Certified Cybersecurity Technician (CCT)
- Description
- Reviews
CERTIFIED CYBERSECURITY TECHNICIAN (CCT)
COURSE DESCRIPTION
EC-Council’s Certified Cybersecurity Technician (C|CT) is a comprehensive targeted course that involves a comprehensive training curriculum based on technology, security, and efficiency. It is designed to teach individuals the fundamentals of cyber security and provide them with the skills and knowledge required to become a cyber security technician. The course typically includes discussions of the basic concepts, theories and principles underpinning the information security and cyber security fields, as well as practical application of the various tools and methods used to assess, prevent and defend against cyber threats and attacks. The C|CT course teaches the participant how to identify and mitigate security risks, and implement security policies and procedures in both enterprises and home business networks. It covers compliance, audit as well as ethical considerations for professionals, including the legalities and regulations related to holding personal data, as well as the socio-cultural implications of managing data in a digital age. Upon completion, the student will be able to pass the CompTIA Security+ certification exam. This is a Rare Course and it can be take up to 3 weeks to arrange the training.
COURSE OUTLINE
- Module 01: Information Security Threats and Vulnerabilities
- Module 02: Information Security Attacks
- Module 03: Network Security Fundamentals
- Module 04: Identification, Authentication, and Authorization
- Module 05: Network Security Controls – Administrative Controls
- Module 06: Network Security Controls – Physical Controls
- Module 07: Network Security Controls – Technical Controls
- Module 08: Network Security Assessment Techniques and Tools
- Module 09: Application Security
- Module 10: Virtualization and Cloud Computing
- Module 11: Wireless Network Security
- Module 12: Mobile Device Security
- Module 13: IoT and OT Security
- Module 14: Cryptography
- Module 15: Data Security
- Module 16: Network Troubleshooting
- Module 17: Network Traffic Monitoring
- Module 18: Network Logs Monitoring and Analysis
- Module 19: Incident Response
- Module 20: Computer Forensics
- Module 21: Business Continuity and Disaster Recovery
- Module 22: Risk Management
For FULL COURSE OUTLINE, please contact us. Please contact us for the schedules and for booking a private class.
Popular Courses
Archive
Working hours
Monday | 9:00 am - 6.00 pm |
Tuesday | 9:00 am - 6.00 pm |
Wednesday | 9:00 am - 6.00 pm |
Thursday | 9:00 am - 6.00 pm |
Friday | 9:00 am - 6.00 pm |
Saturday | Closed |
Sunday | Closed |