EC-Council Certified Cybersecurity Technician (C|CT)
The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to address specifically the increasing need for cybersecurity technicians with strong foundational skills. The C|CT Certification validates an individual’s fundamental cybersecurity skills across the domains of network defense, ethical hacking, digital forensics, and security operations. EC-Council Certified Cybersecurity Technician (C|CT) Benefits Explain key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks Describe the different types of malware Identification, authentication, and authorization Understand network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration, and asset management) Explore the fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Describe the fundamentals of mobile, IoT, and OT devices and related security measures Investigate breaches using computer forensics and digital evidence Continue learning and face new challenges with after-course one-on-one instructor coaching C|CT Training Course Outline Important Course and Certification Information Recommended Experience Knowledge and experience in IT and networking Exam Information 60 Question, Multiple Choice, 3 Hour Duration, 70% Passing Score Exam Voucher included with the course Training Topics Information Security Threats and VulnerabilitiesInformation Security AttacksNetwork Security FundamentalsIdentification, Authentication, and AuthorizationNetwork Security Controls: Administrative ControlsNetwork Security Controls: Physical ControlsNetwork Security Controls: Technical ControlsNetwork Security Assessment Techniques and ToolsApplication SecurityVirtualization and Cloud ComputingWireless Network SecurityMobile Device SecurityInternet of Things (IoT) and Operational Technology (OT) SecurityCryptographyData SecurityNetwork TroubleshootingNetwork Traffic MonitoringNetwork Log Monitoring and AnalysisIncident ResponseComputer ForensicsBusiness Continuity and Disaster RecoveryRisk Management