CCT – Certified Cybersecurity Technician

This Course Includes

Videos & Lectures

Quizzes & Assessments

Mobile access

Certificate of Completion

Introduction

EC-Council’s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself.

Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.

Audience Profile

The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job.

The course is especially well suited to:

Early-career IT professionals, IT managers, career changers, and career advancers, students and recent graduates.

Outcomes

Prerequisites

No specific prerequisites are required for the C|CT program.

Module 1: Information Security Threats and Vulnerabilities
Attackers break into systems for various reasons and purposes. Therefore, it is important to understand not only how malicious hackers attack and exploit systems but also the probable reasons behind those attacks. As Sun Tzu states in the Art of War, “If you know yourself but not the enemy, for every victory gained, you will also suffer a defeat.” Security professionals must guard their infrastructure against exploits by knowing the enemy—the malicious hacker(s)—who seeks to use the same infrastructure for illegal activities.

This module begins with an overview of the threat sources, threat actors, and threat vectors to information security. It provides insight into the various attributes of threat actors. Later, the module discusses malware and common techniques attackers use to distribute malware on the web. It provides a brief discussion on different types of malware, an introduction to vulnerabilities and their impact and insight into the common areas of vulnerability. The module ends with a brief discussion on vulnerability classification.

Lessons

At the end of this module, you will be able to:

This module starts with an overview of information-security attacks. It provides insight into hacking methodologies and frameworks. Later, the module discusses various types of network-level, application-level, and wireless-network-specific attacks. The module ends with a brief discussion on the Internet of Things (IoT), operational technology (OT), cloud, and cryptographic attacks.

Lessons

At the end of this module, you will be able to:

With the increase in the usage of emerging technology, it has become increasingly important to secure information and online data being. As the Internet and computer networks are continually growing, network security has become a challenging task for organizations. Every organization requires a stable and efficient network security architecture that protects their critical assets and information systems from evolving threats.

This module starts with an overview of the fundamentals of information security. It provides insight into information assurance (IA) principles. Later, the module discusses various types of network defense approaches. The module ends with a brief discussion on network security controls and network defense elements.

Lessons

At the end of this module, you will be able to:

The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.

Lessons

At the end of this module, you will be able to:

Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with specific regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance to fulfill regulatory standards. This module addresses this administrative aspect of an organization’s network security.

Lessons

At the end of this module, you will be able to:

Physical security plays a crucial role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. Physical security is becoming a challenging task with the increased usage of devices such as USB drives, laptops, smartphones, and tablets because malicious actors can easily gain physical access to such devices and steal sensitive data. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.

Lessons

At the end of this module, you will be able to:

The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations protect their private networks and IT assets.

Lessons

At the end of this module, you will be able to:

Network security assessment plays a vital role in safeguarding the networks, devices, and data

pertaining to an organization. To protect these assets from evolving cyberattacks, organizations require an understating of the current technical security posture of their network. Network security assessment helps organizations in identifying existing security flaws and possible security threats and risks to their IT assets. Additionally, it helps in improving the integrity and resilience of both internal and external networks.

Lessons

At the end of this module, you will be able to:

The evolution of the Internet and web technologies, combined with rapidly increasing Internet connectivity has led to the emergence of a new business landscape. Web applications are an integral component of online businesses. Everyone connected via the Internet is using various web applications for different purposes, including online shopping, email, chats, and social networking. Web applications are becoming increasingly vulnerable to sophisticated threats and attack vectors. An outdated or insecure application can pose a serious security threat and, in turn, affect network security. A security professional must manage the security of the deployed applications and constantly monitor, patch, and upgrade all installed applications.

Lessons

At the end of this module, you will be able to:

Modern IT environments use server virtualization, network virtualization, storage virtualization, and desktop virtualization for fast provisioning of network environments and to keep pace with modern technologies. Virtualization has been changing security concepts in modern IT environments, as the various security challenges associated with virtualization are unique and distinct from those in conventional environments.

Cloud computing is an emerging technology that delivers computing services such as online business applications, online data storage, and webmail over the Internet. Cloud implementation enables a distributed workforce, reduces organization expenses, provides data security, etc. Because of these benefits, many business organizations have recently been migrating their data and infrastructure to the cloud. However, the cloud environment also poses many threats and risks to organizations. This module discusses virtualization concepts and technologies such as network virtualization, software-defined networks, and network function virtualization, as well as their security. It also dives into the various aspects of enterprise cloud security that are important for an organization to securely store or process data on the cloud. Furthermore, it discusses various elements of cloud security, such as user identity and access management (IAM), encryption and key management, application-level security, data storage security, monitoring, logging, and compliance to secure sensitive data on the cloud.

Lessons

At the end of this module, you will be able to:

This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on effectively securing their wireless network across the organization.

Lessons

At the end of this module, you will be able to:

With the introduction of mobile phones in enterprises, mobile device security has become more complex and challenging. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices of their workforce.

Lessons

At the end of this module, you will be able to:

The Internet of Things (IoT) has evolved from the convergence of wireless technology, micro-electromechanical systems, micro-services, and the Internet. It has introduced a range of new technologies with associated capabilities into our daily lives. As the IoT is an evolving technology, the immaturity of technologies and services provided by various vendors will have a broad impact on organizations, leading to complex security issues. IoT security is difficult to ensure as the devices use simple processors and stripped-down operating systems that may not support sophisticated security approaches. Organizations using these devices as part of their network need to protect both the devices and the information from attackers. As industrial companies are digitizing their industrial facilities to enhance operational efficiency through Internet connectivity and remote data access, they need to increasingly focus on cybersecurity to mitigate new threats and safety issues arising from the convergence of operational technology and information technology (OT–IT). Organizations also need to understand the landscape of cyber threats, industrial infrastructure, and business. Before implementing cybersecurity policies and controls, organizations need to identify and prioritize key risks and threats that will have the greatest impact on their business.

Lessons

At the end of this module, you will be able to:

With the increasing adoption of the Internet (World Wide Web) for business and personal communication, securing sensitive information such as credit card details, PINs, bank account numbers, and private messages is becoming increasingly important, albeit more difficult to achieve. Today’s information-based organizations extensively use the Internet for e-commerce, market research, customer support, and a variety of other activities, making Data security is critical to online business and communication privacy.

Cryptography and cryptographic (“crypto”) systems help in securing data against interception and compromise during online transmissions. This module provides a comprehensive understanding of different cryptosystems and algorithms, one-way hash functions, and public-key infrastructures (PKIs). It also covers various tools used to encrypt sensitive data.

Lessons

At the end of this module, you will be able to:

Data breaches can be expensive affair for organizations. Therefore, it is important to keep organization data safe from prying eyes of the bad actors. This module explores the importance of data, and various techniques to protect data.

Lessons

At the end of this module, you will be able to:

Most Internet users encounter certain failures or defects when using a network or while working on a system. These interruptions must be resolved as soon as possible to prevent any possible damage. Therefore, it is necessary to identify the problem first and fix it appropriately. Troubleshooting a network is more effective than attempting various random methods as it focuses on targeting individual network components and testing each component; this process can also be documented for future use. This module discusses various network issues and the techniques and tools used for network troubleshooting.

Lessons

At the end of this module, you will be able to:

Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.

Lessons

At the end of this module, you will be able to:

To enhance the security of an organization, extensive monitoring and analysis of network logs is critical. This helps identify and respond to threats quickly and protect the network assets from various attacks. Proper network log monitoring and analysis help reduce the frequency of attacks by proactively responding to threats.

Lessons

At the end of this module, you will be able to:

Information security incidents have skyrocketed in recent years, owing to the adoption of digital technologies and the innovation of new technologies. In this environment, organizations are at risk of suffering huge losses related to data, trust, profits, systems, devices, and human resources. Therefore, it is crucial for organizations to be ready to battle—if not completely prevent—these incidents. This module will help in understanding the complete incident handling and response process that organizations must institute to face, fight, and prevent different types of information-based attacks.

Lessons

At the end of this module, you will be able to:

Ever-increasing cybercrime and the rise in computing technology have made an efficient and effective information security program essential for organizations. With the rapid change in technology and threat landscape, it is important for organizations to incorporate ongoing and proactive computer investigations into their current information security programs to thwart and prevent evolving threats. To implement these programs, organizations need to adapt current information security best practices to include certain aspects of digital forensic readiness into their current cybersecurity programs. This module discusses the basic concepts of computer forensics.

Lessons

At the end of this module, you will be able to:

When threatened by a disruptive event, organizations should be capable of minimizing its impact, ensuring business continuity, and accelerating the disaster recovery process. As key personnel of an organization, security professionals should be well-acquainted with their organization’s business continuity and disaster recovery plans to be able to restore business functions following a disaster.

Lessons

At the end of this module, you will be able to:

This module introduces you to risk management concepts. The module presents a brief discussion on how proper and systematic risk management helps organizations anticipate and manage risks to an acceptable level. This module covers various phases involved in the implementation and execution of an organization’s risk management program.

Lessons

At the end of this module, you will be able to:

Requirements

Material Included

Course Brochure

Price:

$

Code:

CCT

Duration:

Days

Location:

Virtual Classroom

Schedule:

Coming Soon

Send us your question now

You can reach us through our contact form, by email, or by phone. We will get back to you within 1 business day.

Submit your question