian (technical implementation), processor (acts on behalf of owner), user/subject (uses data).
  • Data destruction — clearing (overwrite), purging (degaussing), destruction (shred, crush, incinerate). Degaussing does NOT work on SSDs.
  • Encryption:
    • Symmetric (one shared key) — fast, for bulk data. AES (current standard), DES (broken), 3DES (deprecated), Blowfish, Twofish, RC4.
    • Asymmetric (public + private key pair) — slow, for key exchange and digital signatures. RSA, ECC (Elliptic Curve), Diffie-Hellman, ElGamal.
    • Hybrid systems (TLS, PGP) use asymmetric to exchange a symmetric session key, then use symmetric for bulk.
    • Public key encrypts (confidentiality); private key decrypts. Private key signs (non-repudiation); public key verifies.
  • Hashing — one-way, keyless, produces fixed-length digest. MD5 (broken — collisions), SHA-1 (deprecated), SHA-256/384/512 (current), SHA-3. Purpose: integrity, NOT confidentiality.
  • Salting — random data added to password before hashing to defeat rainbow tables. Use unique salt per password.
  • PKI basics — Certificate Authority (CA), Registration Authority (RA), Certificate Signing Request (CSR), X.509 digital certificates, Certificate Revocation List (CRL), OCSP, root CA, intermediate CA.
  • Digital signatures — provide integrity + authentication + non-repudiation. Sign hash with private key.
  • Configuration management — baselines, hardening, CIS Benchmarks, DISA STIGs, Group Policy, Ansible/Puppet/Chef, immutable infrastructure.
  • Patch management — test → stage → deploy → verify. Emergency patches bypass testing only when necessary.
  • Vulnerability management — scanning (authenticated vs unauthenticated), CVSS scoring, remediation prioritization.
  • Logging & monitoringSIEM (Security Information and Event Management — Splunk, Sentinel, QRadar), log aggregation, correlation rules, retention policies, chain of custody.
  • Security awareness training — annual mandatory training, phishing simulations, policy acknowledgments, role-specific training (developers, executives, admins).
  • Data loss prevention (DLP) — endpoint DLP (agent on device), network DLP (inline on egress), cloud DLP (CASB integration).
  • Email security — SPF, DKIM, DMARC for anti-spoofing; secure email gateways; sandbox detonation.

High-yield drill: Given an encryption scenario, pick symmetric vs asymmetric:

  • Bulk data encryption → symmetric (AES).
  • Key exchange during a TLS handshake → asymmetric (RSA/ECDHE).
  • Digitally signing an email → asymmetric (sign with your private key).
  • Storing a password for verification → hashing with salt (bcrypt, Argon2), not encryption.

AI Security on the 2026 CC Exam (What Most Competitor Guides Miss)

Most CC guides published before April 2026 do not mention AI. That is outdated. Per ISC2's Exam Guidance for Artificial Intelligence (published April 2, 2026), AI security concepts have been integrated into every CC domain. If you test on or after September 1, 2026, you will see these concepts — and even before that date, ISC2 often pilots new items as unscored beta questions.

AI terms to know for CC:

TermDefinitionWhy it matters for CC
Model poisoningAttacker corrupts training data to alter AI behaviorIntegrity violation (Domain 1)
Prompt injectionMalicious input designed to manipulate LLM outputInput validation control (Domain 4/5)
Model driftAI model accuracy degrades over time as data shiftsBC/DR risk (Domain 2)
Adversarial examplesInputs crafted to fool a trained modelThreat vector (Domain 1)
Shadow AIUnsanctioned AI tools employees use at workGovernance risk (Domain 1/5)
AI bias / fairnessDiscriminatory or skewed AI outputsEthics + Code of Ethics (Domain 1)
Explainability / XAIAbility to understand how an AI reached a decisionGovernance + audit (Domain 1/5)
AI alert triageSIEM using ML to correlate/prioritize alertsReduces SOC alert fatigue (Domain 5)
Data minimization in AIOnly collect/retain data needed for model purposePrivacy principle (Domain 1)
Synthetic dataGenerated data used to train models without exposing real PIIPrivacy-preserving technique (Domain 5)

High-yield AI drill: An attacker feeds mislabeled images into a publicly-updating image classifier, causing misclassification. Which CIA property is violated, and which control category applies? Answer: Integrity; administrative + technical controls — data validation, training-pipeline access controls, and provenance logging.


Pass Rate & Difficulty: What the Community Reports

ISC2 does not publish official CC pass rates. However, based on 2024-2026 community data (ISC2 Community forums, Reddit r/isc2, Cybrary, Discord study groups):

Candidate BackgroundCommunity-Reported First-Attempt Pass Rate
Complete beginners (no IT)~55-65%
IT professionals (1-3 years)~75-85%
Security+ holders~85-95%
Candidates scoring 80%+ on official ISC2 practice test~90%+

Difficulty signals:

  • Most candidates finish in 60-90 minutes of the 120-minute window.
  • CAT delivery means questions get harder as you answer correctly — expect several "I have never seen this word" items; that usually means you are doing well.
  • The biggest pitfall is over-thinking scenario questions. ISC2 questions are designed to have exactly one best answer — if two options look correct, look for the one that addresses the root cause or the BEST practice in that context.

Bottom line: CC is the easiest ISC2 exam, but it is not a giveaway. Plan at least 30-60 hours of focused study.

free ISC2 CC practice testPractice questions with detailed explanations

4-8 Week Study Plan (Two Tracks)

Track A — Complete Beginner (8 Weeks, ~60 hours)

WeekFocusStudy HoursMilestone
1Sign up for 1MCC + ISC2 self-paced training. Domain 1 Part 1 (CIA, AAA, MFA).6-8Understand CIA triad
2Domain 1 Part 2 (risk, controls, governance, Code of Ethics).6-8Pass Domain 1 quiz 80%+
3Domain 4 Network Security Part 1 (OSI, TCP/IP, ports, IP addressing).8-10Memorize OSI + common ports
4Domain 4 Part 2 (firewalls, IDS/IPS, VPN, wireless, cloud).6-8Pass Domain 4 quiz 80%+
5Domain 3 Access Controls (all 5 models + physical).6-8Pass Domain 3 quiz 80%+
6Domain 5 Security Operations (crypto, hashing, DLP, awareness).6-8Pass Domain 5 quiz 80%+
7Domain 2 BC/DR/IR + full cumulative review.6-8Complete 2 full-length practice exams
8Test-taking strategy, weak-area review, exam scheduling.4-6Take real exam

Track B — IT-Experienced (4 Weeks, ~30 hours)

WeekFocusStudy HoursMilestone
1Skim Domain 1 + Domain 2. Focus: ISC2 Code of Ethics, risk treatment, BIA.6-8Pass practice test 75%+
2Domain 3 + Domain 5 (access models + crypto/ops nuances).8-10Pass practice test 80%+
3Domain 4 Network Security — deep review of CC-specific vocabulary.6-8Pass practice test 85%+
4Two full-length practice exams + weak area cleanup. Schedule real exam.6-8Take real exam

Daily routine that works: 45 min reading → 30 min flashcards (Anki, Quizlet, or ISC2 official flash cards) → 30 min practice questions with explanations.


FREE vs Paid Study Resources

FREE Resources (Start Here)

ResourceLinkNotes
ISC2 Official Self-Paced Trainingisc2.org/candidate100% free via 1MCC. ~15-20 hours of video + assessments.
ISC2 Official CC Flash Cardsisc2.org/certifications/cc/cc-self-study-resourcesFree digital flash cards from ISC2.
Prabh Nair YouTubeyoutube.com/@PrabhNair1Free full CC playlist — best YouTube coverage.
Mike Chapple free contentLinkedIn Learning sampler + YouTubeExcellent Domain 1 explanations.
Destination Certificationdestcert.comFree CC MindMap videos (Rob Witcher).
OpenExamPrep (this site)Start FREE ISC2 CC Practice100+ free CC practice questions, AI tutor, flashcards.

Paid Resources (Only If You Need More)

ResourceCostNotes
Thor Pedersen Udemy CC bundle~$15-30 (sale)Most popular paid CC course; includes practice tests.
ISC2 Official CC Textbook~$40-50Comprehensive but dry; best as reference.
ISC2 Training Bundles$199-399Includes textbook + exam voucher; only worth it if 1MCC has ended.
Pete Zerger "Cram" videoFree on YouTube60-minute exam cram — last-week review only.

Our recommendation for most candidates: Free ISC2 self-paced training + Prabh Nair YouTube + OpenExamPrep practice tests. Total cost: $0.


Exam-Day Strategy (Pearson VUE)

Format Reminders

  • Linear vs CAT: CC delivers CAT (Computerized Adaptive Testing) — you cannot go back to previous questions. Commit to each answer before moving on.
  • 100-125 items — expect your exam to end somewhere in that range based on performance.
  • 2 hours — budget ~60 seconds per question. Most candidates finish with 30+ minutes to spare.

Day-Before Checklist

  • Locate the Pearson VUE test center; plan a 30-min buffer for traffic/parking.
  • Prepare two forms of ID (one photo, both matching the name on your ISC2 account).
  • Sleep 8 hours. Do not cram the morning of.
  • No personal items in the testing room — lockers are provided.

During the Exam

  1. Read the full question stem before looking at options. ISC2 loves distractors placed as tempting wrong answers.
  2. Eliminate obviously wrong options first. You can usually get to 50/50 quickly.
  3. Pick the BEST answer, not the "correct" answer. Often multiple options are technically correct; only one is best.
  4. Watch for absolute words (always, never, only) — they are usually wrong.
  5. Do not panic on unfamiliar terms. CAT throws hard items at strong performers.
  6. Manage time, not pace. Check the clock every 25-30 questions.

Post-Exam

  • You receive a preliminary pass/fail result at the test center immediately.
  • Official results and endorsement instructions arrive via email within ~7 business days.

After You Pass: Endorsement, AMF & CPEs

Endorsement (1-2 weeks after passing)

  1. Log in to your ISC2 account.
  2. Submit certification application (no ISC2 member sponsor required for CC).
  3. Agree to the ISC2 Code of Ethics.
  4. Pay $50 AMF (waived for first year under 1MCC Candidate benefit).
  5. Receive digital badge + certificate.

Maintaining Certification (3-Year Cycle)

  • 45 CPE credits total across the 3-year cycle.
  • Minimum 10 CPEs per year to stay in good standing.
  • CPEs are split into Group A (direct domain content, 30+ required) and Group B (professional development, 15 max).
  • Free CPE sources: ISC2 webinars, ISC2 Professional Development Institute (PDI), local chapter meetings, blog/article writing, Udemy/Coursera security courses.

Member Benefits

  • Digital badge + logo usage rights.
  • Access to ISC2 member forums and local chapters (200+ worldwide).
  • Discounts on CISSP and other ISC2 training bundles.
  • Voting rights in ISC2 Board of Directors elections.

CC vs CompTIA Security+ vs SSCP vs GSEC: Which to Pick

FeatureISC2 CCCompTIA Security+ISC2 SSCPGIAC GSEC
LevelEntryEntry-IntermediateIntermediateIntermediate
Experience req.NoneNone (2 yrs recommended)1 yearNone
Cost$0-199$404$599$999+ (practice tests not included)
Questions100-125 (CAT)Up to 90 + PBQs125106-180
Passing700/1000750/900700/100073%
Validity3 years3 years3 years4 years
DoD 8140No (yet)YesYesYes
Hands-on?NoYes (PBQs)LimitedHeavy
Difficulty (1-10)3-45-678-9
Best forTrue beginners, studentsIT pros, DoD rolesSysadmins & SOCHands-on defenders

Quick Picker

  • No IT background, no budget → CC (free).
  • IT background + DoD/federal job target → Security+.
  • 1-2 years security experience → SSCP.
  • Technical depth + money no object → GSEC.
  • Stacking strategy (recommended): CC → Security+ → SSCP → CISSP.

The CC Stacking Strategy: From $0 to Six Figures

CC's highest ROI is as the first rung of a certification ladder. Here's the proven 5-year stack thousands of ISC2 members have followed:

YearCertCostTime InvestmentSalary Lift
0-3 monthsISC2 CC$0 (1MCC) + $50 AMF30-60 hrsQualifies for $50-70K SOC/help-desk security roles
3-12 monthsCompTIA Security+ (or Network+ first if weak on networking)$40480-120 hrsDoD 8140 eligible; $65-85K SOC Analyst I
1-2 yearsISC2 SSCP (1 yr experience req.)$599 + $125/yr AMF (rolls into CC AMF if you hold both)100-150 hrsMid-level SOC, sysadmin security; $80-105K
2-3 yearsCompTIA CySA+ or PenTest+ or CCSP (track split)$404-$599100-150 hrsSpecialist premium; $95-125K
5+ yearsISC2 CISSP (5 yrs experience in 2 of 8 domains; CC waives 1 year)$749 + $125/yr AMF200-400 hrsSenior/lead/architect; $120-180K

Why this order works:

  1. CC before Security+ — CC teaches the ISC2 vocabulary (best-answer wording, Code of Ethics, governance) you'll need for SSCP and CISSP later. Security+ alone does not.
  2. Security+ before SSCP — SSCP assumes hands-on IT competence; Security+ fills that gap.
  3. SSCP before CISSP — SSCP content is the operational subset of CISSP. Studying SSCP gives you 40-60% of CISSP Domain 7 (Security Operations) for free.
  4. CISSP only after 5 years — ISC2 waives 1 year of experience if you already hold CC (or Security+/SSCP/CySA+/etc.), so 4 years of real work + CC = CISSP eligible.
  5. AMF stacking — Holding multiple ISC2 certs does NOT multiply your AMF. The single AMF is $125/year once you hold a full member cert (CISSP/SSCP/CCSP), which replaces your $50 CC-only AMF. Your CC AMF does not stack on top.

ROI math: $0 (CC) → $404 (Sec+) → $599 (SSCP) → $749 (CISSP) = $1,752 in exam fees over 5 years to move from $50K to $150K+. That is a ~90x return on certification spend.


Salary & Career Outlook

Roles CC Qualifies You For

  • SOC Analyst I — $50,000-$75,000
  • IT Security Support — $45,000-$65,000
  • Cybersecurity Intern — $20-30/hr
  • GRC Coordinator — $55,000-$75,000
  • Junior Penetration Tester (with other skills) — $55,000-$80,000
  • Help Desk with Security Focus — $40,000-$60,000

Industry Outlook (BLS 2024-2034)

  • Information Security Analysts: 29% job growth 2024-2034, much faster than average.
  • 2024 median annual wage: $124,910 (BLS OOH, published 2026).
  • Top-paying industries: Financial services, tech, federal government, defense contractors.
  • Remote work: ~50% of cybersecurity roles offer hybrid or fully remote in 2026.

Source: BLS Occupational Outlook Handbook — Information Security Analysts.


Common Mistakes: Why Candidates Fail CC

  1. Treating it like a technical exam. CC is a concepts exam. Configuring a firewall is not tested — recognizing why a firewall belongs at a network edge is.
  2. Ignoring the ISC2 Code of Ethics. Almost every candidate gets at least one Code of Ethics question. Memorize the four canons in order.
  3. Not taking enough practice tests. If you are not scoring 80%+ on multiple practice tests, you are not ready.
  4. Skimming Domain 2. It's only 10%, but missing all 10-13 questions can sink you.
  5. Wasting time on one hard question. In CAT, you cannot go back anyway — commit and move on.
  6. Forgetting the 9-month endorsement window. You passed, now act quickly to complete endorsement and pay AMF.
  7. Creating multiple ISC2 accounts to get a second free voucher. This is a policy violation and can permanently ban you.
  8. Assuming 1MCC lasts forever. Treat it as a limited-time offer — ISC2 has not confirmed a 2027 extension as of April 2026.

Next Steps After CC

Your CC unlocks a clear progression path:

Within 6 Months of CC

  • CompTIA Security+ (SY0-701) — adds DoD 8140 eligibility and hands-on PBQ experience.
  • CompTIA Network+ — fills any networking gaps from Domain 4.

1-2 Years After CC

  • ISC2 SSCP — the operational counterpart to CISSP; 1 year experience required.
  • CompTIA CySA+ — focused on SOC analyst skills.
  • GIAC GSEC — if you want hands-on depth.

3-5 Years After CC

  • ISC2 CISSP — the gold standard; 5 years experience in 2 of 8 domains.
  • CCSP — if you specialize in cloud security.
  • CISM / CISA — if you pivot toward management or audit.

Strategic tip: Use your free ISC2 Candidate year to book a CISSP webinar or chapter event. Networking at ISC2 local chapters is one of the highest-ROI moves a CC holder can make.


Final CTA: Start Practicing Today

The CC is the cheapest, fastest, and most accessible path into cybersecurity in 2026 — but only if you take action. Most candidates who fail never actually schedule the exam. Lock in a date, then reverse-engineer your study plan from there.

OpenExamPrep's free ISC2 CC practice testPractice questions with detailed explanations

Official Sources

Test Your Knowledge
Question 1 of 8

Which of the following BEST describes the CIA triad in cybersecurity?

A
Central Intelligence Agency, a U.S. government agency responsible for cybersecurity
B
Confidentiality, Integrity, and Availability — the three core goals of information security
C
Control, Identify, Authenticate — the three steps of access control
D
Cloud, Infrastructure, Application — the three layers of cloud security
Learn More with AI

10 free AI interactions per day

ISC2 CCCertified in CybersecurityISC2CybersecurityEntry-Level CybersecurityIT CertificationCareer ChangeStudy PlanCC vs Security+One Million CertifiedPearson VUE2026 Exam

Related Articles

Stay Updated

Get free exam tips and study guides delivered to your inbox.

Free exam tips & study guides. Unsubscribe anytime.