Course Information
Course Name
CCT: Certified Cybersecurity Technician
Exam code
212-82
Duration
5 Days
Certification
Certified Cybersecurity Technician (CCT)
Overview
The Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program by EC-Council, the creators of the Certified Ethical Hacker (C|EH) certification. It is designed to enhance your technical skills across multiple cybersecurity domains, offering in-depth technical knowledge and 85 hands-on labs.
Flexible learning options
Job-ready skills for diverse cybersecurity roles
Certifies key technical skills for IT and cybersecurity technicians
Audience Profile
The C|CT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role. This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.
Prerequisites
There are no specific prerequisites to take the C|CT course and attempt the C|CT certification exam. Although this is an entry-level course, a working knowledge of IT networking and basic cybersecurity concepts will be an advantage to anyone taking this course.
At Course Completion
Key issues plaguing the cybersecurity industry (information security and network security)
Information security threats, vulnerabilities, and attacks
Different types of malware
Network security fundamentals
Identification, authentication, and authorization concepts
Cryptography and public key infrastructure concepts
Network security controls
Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
Physical controls (physical security controls, workplace security, and environmental controls)
Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
Application security design and testing techniques
Fundamentals of virtualization, cloud computing, and cloud security
Wireless network fundamentals, wireless encryption, and security measures
Fundamentals of mobile, IoT, and OT devices and their security measures
Cryptography and public key infrastructure concepts
Data security controls, data backup and retention methods, and data loss prevention techniques
Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
Incident handling and response process
Computer forensics fundaments, digital evidence, and forensic investigation phases
Course Outline
Module 1: Information Security Threats and Vulnerabilities
Module 2: Information Security Attacks
Module 3: Network Security Fundamentals
Module 4: Identification, Authentication, and Authorization
Module 5: Network Security Controls – Administrative Controls
Module 6: Network Security Controls – Physical Controls
Module 7: Network Security Controls – Technical Controls
Module 8: Network Security Assessment Techniques and Tools
Module 9: Application Security
Module 10: Virtualization and Cloud Computing
Module 11: Wireless Network Security
Module 12: Mobile Device Security
Module 13: IoT and OT Security
Module 14: Cryptography
Module 15: Data Security
Module 16: Network Troubleshooting
Module 17: Network Traffic Monitoring
Module 18: Network Logs Monitoring and Analysis
Module 19: Incident Response
Module 20: Computer Forensics
Module 21: Business Continuity and Disaster Recovery
Module 22: Risk Management
All EC-Council certification courses are conducted by certified trainers from Iverson.
Digital Methods acts as the official training partner and assists with program consultation, registration, coordination, scheduling, and administrative arrangements to ensure a smooth and professionally managed training experience.