Certified Cybersecurity Technician
This course provides immersive knowledge transfer combined with critical thinking and practical labs for immediate skill application. Completing C|CT equips professionals with a solid cybersecurity foundation and hands-on experience relevant to real-world job requirements.



This Course Is Ideal For
IT networking specialist
Cybersecurity technician
Network administrator
Security operations center (SOC) analyst
Network engineer
IT manager
IT networking specialist
Cybersecurity technician
Network administrator
Security operations center (SOC) analyst
Network engineer
IT manager
IT networking specialist
Cybersecurity technician
Network administrator
Security operations center (SOC) analyst
Network engineer
IT manager
What to Expect In This Course
SKILL LEVEL
Beginner
DURATION
40 hours
CERTIFICATION
After Completion
LANGUAGE
English
Skill You Will Learn
Key concepts in cybersecurity, including information security and network security
Information security threats, vulnerabilities, and attacks
The different types of malware
Identification, authentication, and authorization
Network security controls
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
Application security design and testing techniques
Fundamentals of virtualization, cloud computing, and cloud security
Wireless network fundamentals, wireless encryption, and related security measures
Fundamentals of mobile, IoT, and OT devices and related security measures
Cryptography and public-key infrastructure
Data security controls, data backup and retention methods, and data loss prevention techniques
Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
The incident handling and response process
Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
Concepts in business continuity and disaster recovery
Risk management concepts, phases, and frameworks
Key concepts in cybersecurity, including information security and network security
Information security threats, vulnerabilities, and attacks
The different types of malware
Identification, authentication, and authorization
Network security controls
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
Application security design and testing techniques
Fundamentals of virtualization, cloud computing, and cloud security
Wireless network fundamentals, wireless encryption, and related security measures
Fundamentals of mobile, IoT, and OT devices and related security measures
Cryptography and public-key infrastructure
Data security controls, data backup and retention methods, and data loss prevention techniques
Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
The incident handling and response process
Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
Concepts in business continuity and disaster recovery
Risk management concepts, phases, and frameworks
Key concepts in cybersecurity, including information security and network security
Information security threats, vulnerabilities, and attacks
The different types of malware
Identification, authentication, and authorization
Network security controls
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
Application security design and testing techniques
Fundamentals of virtualization, cloud computing, and cloud security
Wireless network fundamentals, wireless encryption, and related security measures
Fundamentals of mobile, IoT, and OT devices and related security measures
Cryptography and public-key infrastructure
Data security controls, data backup and retention methods, and data loss prevention techniques
Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
The incident handling and response process
Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
Concepts in business continuity and disaster recovery
Risk management concepts, phases, and frameworks
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Module 13
Module 14
Module 15
Module 16
Module 17
Module 18
Module 19
Module 20
Module 21
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module 10
Module 11
Module 12
Module 13
Module 14
Module 15
Module 16
Module 17
Module 18
Module 19
Module 20
Module 21
Outcomes of the Course
By the end of this course, participants will be able to:
Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.
Encrypt data and understand secure communication methods.
Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.
Analyze network traffic and logs to detect anomalies and identify security breaches.
Understand and contribute to the incident handling and response lifecycle.
Comprehend SOC functions, risk management, SIEM, and SOAR.
Apply various tools and techniques in hands-on, real-world simulations.
By the end of this course, participants will be able to:
Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.
Encrypt data and understand secure communication methods.
Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.
Analyze network traffic and logs to detect anomalies and identify security breaches.
Understand and contribute to the incident handling and response lifecycle.
Comprehend SOC functions, risk management, SIEM, and SOAR.
Apply various tools and techniques in hands-on, real-world simulations.
By the end of this course, participants will be able to:
Configure firewalls, IDS/IPS, and VPNs, and secure network protocols.
Encrypt data and understand secure communication methods.
Recognize malware, phishing, DoS attacks, and perform basic vulnerability identification.
Analyze network traffic and logs to detect anomalies and identify security breaches.
Understand and contribute to the incident handling and response lifecycle.
Comprehend SOC functions, risk management, SIEM, and SOAR.
Apply various tools and techniques in hands-on, real-world simulations.
Content Provider



EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
EC-Council Group is a dedicated Information Security organization EC-Council aims at creating knowledge, facilitating innovation, executing research, implementing development, and nurturing subject matter experts in order to provide their unique skills and niche expertise in cybersecurity.
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Programme Module
Module 01
Module 02
Module 03
Module 04
Module 05
Module 06
Module 07
Module 08
Module 09
Module Title 9
Module Title 10
Module Title 11
Module Title 12
Module Title 13
Module Title 14
Module Title 15
Module Title 16
Module Title 17
Module Title 18
Module Title 19
Module Title 20