Certified Cybersecurity Technician (CCT)

The Certified Cybersecurity Technician (CCT) is an entry-level certification from EC-Council, the creators of the renowned Certified Ethical Hacker (CEH) program. Designed to develop foundational skills across multiple cybersecurity domains, CCT provides in-depth technical knowledge backed by 85 hands-on labs.
  • Flexible learning options
  • Job-ready skills for various cybersecurity roles
  • Certification of core technical competencies for IT and cybersecurity technicians
Whether you’re starting your career or strengthening your technical foundation, the CCT program prepares you to meet real-world cybersecurity challenges with confidence.
No distractions. Just you!

Course Description

Key Takeaways

Information Security Fundamentals and Ethical Hacking

  • Key issues plaguing cyber security
  • Information security threats, vulnerabilities, and attacks
  • Different types of malware
  • Identification, authentication, and authorization concepts
  • Cryptography and public key infrastructure concepts

Network Security

  • Network Security Fundamentals
  • Network Security Controls Read more.
  • Wireless network fundamentals, wireless encryption, and security measures
  • Fundamentals of virtualization, cloud computing, and cloud security

Application and Device Security

  • Application security design and testing techniques
  • Fundamentals of mobile, loT, and OT devices and their security measures

Incident Handling and Response

  • Incident handling and response process
  • Computer forensics fundaments, digital evidence, and forensic investigation phases

Monitoring, Assessment, and Troubleshooting

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
  • Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic

Risk Management and Continuity Planning

  • Data security controls, data backup and retention methods, and data loss prevention techniques
  • Risk management concepts, phases, and frameworks
  • Business continuity (BC) and disaster recovery (DR) concepts
Who should attend
  • High School Students
  • College University Students
  • Working Professionals
  • IT Professional
Course Outline
  • Training Days: 5 days
  • Module 01: Information Security Threats and Vulnerabilities
  • Module 02: Information Security Attacks
  • Module 03: Network Security Fundamentals
  • Module 04: Identification, Authentication, and Authorization
  • Module 05: Network Security Controls - Administrative Controls
  • Module 06: Network Security Controls - Physical Controls
  • Module 07: Network Security Controls - Technical Controls
  • Module 08: Network Security Assessment Techniques and Tools
  • Module 09: Application Security
  • Module 10: Virtualization and Cloud Computing
  • Module 11: Wireless Network Security
  • Module 12: Mobile Device Security
  • Module 13: loT and OT Security
  • Module 14: Cryptography
  • Module 15: Data Security
  • Module 16: Network Troubleshooting
  • Module 17: Network Traffic Monitoring
  • Module 18: Network Logs Monitoring and Analysis
  • Module 19: Incident Response
  • Module 20: Computer Forensics
  • Module 21: Business Continuity and Disaster Recovery
  • Module 22: Risk Management
Exam Details

Need Customized Curriculum?

GET A FREE DEMO CLASS

Choose Your Preferred Learning Mode

One-To-One Training

Personalized Schedule one-on-one Expert Guidance Private Session – Just You & the Instructor Guaranteed-To-Run Tailored for Your Success

ONLINE TRAINING

Learn Anytime, Anywhere Self-Paced & Interactive Budget-Friendly, High-Impact Smart Learning for Smart Professionals

CORPORATE TRAINING

Available Onsite / Online Team-Based Learning, Your Way Tailored for Business Goals Training That Grows With Your Team On-Demand Expert Instructors

Can’t find the right Learning Mode?

Our instructors

MOHAMMED GUFRAN

17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

MOHAMMED GUFRAN

17 years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

AKMAL YAZDANI

18+ years of Experience
Azure & AWS services |Managing and Implementing Windows servers

AKMAL YAZDANI

18+ years of Experience
Azure & AWS services |Managing and Implementing Windows servers

MUHAMMAD MUSAB

4+ Years of Experience
Cisco Technologies | Cisco and HPE ARUBA Technologies | Routing and Switching

MUHAMMAD MUSAB

4+ Years of Experience
Cisco Technologies | Cisco and HPE ARUBA Technologies | Routing and Switching

RANIA GABRIEL GEORGE HAKIM

25+ years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

RANIA GABRIEL GEORGE HAKIM

25+ years of Experience
Enterprise Networking | Network Security | Software Defined Networking & Automation

MOHD FARAZ HARMIS

25+ years of Experience
Managing and Implementing Microsoft Azure cloud | Active Directory

MOHD FARAZ HARMIS

25+ years of Experience
Managing and Implementing Microsoft Azure cloud | Active Directory

SHAHEEN AKHTAR

17 years of Experience
TCP | and UDP protocols, along | with expertise in firewalls such as Palo Alto

SHAHEEN AKHTAR

17 years of Experience
TCP | and UDP protocols, along | with expertise in firewalls such as Palo Alto

Here's What People Are Saying About Cybersec Trainings

Emanuel Paun

Mohammad was an amazing professor. I do not have a strong networking background and Mohammad was very patient in teaching me the basics in topics like wireless. The way he taught (hands on/labs) really helped solidify everything we learned through the 5 days of classes. I have nothing but positive feedback for the way he taught these course and his personality was amazing. 10/10 professor.

Alberto Feoli

Mohammed did it very well and way he explains concepts very good! Thanks for all your time and effort to help us understand.

Agnes Audige

Mohammed was able to present the class with real-world examples and kept me constantly engaged.

Shaun Alli

Pleasure to learn from Mohammed. The information was provided in a clear and direct fashion. Lots of bonus relevant information provided to help me with my goal. Thanks

Jerry Glass

Mohammed went the extra mile to clarify issues and make the labs more useful.

Greg Retallack

Musab did a great job and was pleasant to work with.

Why Network Binary Trainings?

Expertise and Reputation

Comprehensive Training Programs

Industry-Relevant Curriculum

Certification and Career Advancement

Certified & Experienced Instructors

FAQs

Dear Learner

Take a step closer to grow and glow in your career.

loader-infosectrain

Connect with Us

Dear Learner

Take a step closer to grow and glow in your career.

loader-infosectrain

Connect with Us

UP TO 20% OFF On Courses!