Preparation Course: Certified Cybersecurity Technician
Accreditation Number: 115343887
EC-Council’s C|CT certification immerses participants in
well-constructed knowledge transfer. Training is accompanied by critical
thinking challenges and immersive lab experiences that allow candidates to
apply their knowledge and move into the skill development phase in the class.
Upon completing the program, C|CT-certified professionals will have a strong
foundation in cybersecurity principles and techniques and hands-on exposure to
the tasks required in real-world jobs. The C|CT provides the foundational
skills essential for starting a career in cybersecurity, focusing on four
disciplines: network defense, ethical hacking, digital forensics, and security
operations.
By the
end of this course, participants will be able to:
·
Have Strong Foundational Coverage because
the C|CT certification provides total foundational cybersecurity domain
coverage with key concepts in each domain combined with practical hands-on labs
and critical thinking challenges producing world-class cybersecurity
technologists.
·
Understand key concepts in
cybersecurity, including information security and network security
·
Realize information security
threats, vulnerabilities, and attacks
·
Recognize the different types of malwares
·
Understand identification,
authentication, and authorization Network security control
-
Administrative controls
(frameworks, laws, acts, governance, and compliance programs, security
policies)
-
Physical controls (physical and
workplace security policies, environmental controls)
-
Technical controls (network
security protocols; network segmentation; firewalls; intrusion detection and
prevention systems; honeypots; proxy servers; VPNs; user behavior analytics;
network access control; unified threat management; security information and
event management; security orchestration, automation, and response; load balancers;
anti-malware
·
Master network security assessment
techniques and tools (threat hunting, threat intelligence, vulnerability
assessment, ethical hacking, penetration testing, configuration and asset
management)
·
Perform application security design
and testing techniques
·
Understand fundamentals of
virtualization, cloud computing, and cloud security
·
Understand wireless network
fundamentals, wireless encryption, and related security measures
·
Understand fundamentals of mobile,
IoT, and OT devices and related security measures
·
Understand cryptography and
public-key infrastructure
Course Curriculum
- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Network Security Assessment Techniques and Tools
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- Internet of Things (IoT) and Operational Technology (OT) Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
- Network Log Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management
Instructor
Trainees Feedback
Reviews