Certified Cybersecurity Technician
Certified Cybersecurity Technician
Certified Cybersecurity Technician

Certified Cybersecurity Technician

This course provides immersive knowledge transfer combined with critical thinking and practical labs for immediate skill application. Completing C|CT equips professionals with a solid cybersecurity foundation and hands-on experience relevant to real-world job requirements.

This Course Is Ideal For

  • IT networking specialist

  • Cybersecurity technician

  • Network administrator

  • Security operations center (SOC) analyst

  • Network engineer

  • IT manager

  • IT networking specialist

  • Cybersecurity technician

  • Network administrator

  • Security operations center (SOC) analyst

  • Network engineer

  • IT manager

  • IT networking specialist

  • Cybersecurity technician

  • Network administrator

  • Security operations center (SOC) analyst

  • Network engineer

  • IT manager

What to Expect In This Course

SKILL LEVEL
Beginner
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English

Skill You Will Learn

  • Key concepts in cybersecurity, including information security and network security

  • Information security threats, vulnerabilities, and attacks

  • The different types of malware

  • Identification, authentication, and authorization

  • Network security controls

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

  • Application security design and testing techniques

  • Fundamentals of virtualization, cloud computing, and cloud security

  • Wireless network fundamentals, wireless encryption, and related security measures

  • Fundamentals of mobile, IoT, and OT devices and related security measures

  • Cryptography and public-key infrastructure

  • Data security controls, data backup and retention methods, and data loss prevention techniques

  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic

  • The incident handling and response process

  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation

  • Concepts in business continuity and disaster recovery

  • Risk management concepts, phases, and frameworks

  • Key concepts in cybersecurity, including information security and network security

  • Information security threats, vulnerabilities, and attacks

  • The different types of malware

  • Identification, authentication, and authorization

  • Network security controls

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

  • Application security design and testing techniques

  • Fundamentals of virtualization, cloud computing, and cloud security

  • Wireless network fundamentals, wireless encryption, and related security measures

  • Fundamentals of mobile, IoT, and OT devices and related security measures

  • Cryptography and public-key infrastructure

  • Data security controls, data backup and retention methods, and data loss prevention techniques

  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic

  • The incident handling and response process

  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation

  • Concepts in business continuity and disaster recovery

  • Risk management concepts, phases, and frameworks

  • Key concepts in cybersecurity, including information security and network security

  • Information security threats, vulnerabilities, and attacks

  • The different types of malware

  • Identification, authentication, and authorization

  • Network security controls

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

  • Application security design and testing techniques

  • Fundamentals of virtualization, cloud computing, and cloud security

  • Wireless network fundamentals, wireless encryption, and related security measures

  • Fundamentals of mobile, IoT, and OT devices and related security measures

  • Cryptography and public-key infrastructure

  • Data security controls, data backup and retention methods, and data loss prevention techniques

  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic

  • The incident handling and response process

  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation

  • Concepts in business continuity and disaster recovery

  • Risk management concepts, phases, and frameworks

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Module 12

Module 13

Module 14

Module 15

Module 16

Module 17

Module 18

Module 19

Module 20

Module 21

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module 10

Module 11

Module 12

Module 13

Module 14

Module 15

Module 16

Module 17

Module 18

Module 19

Module 20

Module 21

Outcomes of the Course

By the end of this course, participants will be able to:

  • Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.

  • Encrypt data and understand secure communication methods.

  • Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.

  • Analyze network traffic and logs to detect anomalies and identify security breaches.

  • Understand and contribute to the incident handling and response lifecycle.

  • Comprehend SOC functions, risk management, SIEM, and SOAR.

  • Apply various tools and techniques in hands-on, real-world simulations.

By the end of this course, participants will be able to:

  • Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.

  • Encrypt data and understand secure communication methods.

  • Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.

  • Analyze network traffic and logs to detect anomalies and identify security breaches.

  • Understand and contribute to the incident handling and response lifecycle.

  • Comprehend SOC functions, risk management, SIEM, and SOAR.

  • Apply various tools and techniques in hands-on, real-world simulations.

By the end of this course, participants will be able to:

  • Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.

  • Encrypt data and understand secure communication methods.

  • Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.

  • Analyze network traffic and logs to detect anomalies and identify security breaches.

  • Understand and contribute to the incident handling and response lifecycle.

  • Comprehend SOC functions, risk management, SIEM, and SOAR.

  • Apply various tools and techniques in hands-on, real-world simulations.

Content Provider

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Programme Module

Module 01

Module 02

Module 03

Module 04

Module 05

Module 06

Module 07

Module 08

Module 09

Module Title 9

Module Title 10

Module Title 11

Module Title 12

Module Title 13

Module Title 14

Module Title 15

Module Title 16

Module Title 17

Module Title 18

Module Title 19

Module Title 20