Course Overview

Certified Cybersecurity Technician

The C|CT is an entry-level cybersecurity program engineered by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, to address the global need and demand for cybersecurity technicians with strong foundational skills.

Establishing this strong technical foundation in cybersecurity lays the groundwork for a future career in a variety of existing IT roles. The knowledge and skills gained through the C|CT can create pathways for further specialization in many cybersecurity domains, including ethical hacking, penetration testing, digital forensics, and application security.


EC-Council has developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their practical technician-level skills

Learning Outcomes

The C|CT provides the foundational skills essential for starting a career in cybersecurity, focusing on four disciplines: network defense, ethical hacking, digital forensics, and security operations.

Strong Foundational Coverage

The C|CT certification provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cyber security technologists.

Live Range Experience

Other popular programs rely on simulation and interactivity as practical-based assessment, the C|CT program is delivered on a live Cyber Range utilizing live targets and real attack systems for a truly immersive, real-life practice and assessment platform.

Capture the Flag

The C|CT certification offers capture the flag (CTF) style critical thinking challenges to accompany each lab exercise putting knowledge into practice and providing a proven record of skill demonstration. Candidates completing the C|CT program will earn the C|CT certification and have a proven track record of performing the tasks required in a live Cyber Range, proving to employers their ability to perform critical job duties.

Multiple Certifications

The course outline of the C|CT program goes above and beyond some of the more common entry-level cybersecurity programs, such as the Security+, in a completely hands-on cyber range environment instead of simulations to ensure cybersecurity skills development. We believe that candidates who successfully attain the C|CT certification will attain other leading cybersecurity certifications, including Security+, without further training

Most Affordable

The Despite the unique design of the heavily hands-on course and its uses of real-world cyber range capability, the certification is one of the most affordable in the world!

Exam Information

Exam Title : Certified Cybersecurity Technician
Exam Code : 212-82
Availability : ECC Exam Portal
Duration : 3 Hours
Test Format : Multiple choice and Real Life hands-on Practical Exam
Exam Mode : Remote Proctoring Services
Passing Score : 70%

Delivery Modes

Instructor-led training

  • iWeek (synchronous online learning)
  • iLearn (asynchronous online learning)
  • CodeRed (asynchronous online learning)

Course Content & Modules

Information Security Threats And Vulnerabilities

Module 01

Understand various cybersecurity threats, vulnerabilities, and attack vectors that can compromise information security systems.

Information Security Attacks

Module 02

Learn about different types of cyber attacks including malware, phishing, social engineering, and advanced persistent threats.

TNetwork Security Fundamentals.

Module 03

Master fundamental network security concepts including protocols, network architecture, and basic security principles.

Identification, Authentication, and Authorization.

Module 04

Implement identity and access management systems including multi-factor authentication, single sign-on, and role-based access control.

Network Security Controls: Administrative Controls.

Module 05

Develop administrative security controls including policies, procedures, security awareness training, and governance frameworks.

Network Security Controls: Physical Controls.

Module 06

Implement physical security measures including access controls, environmental monitoring, and facility protection strategies.

Network Security Controls: Technical Controls.

Module 07

Deploy technical security controls including firewalls, intrusion detection systems, antivirus software, and security appliances.

Network Security Assessment Techniques and Tools.

Module 08

Learn vulnerability assessment techniques, penetration testing tools, and security scanning methodologies for network evaluation.

Application Security.

Module 09

Secure applications through secure coding practices, application security testing, and web application firewall implementation.

Virtualization and Cloud Computing.

Module 10

Understand virtualization security, cloud computing models, and implement security controls for virtual and cloud environments.

Wireless Network Security.

Module 11

Secure wireless networks through encryption protocols, access point security, and wireless intrusion detection systems.

Mobile Device Security

Module 12

Implement mobile device security through MDM solutions, app security, device encryption, and mobile threat protection.

Internet of Things (IoT) and Operational Technology (OT) Security

Module 13

Secure IoT devices and OT systems through network segmentation, device authentication, and industrial security protocols.

Cryptography

Module 14

Master cryptographic concepts including symmetric/asymmetric encryption, digital signatures, PKI, and cryptographic protocols.

Data Security

Module 15

Protect sensitive data through encryption, data classification, backup strategies, and data loss prevention techniques.

Network Troubleshooting

Module 16

Develop troubleshooting skills for network connectivity issues, performance problems, and security-related network failures.

Network Traffic Monitoring

Module 17

Monitor network traffic patterns, analyze network behavior, and detect anomalies using network monitoring tools and techniques.

Network Log Monitoring and Analysis

Module 18

Implement centralized logging systems, analyze log data for security events, and use SIEM tools for threat detection.

TIncident Response.

Module 19

Develop incident response procedures, containment strategies, and recovery processes for cybersecurity incidents.

Computer Forensics

Module 20

Learn digital forensics techniques, evidence collection, chain of custody, and forensic analysis tools and methodologies.

Business Continuity and Disaster Recovery

Module 21

Plan and implement business continuity strategies, disaster recovery procedures, and backup/recovery solutions.

Risk Management

Module 22

Assess cybersecurity risks, develop risk mitigation strategies, and implement comprehensive risk management frameworks.

Course Information

Duration
5 Days
Level
Intermediate
Certification
EC-Council
Language
English & Malay
Format
Online & Physical

Ready to Start?

Certification

Earn Your Industry-Recognized Certificate

Upon successfully passing the examination for this course, participants will be awarded a certificate, an example of which is shown below.

Globally recognized EC-Council certification
Validates ethical hacking expertise
Enhances career opportunities in cybersecurity
Cybersecurity Certificate
Certified Professional
TEC Logo
Go Back Top