Certified Cybersecurity Technician (Including Exam Voucher)

CH-CCT

Type

Virtual

Orange and black virtual icon

Classroom ILT

Orange and black virtual icon

Skill Level

Introduction

Available dates

Learning Path

Cybersecurity
Orange and black technology icon

Virtual

Duration

5 Days
Black and orange duration icon

1 Day

TYPE

Virtual

Lecturer teaching class icon

Classroom ILT

Lecturer teaching class icon

LEARNING PATH

Cybersecurity
Orange and black technology icon

SKILL LEVEL

Introduction

DURATION

5 Days
Black and orange duration icon

AVAILABLE DATES

Available on request.

For more information click on button below

Introduction

EC Council’s Certified Cybersecurity Technician (CCT) certification goes beyond teaching fundamental cybersecurity concepts by validating course participants’ IT and cybersecurity skills through extensive hands-on practice and assessment. The knowledge and skills gained through the CCT can create pathways for further specialization in many cybersecurity domains, including ethical hacking, penetration testing, digital forensics, and application security.

 

With the CCT, EC-Council aims to equip entry level cybersecurity professionals with the core technical skills they need to pursue and advance in careers as cybersecurity analysts, consultants, engineers, IT administrators, and more. The CCT creates a foundation that enables individuals to grow their skills in specialized domains like penetration testing, security consulting, auditing, and system and network administration.

 

EC-Council’s CCT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, CCT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.

 

Audience profile

  • IT networking specialist
  • Cybersecurity technician
  • IT manager
  • Network administrator
  • Network engineer
  • Security operations centre (SOC) analyst

 

Pre-requisites

The CCT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The knowledge and skills that a learner must have before attending this course is as follows:

  • Early-career IT professionals, IT managers, career changers, and career advancers
  • Students and recent graduates

 

Course objectives

Upon completing this course, the learner will have the following knowledge and skills:

  • Key concepts in cybersecurity, including information security and network security
  • Information security threats, vulnerabilities, and attacks
  • The diverse types of malware Identification, authentication, and authorization
  • Network security controls:
  • Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)
  • Physical controls (physical and workplace security policies, environmental controls)
  • Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behaviour analytics; network access control; unified threat management; security information and event management; security orchestration, automation, and response; load balancers; anti-malware
  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration, and asset management)
  • Application security design and testing techniques
  • Fundamentals of virtualization, cloud computing, and cloud security
  • Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures
  • Cryptography and public-key infrastructure
  • Data security controls, data backup and retention methods, and data loss prevention techniques
  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
  • The incident handling and response process
  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
  • Concepts in business continuity and disaster recovery
  • Risk management concepts, phases, and frameworks

EC-Council Overview

To beat a hacker, you need to think like one…

Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.

Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.

Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.

These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.