CCT – Certified Cybersecurity Technician
This Course Includes
Videos & Lectures
Quizzes & Assessments
Mobile access
Certificate of Completion
Introduction
Audience Profile
Outcomes
- Understanding the key issues plaguing the network security world
- Key concepts in cybersecurity, including information security and network security
- Information security threats, vulnerabilities, and attacks
- The different types of malware
- Identification, authentication, and authorization
- Network security controls
- Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)
- Physical controls (physical and workplace security policies, environmental controls)
- Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behavior analytics; network access control; unified threat management; security information and event management; security orchestration, automation, and response; load balancers; anti-malware
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and related security measures
- Fundamentals of mobile, IoT, and OT devices and related security measures
- Cryptography and public-key infrastructure
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
- The incident handling and response process
- Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
- Concepts in business continuity and disaster recovery
- Risk management concepts, phases, and frameworks
Prerequisites
No specific prerequisites are required for the C|CT program.
- Knowledge and experience in IT and networking with some background in cybersecurity can be an advantage.
- Candidates should have knowledge of computers and computer networks before taking on the C|CT program, although core technologies are covered in curriculum.
Module 1: Information Security Threats and Vulnerabilities
Lessons
- Understanding the Threat and Threat Sources
- Understanding the Threat Actors/Agents
- Understanding Various Threat Vectors
- Overview of the Malware and the Common Techniques Attackers Use to Distribute Malware
- Understanding the Different Types of Malware
- Understanding the Vulnerability and Examples of Network Security Vulnerabilities
- Overview of the Common Areas of Vulnerability
- Understanding the Impact of Vulnerabilities Understanding the Risk of Vulnerabilities
- Understanding the Classification of Vulnerabilities
At the end of this module, you will be able to:
- Understand the threat and threat sources
- Describe the threat actors/agents
- Describe the threat vectors
- Understand the malware and the common techniques attackers use to distribute malware on the web
- Explain the different types of malware
- Understand the common areas of vulnerability
- Describe the impact of vulnerabilities
- Understand the risk of vulnerabilities
- Understand the classification of vulnerabilities
Module 2: Information Security Attacks
This module starts with an overview of information-security attacks. It provides insight into hacking methodologies and frameworks. Later, the module discusses various types of network-level, application-level, and wireless-network-specific attacks. The module ends with a brief discussion on the Internet of Things (IoT), operational technology (OT), cloud, and cryptographic attacks.
Lessons
- Understanding the motives, goals, and objectives of Information Security Attacks
- Overview of the classification of attacks, Understanding Hacking Methodologies and Frameworks
- Understanding the Network-level, Application-level, and OS-level Attacks
- Understanding Wireless Network-specific Attacks Understanding IoT, OT, Cloud, and Cryptographic Attacks
At the end of this module, you will be able to:
- Explain the motives, goals, and objectives of information security attacks
- Understand the classification of attacks
- Understand hacking methodologies and frameworks
- Describe network-level, application-level, and OS-level attacks
- Understand wireless network-specific attacks
- Understand IoT, OT, cloud, and cryptographic attacks
Module 3: Network Security Fundamentals
Lessons
- Understanding the Fundamentals of Information Security
- Overview of the National Institute of Standards and Technology (NIST) Cybersecurity Framework
- Understanding the Fundamentals of Network Security
- Understanding the Principles of Information Assurance (IA)
- Understanding the Different Types of Network Defense Approaches
- Understanding the Elements of Network Defense
At the end of this module, you will be able to:
- Understand the fundamentals of information security
- Understand the National Institute of Standards and Technology (NIST) cybersecurity framework
- Understand the fundamentals of network security
- Describe the principles of information assurance (IA)
- Understand the different types of network defense approaches
- Explain the elements of network defense
Module 4: Identification, Authentication, and Authorization
The most serious risk that organizations are facing today is unauthorized access to sensitive data. To control such data breaches, organizations require strong identification, authentication, and authorization mechanisms to effectively manage access to critical assets and sensitive data. This module provides an overview of various methods and techniques used for the identification, authentication, and authorization of users accessing critical assets and resources.
Lessons
- Understanding the Terminology, Principles, and Types of Access Control
- Overview of Identity and Access Management (IAM)
- Understanding the User Access Management
- Understanding the Different Types of Authentication
- Understanding the Different Types of Authorization
- Understanding the User Accounting
At the end of this module, you will be able to:
- Understand the terminology, principles, and types of access control
- Describe identity and access management (IAM)
- Understand user access management
- Explain the different types of authentication
- Explain the different types of authorization
- Understand user accounting
Module 5: Network Security Controls – Administrative Controls
Compliance, policies, and governance are integral to an information security program for any organization. An organization needs to comply with specific regulatory standards to run its businesses. At the same time, it must also have strong security policies and governance to fulfill regulatory standards. This module addresses this administrative aspect of an organization’s network security.
Lessons
- Understanding Various Regulatory Frameworks, Laws, and Acts
- Understanding Why Organizations Need Compliance
- Understanding How to Define, Implement, Manage, and Maintain an Information Security Governance Program
- Overview of Information Security Drivers
- Understanding How to Manage an Enterprise Information Security Compliance Program
- Understanding the Need for and Characteristics of Good Security Policy
- Understanding How to Design and Develop Security Policies
- Overview of Different Types of Security Policies
At the end of this module, you will be able to:
- Understand various regulatory frameworks, laws, and acts
- Understand why organizations need compliance
- Understand how to define, implement, manage, and maintain an information security governance program
- Explain information security drivers
- Understand how to manage an enterprise information security compliance program
- Describe the need for and characteristics of good security policy
- Explain how to design and develop security policies
- Understand the different types of security policies
- Understand the different types of security and awareness training
Module 6: Network Security Controls – Physical Controls
Physical security plays a crucial role in every organization. It entails the protection of critical information, network infrastructure, physical equipment and devices, facilities, personnel, etc. from environmental disasters, terrorism, vandalism, and theft. Physical security is becoming a challenging task with the increased usage of devices such as USB drives, laptops, smartphones, and tablets because malicious actors can easily gain physical access to such devices and steal sensitive data. This module explains the importance of physical security, various physical security controls, importance of workplace security, and various environmental controls.
Lessons
- Understanding the Importance of Physical Security
- Understanding the Physical Security Attack Vectors
- Understanding the Various Types of Physical Security Controls
- Understanding the Importance of Workplace Security
- Understanding the Various Environmental Controls
- Understanding the Physical Security Checklist
At the end of this module, you will be able to:
- Understand the importance of physical security
- Understand the physical security attack vectors
- Describe the various types of physical security controls
- Explain the importance of workplace security
- Understand the various environmental controls
- Understand the physical security checklist
Module 7: Network Security Controls – Technical Controls
The most important aspect of security controls is the protection of organizational assets such as people, property, and data. By establishing security controls, an organization can either reduce or completely mitigate risks to their assets. This module provides an overview of various technical controls that help organizations protect their private networks and IT assets.
Lessons
- Understanding Different Network Security Protocols
- Understanding Network Segmentation and its Types
- Understanding the Different Types of Firewalls and their Roles
- Understanding the Different Types of IDS/IPS and their Roles
- Overview of Different Types of Honeypots
- Understanding the Different Types of Proxy Servers and their Benefits
- Understanding the Fundamentals of Virtual Private Networks (VPNs) and their Importance in Network Security
- Understanding User Behavior Analytics (UBA), Network Access Control (NAC), and Unified Threat Management (UTM)
- Overview of Network Load Balancing and Antivirus/Anti-malware Software
- Overview of Security Incident and Event Management (SIEM) as well as Security Orchestration, Automation, and Response (SOAR)
At the end of this module, you will be able to:
- Explain the different network security protocols
- Understand network segmentation and its types
- Describe the different types of firewalls and their roles
- Describe the different types of IDS/IPS and their roles
- Explain the different types of honeypots
- Understand the different types of proxy servers and their benefits
- Understand the fundamentals of virtual private networks (VPNs) and their importance in network security
- Understand user behavior analytics (UBA), network access control (NAC), and unified threat management (UTM)
- Explain security incident and event management (SIEM) as well as security orchestration, automation, and response (SOAR)
- Understand network load balancing
- Apply various antivirus/anti-malware software
Module 8: Network Security Assessment Techniques and Tools
Network security assessment plays a vital role in safeguarding the networks, devices, and data
pertaining to an organization. To protect these assets from evolving cyberattacks, organizations require an understating of the current technical security posture of their network. Network security assessment helps organizations in identifying existing security flaws and possible security threats and risks to their IT assets. Additionally, it helps in improving the integrity and resilience of both internal and external networks.
Lessons
- Understanding Threat Hunting Concepts
- Understanding Cyber Threat Intelligence and Various Feeds and Sources of Threat Intelligence
- Understanding Vulnerability Assessment and Various Types of Vulnerability Assessment
- Understanding Ethical Hacking Concepts
- Understanding Penetration Testing and its Benefits
- Understanding the Importance of Asset Management and Configuration Management
At the end of this module, you will be able to:
- Understand threat hunting concepts
- Understand cyber threat intelligence and various feeds and sources of threat intelligence
- Understand vulnerability assessment and various types of vulnerability assessment
- Explain ethical hacking concepts
- Understand penetration testing and its benefits
- Understand the importance of asset management and configuration management
Module 9: Application Security
The evolution of the Internet and web technologies, combined with rapidly increasing Internet connectivity has led to the emergence of a new business landscape. Web applications are an integral component of online businesses. Everyone connected via the Internet is using various web applications for different purposes, including online shopping, email, chats, and social networking. Web applications are becoming increasingly vulnerable to sophisticated threats and attack vectors. An outdated or insecure application can pose a serious security threat and, in turn, affect network security. A security professional must manage the security of the deployed applications and constantly monitor, patch, and upgrade all installed applications.
Lessons
- Understanding Secure Application Design and Architecture
- Understanding Secure Coding Practices
- Overview of Software Security Standards, Models, and Frameworks
- Understanding the Secure Application Development, Deployment, and Automation
- Understanding Various Application Security Testing Techniques and Tools
At the end of this module, you will be able to:
- Understand secure application design and architecture
- Explain secure coding practices
- Describe software security standards, models, and frameworks
- Understand the secure application development, deployment, and automation
- Understand various application security testing techniques and tools
Module 10: Virtualization and Cloud Computing
Lessons
- Understanding Virtualization, its Components, and Virtualization Enablers
- Understanding OS Virtualization Security and Concerns
- Understanding the Best Practices for OS Virtualization Security
- Understanding Cloud Computing and its Benefits
- Overview of Different Types of Cloud Computing Services
- Overview of Cloud Deployment Models
- Understanding Importance of Cloud Security and its Best Practices
At the end of this module, you will be able to:
- Understand virtualization, its components, and virtualization enablers
- Understand OS virtualization security and concerns
- Understand the best practices for OS virtualization security
- Explain cloud computing and its benefits
- Understand different types of cloud computing services
- Explain cloud deployment models
- Understand importance of cloud security and its best practices
Module 11: Wireless Network Security
This module deals with network security for wireless networks in enterprises. Wireless networks are widely used across organizations today and are prone to various attacks. Therefore, organizations need to focus on effectively securing their wireless network across the organization.
Lessons
- Understanding the Wireless Terminology, Wireless Networks, and Wireless Standards
- Understanding the Wireless Network Topologies and Classification of Wireless Networks
- Understanding the Components of a Wireless Network
- Overview of Wireless Network Encryption Mechanisms
- Understanding the Different Types of Wireless Network Authentication Methods
- Understanding Wireless Network Security Measures and Wireless Security Tools
At the end of this module, you will be able to:
- Understand wireless terminology, wireless networks, and wireless standards
- Understand the wireless network topologies and classification of wireless networks
- Understand the components of a wireless network
- Explain the wireless network encryption mechanisms
- Understand the different types of wireless network authentication methods
- Explain wireless network security measures and wireless security tools
Module 12: Mobile Device Security
With the introduction of mobile phones in enterprises, mobile device security has become more complex and challenging. Therefore, it is important for organizations to address these security concerns to effectively manage the security of mobile devices of their workforce.
Lessons
- Understanding Various Mobile Device Connection Methods
- Understanding the Concepts of Mobile Device Management
- Understanding Common Mobile Usage Policies in Enterprises
- Understand the Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
- Understanding Enterprise-level Mobile Security Management Solutions
- Understanding General Security Guidelines and Best Practices for Mobile Platforms
At the end of this module, you will be able to:
- Understand various mobile device connection methods
- Understand the concepts of mobile device management
- Understand common mobile usage policies in enterprises
- Understand the security risks and guidelines associated with enterprise mobile usage policies
- Understand enterprise-level mobile security management solutions
- Explain general security guidelines and best practices for mobile platforms
Module 13: IoT and OT Security
The Internet of Things (IoT) has evolved from the convergence of wireless technology, micro-electromechanical systems, micro-services, and the Internet. It has introduced a range of new technologies with associated capabilities into our daily lives. As the IoT is an evolving technology, the immaturity of technologies and services provided by various vendors will have a broad impact on organizations, leading to complex security issues. IoT security is difficult to ensure as the devices use simple processors and stripped-down operating systems that may not support sophisticated security approaches. Organizations using these devices as part of their network need to protect both the devices and the information from attackers. As industrial companies are digitizing their industrial facilities to enhance operational efficiency through Internet connectivity and remote data access, they need to increasingly focus on cybersecurity to mitigate new threats and safety issues arising from the convergence of operational technology and information technology (OT–IT). Organizations also need to understand the landscape of cyber threats, industrial infrastructure, and business. Before implementing cybersecurity policies and controls, organizations need to identify and prioritize key risks and threats that will have the greatest impact on their business.
Lessons
- Understanding IoT and Why Organizations Opt for IoT-enabled Environments
- Overview of IoT Application Areas and IoT Devices
- Understanding the IoT Architecture and IoT Communication Models
- Understanding the Security in IoT-Enabled Environments
- Understanding OT and the Purdue Model Overview of the Components of an ICS
- Understanding the Security in OT-enabled Environments
- Explain the components of an ICS
- Understand security in OT-enabled environments
At the end of this module, you will be able to:
- Understand IoT and why organizations opt for IoT-enabled environments
- Describe IoT application areas and IoT devices
- Describe the IoT architecture and IoT communication models
- Understand security in IoT-enabled environments
- Understand OT and the Purdue model
Module 14: Cryptography
Lessons
- Understanding Cryptographic Techniques
- Understanding the Different Encryption Algorithms
- Understanding the Different Hashing Algorithms
- Overview of Different Cryptography Tools and Hash Calculators
- Understanding Public Key Infrastructure (PKI) and Certificate Management Concepts
- Understanding Various Applications of Cryptography
At the end of this module, you will be able to:
- Describe cryptographic techniques
- Understand the different encryption algorithms
- Understand the different hashing algorithms
- Use different cryptography tools and hash calculators
- Explain public key infrastructure (PKI) and certificate management concepts
- Understand various applications of cryptography
Module 15: Data Security
Data breaches can be expensive affair for organizations. Therefore, it is important to keep organization data safe from prying eyes of the bad actors. This module explores the importance of data, and various techniques to protect data.
Lessons
- Understanding Data Security and its Importance
- Understanding Different Data Security Technologies
- Understanding Various Data Security Controls
- Overview of Disk, File, and Removable-media Encryption Tools
- Understanding the Methods and Tools for Data Backup, Retention, and Destruction
- Understanding Data Loss Prevention (DLP) and DLP Solutions
At the end of this module, you will be able to:
- Understand data security and its importance
- Understand different data security technologies
- Explain various data security controls
- Use different disk, file, and removable-media encryption tools
- Understand methods and tools for data backup, retention, and destruction
- Understand data loss prevention (DLP) and DLP solutions
Module 16: Network Troubleshooting
Most Internet users encounter certain failures or defects when using a network or while working on a system. These interruptions must be resolved as soon as possible to prevent any possible damage. Therefore, it is necessary to identify the problem first and fix it appropriately. Troubleshooting a network is more effective than attempting various random methods as it focuses on targeting individual network components and testing each component; this process can also be documented for future use. This module discusses various network issues and the techniques and tools used for network troubleshooting.
Lessons
- Understanding the Importance of Network Troubleshooting
- Understanding Basic Network Issues
- Understanding How to Troubleshoot Network Issues
- Overview of Troubleshooting Network Issues using Various Tools and Utilities
At the end of this module, you will be able to:
- Understand the importance of network troubleshooting
- Understand basic network issues
- Explain how to troubleshoot network issues
- Use various tools and utilities to troubleshoot network issues
Module 17: Network Traffic Monitoring
Organizations need to perform network monitoring and analyze network traffic to identify suspicious activities across their networks. This module covers the concept of network traffic monitoring.
Lessons
- Understanding the Need for and Advantages of Network Traffic Monitoring
- Understanding the Network Traffic Signatures
- Understanding the Categories of Suspicious Traffic Signatures
- Overview of Attack Signature Analysis Techniques
- Understanding Network Monitoring for Suspicious Traffic
- Overview of Various Network Monitoring Tools
At the end of this module, you will be able to:
- Understand the need for and advantages of network traffic monitoring
- Understand the network traffic signatures
- Describe the categories of suspicious traffic signatures
- Explain the attack signature analysis techniques
- Understand network monitoring for suspicious traffic
- Understand the various network monitoring tools
Module 18: Network Logs Monitoring and Analysis
To enhance the security of an organization, extensive monitoring and analysis of network logs is critical. This helps identify and respond to threats quickly and protect the network assets from various attacks. Proper network log monitoring and analysis help reduce the frequency of attacks by proactively responding to threats.
Lessons
- Understanding the Concepts of Logging
- Understanding Log Monitoring and Analysis on Windows Systems
- Understanding Log Monitoring and Analysis on Linux Systems
- Overview of Various Log Management Tools
At the end of this module, you will be able to:
- Understand the concepts of logging
- Understand log monitoring and analysis on Windows systems
- Understand log monitoring and analysis on Linux systems
- Use various log management tools
Module 19: Incident Response
Information security incidents have skyrocketed in recent years, owing to the adoption of digital technologies and the innovation of new technologies. In this environment, organizations are at risk of suffering huge losses related to data, trust, profits, systems, devices, and human resources. Therefore, it is crucial for organizations to be ready to battle—if not completely prevent—these incidents. This module will help in understanding the complete incident handling and response process that organizations must institute to face, fight, and prevent different types of information-based attacks.
Lessons
- Understanding the Concepts of Incident Response
- Understanding the Role of the First Responder in Incident Response
- Understanding the Incident Handling and Response Process
- Overview of Various Phases Involved in Incident Handling and Response
At the end of this module, you will be able to:
- Define the concept of incident response
- Understand the role of the first responder in incident response
- Explain the incident handling and response process
- Understand various phases involved in incident handling and response
Module 20: Computer Forensics
Ever-increasing cybercrime and the rise in computing technology have made an efficient and effective information security program essential for organizations. With the rapid change in technology and threat landscape, it is important for organizations to incorporate ongoing and proactive computer investigations into their current information security programs to thwart and prevent evolving threats. To implement these programs, organizations need to adapt current information security best practices to include certain aspects of digital forensic readiness into their current cybersecurity programs. This module discusses the basic concepts of computer forensics.
Lessons
- Understanding the Essential Concepts of Computer Forensics
- Overview of Different Types, Characteristics, and Roles of Digital Evidence
- Understanding the Roles and Responsibilities of a Forensic Investigator
- Overview of the Forensic Investigation Process and its Phases
- Understanding Various Digital Evidence Sources that Support a Forensic Investigation
- Understanding How to Collect, Preserve, and Secure Digital Evidence
- Overview of Various Data Acquisition Methods
- Performing Evidence Analysis Using Various Forensic Analysis Tools
At the end of this module, you will be able to:
- Understand the essential concepts of computer forensics
- Understand the different types and roles of digital evidence
- Understand the roles and responsibilities of a forensic investigator
- Explain the forensic investigation process and its phases
- Understand various digital evidence sources that support a forensic investigation
- Understand how to collect, preserve, and secure digital evidence
- Describe various data acquisition methods
- Perform evidence analysis using various forensic analysis tools
Module 21: Business Continuity and Disaster Recovery
When threatened by a disruptive event, organizations should be capable of minimizing its impact, ensuring business continuity, and accelerating the disaster recovery process. As key personnel of an organization, security professionals should be well-acquainted with their organization’s business continuity and disaster recovery plans to be able to restore business functions following a disaster.
Lessons
- Understanding the Essential Concepts of Business Continuity (BC) and Disaster Recovery (DR)
- Overview of Activities Involved in BC and DR
- Understanding the Business Continuity Plan (BCP) and its Goals
- Understanding the Disaster Recovery Plan (DRP) and its Goals
At the end of this module, you will be able to:
- Understand the essential concepts of business continuity (BC) and disaster recovery (DR)
- Understand the activities involved in BC and DR
- Understand the BC plan (BCP) and its goals
- Understand the DR plan (DRP) and its goals
Module 22: Risk Management
This module introduces you to risk management concepts. The module presents a brief discussion on how proper and systematic risk management helps organizations anticipate and manage risks to an acceptable level. This module covers various phases involved in the implementation and execution of an organization’s risk management program.
Lessons
- Understanding the Concepts of Risk Management
- Understanding Different Types of Risks
- Overview of Various Risk Management Phases
- Understanding Various Risk Management Frameworks
At the end of this module, you will be able to:
- Understand the concepts of risk management
- Describe different types of risks
- Explain various risk management phases
- Understand various risk management frameworks

Requirements
- English Knowledge
- Understands Basics
Send us your question now
You can reach us through our contact form, by email, or by phone. We will get back to you within 1 business day.
Pro Trainers Hub empowers instructors with resources, support, and a platform to share knowledge.
Company Info
Courses
Contact Info
- No 15, Crestwood 1,Thalawatugoda 10116
- +94 77 276 6824
- info@protrainershub.com
© 2025 All Rights Reserved. | Reg : PV00328463