EC-Council’s C|CT certification immerses participants in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques and hands-on exposure to the tasks required in real-world jobs. The C|CT provides the foundational skills essential for starting a career in cybersecurity, focusing on four disciplines: network defense, ethical hacking, digital forensics, and security operations.

By the end of this course, participants will be able to:

·       Have Strong Foundational Coverage because the C|CT certification provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cybersecurity technologists.

·       Understand key concepts in cybersecurity, including information security and network security

·       Realize information security threats, vulnerabilities, and attacks

·       Recognize the different types of malwares

·       Understand identification, authentication, and authorization Network security control

-      Administrative controls (frameworks, laws, acts, governance, and compliance programs, security policies)

-      Physical controls (physical and workplace security policies, environmental controls)

-      Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behavior analytics; network access control; unified threat management; security information and event management; security orchestration, automation, and response; load balancers; anti-malware

·       Master network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

·       Perform application security design and testing techniques

·       Understand fundamentals of virtualization, cloud computing, and cloud security

·       Understand wireless network fundamentals, wireless encryption, and related security measures

·       Understand fundamentals of mobile, IoT, and OT devices and related security measures

·       Understand cryptography and public-key infrastructure

Course Curriculum

4 Lectures
Module 1 - Ethical Hacking
  • Information Security Threats and Vulnerabilities
  • Information Security Attacks
Module 2 - Network Defense
  • Network Security Fundamentals
  • Identification, Authentication, and Authorization
  • Network Security Controls: Administrative Controls
  • Network Security Controls: Physical Controls
  • Network Security Controls: Technical Controls
  • Network Security Assessment Techniques and Tools
  • Application Security
  • Virtualization and Cloud Computing
  • Wireless Network Security
  • Mobile Device Security
Module 3 - Security Operations
  • Internet of Things (IoT) and Operational Technology (OT) Security
  • Cryptography
  • Data Security
  • Network Troubleshooting
  • Network Traffic Monitoring
  • Network Log Monitoring and Analysis
  • Incident Response
Module 4 - Digital Forensics
  • Computer Forensics
  • Business Continuity and Disaster Recovery
  • Risk Management

Instructor

image

0
Rating
Reviews
0
trainees
0
Courses

frontend.Files & Links

frontend.Files & Links

Trainees Feedback

0
Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

Reviews

login in Or Register as Trainer