CCT - Certified Cybersecurity Technician

Certified Cybersecurity Technician

This Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills

To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more

Duration: 5.0 days

Enquire Now

Start learning today!

Click Hereto customize your Training

Objectives

  • Key issues plaguing the cyber security (information security and network security)
  • Information security threats, vulnerabilities, and attacks
  • Different types of malware
  • Network security fundamentals
  • Network security controls:
    • Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
    • Physical controls (physical security controls, workplace security, and environmental controls)
    • Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server,
    • VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
  • Identification, authentication, and authorization concepts
  • Application security design and testing techniques
  • Fundamentals of virtualization, cloud computing, and cloud security
  • Wireless network fundamentals, wireless encryption, and security measures
  • Fundamentals of mobile, IoT, and OT devices and their security measures
  • Cryptography and public key infrastructure concepts
  • Data security controls, data backup and retention methods, and data loss prevention techniques
  • Network troubleshooting, traffic monitoring, log monitoring and analysis for suspicious traffic
  • Incident handling and response process
  • Computer forensics fundaments, digital evidence, and forensic investigation phases
  • Business continuity (BC) and disaster recovery (DR) concepts
  • Risk management concepts, phases, and frameworks

Content

  • Module 1: Information Security Threats and Vulnerabilities
  • Module 2: Information Security Attacks
  • Module 3: Network Security Fundamentals
  • Module 4: Identification, Authentication, and Authorization
  • Module 5: Network Security Controls – Administrative Controls
  • Module 6: Network Security Controls – Physical Controls
  • Module 7: Network Security Controls – Technical Controls
  • Module 8: Network Security Assessment Techniques and Tools
  • Module 9: Business Continuity and Disaster Recovery
  • Module 10: Application Security
  • Module 11: Virtualization and Cloud Computing
  • Module 12: Wireless Network Security
  • Module 13: Mobile Device Security
  • Module 14: IoT and OT Security
  • Module 15: Cryptography
  • Module 16: Data Security
  • Module 17: Network Troubleshooting
  • Module 18: Network Traffic Monitoring
  • Module 19: Network Longs Monitoring and Analysis
  • Module 20: Incident Response
  • Module 21: Computer Forensics
  • Module 22: Risk Management

Audience

  • Security administrator
  • Network administrator
  • Information technology (IT) Helpdesk
  • systems engineer
  • Security engineer
  • Systems administrator
  • Cybersecurity Technician
  • Network Security Technician

Prerequisites

There are no prerequisites required to attend this course.

Certification

product-certification

Course Benefits

product-benefits
  • Career growth
  • Broad Career opportunities
  • Worldwide recognition from leaders
  • Up-to Date technical skills
  • Popular Certification Badges

EC-Council Popular Courses

cpent

EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that mus

ctia

Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat int

cnd

A CONTINUALLY ADAPTIVE COMPREHENSIVE SECURITY STRATEGY Cybersecurity is a non-linear process that required a continuous approach to mitigating cyber risks.
Enquire Now
 
 
 
 
e5sX4i
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy