Certified Cybersecurity Technician (CCT)
The Certified Cybersecurity Technician (CCT) is an entry-level certification from EC-Council, the creators of the renowned Certified Ethical Hacker (CEH) program. Designed to develop foundational skills across multiple cybersecurity domains, CCT provides in-depth technical knowledge backed by 85 hands-on labs.
- Flexible learning options
- Job-ready skills for various cybersecurity roles
- Certification of core technical competencies for IT and cybersecurity technicians
No distractions. Just you!
Why Choose 1-on-1 Training
- Focused attention and face to face instructor support
- Custom Calendar & Training Schedule
- Highly interactive environment
- Learn via labs, mock tests, case studies, Q&A sessions
- On-spot doubt clearing opportunity
- Interview Support and Free Career Guidance
Course Description
Key Takeaways
Information Security Fundamentals and Ethical Hacking
- Key issues plaguing cyber security
- Information security threats, vulnerabilities, and attacks
- Different types of malware
- Identification, authentication, and authorization concepts
- Cryptography and public key infrastructure concepts
Network Security
- Network Security Fundamentals
- Network Security Controls Read more.
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of virtualization, cloud computing, and cloud security
Application and Device Security
- Application security design and testing techniques
- Fundamentals of mobile, loT, and OT devices and their security measures
Incident Handling and Response
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
Monitoring, Assessment, and Troubleshooting
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
- Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
Risk Management and Continuity Planning
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Risk management concepts, phases, and frameworks
- Business continuity (BC) and disaster recovery (DR) concepts
Who should attend
- High School Students
- College University Students
- Working Professionals
- IT Professional
Course Outline
- Training Days: 5 days
- Module 01: Information Security Threats and Vulnerabilities
- Module 02: Information Security Attacks
- Module 03: Network Security Fundamentals
- Module 04: Identification, Authentication, and Authorization
- Module 05: Network Security Controls - Administrative Controls
- Module 06: Network Security Controls - Physical Controls
- Module 07: Network Security Controls - Technical Controls
- Module 08: Network Security Assessment Techniques and Tools
- Module 09: Application Security
- Module 10: Virtualization and Cloud Computing
- Module 11: Wireless Network Security
- Module 12: Mobile Device Security
- Module 13: loT and OT Security
- Module 14: Cryptography
- Module 15: Data Security
- Module 16: Network Troubleshooting
- Module 17: Network Traffic Monitoring
- Module 18: Network Logs Monitoring and Analysis
- Module 19: Incident Response
- Module 20: Computer Forensics
- Module 21: Business Continuity and Disaster Recovery
- Module 22: Risk Management
Exam Details
- Exam Name: Certified Cybersecurity Technician
- Exam Code: 212-82
- No of Questions: 60
- Duration: 3 Hours
- Test Format: Multiple-Choice Questions and Hands-on practical exam
- Exam Blueprint: https://www.eccouncil.org/wp-content/uploads/2024/08/CCTv1-Exam-Blueprint.pdf
- Languages: English
Need Customized Curriculum?
GET A FREE DEMO CLASS
Choose Your Preferred Learning Mode
One-To-One Training
Personalized Schedule one-on-one Expert Guidance Private Session – Just You & the Instructor Guaranteed-To-Run Tailored for Your Success
ONLINE TRAINING
Learn Anytime, Anywhere Self-Paced & Interactive Budget-Friendly, High-Impact Smart Learning for Smart Professionals
Preferred
CORPORATE TRAINING
Available Onsite / Online Team-Based Learning, Your Way Tailored for Business Goals Training That Grows With Your Team On-Demand Expert Instructors
For Business
Can’t find the right Learning Mode?
Our instructors
MOHAMMED GUFRAN
17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation
MOHAMMED GUFRAN
17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation
AKMAL YAZDANI
18+ years of Experience
Azure & AWS services |Managing and Implementing Windows servers
AKMAL YAZDANI
18+ years of Experience
Azure & AWS services |Managing and Implementing Windows servers
MUHAMMAD MUSAB
4+ Years of Experience
Cisco Technologies | Cisco and HPE ARUBA Technologies | Routing and Switching
MUHAMMAD MUSAB
4+ Years of Experience
Cisco Technologies | Cisco and HPE ARUBA Technologies | Routing and Switching
RANIA GABRIEL GEORGE HAKIM
25+ years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation
RANIA GABRIEL GEORGE HAKIM
25+ years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation
MOHD FARAZ HARMIS
25+ years of Experience
Managing and Implementing Microsoft Azure cloud | Active Directory
MOHD FARAZ HARMIS
25+ years of Experience
Managing and Implementing Microsoft Azure cloud | Active Directory
SHAHEEN AKHTAR
17 years of Experience
TCP | and UDP protocols, along | with expertise in firewalls such as Palo Alto
SHAHEEN AKHTAR
17 years of Experience
TCP | and UDP protocols, along | with expertise in firewalls such as Palo Alto
Here's What People Are Saying About Cybersec Trainings
Emanuel Paun
Mohammad was an amazing professor. I do not have a strong networking background and Mohammad was very patient in teaching me the basics in topics like wireless. The way he taught (hands on/labs) really helped solidify everything we learned through the 5 days of classes. I have nothing but positive feedback for the way he taught these course and his personality was amazing. 10/10 professor.
Alberto Feoli
Mohammed did it very well and way he explains concepts very good! Thanks for all your time and effort to help us understand.
Agnes Audige
Mohammed was able to present the class with real-world examples and kept me constantly engaged.
Shaun Alli
Pleasure to learn from Mohammed. The information was provided in a clear and direct fashion. Lots of bonus relevant information provided to help me with my goal. Thanks
Jerry Glass
Mohammed went the extra mile to clarify issues and make the labs more useful.
Greg Retallack
Musab did a great job and was pleasant to work with.