Certified Cybersecurity Technician – Self-Paced (Incl. Exam Voucher)
Type
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Choose date
R8 900,00
Price excluding VAT
Introduction
EC Council’s Certified Cybersecurity Technician (CCT) certification goes beyond teaching fundamental cybersecurity concepts by validating course participants’ IT and cybersecurity skills through extensive hands-on practice and assessment. The knowledge and skills gained through the CCT can create pathways for further specialization in many cybersecurity domains, including ethical hacking, penetration testing, digital forensics, and application security.
With the CCT, EC-Council aims to equip entry level cybersecurity professionals with the core technical skills they need to pursue and advance in careers as cybersecurity analysts, consultants, engineers, IT administrators, and more. The CCT creates a foundation that enables individuals to grow their skills in specialized domains like penetration testing, security consulting, auditing, and system and network administration.
EC-Council’s CCT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, CCT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.
Audience profile
- IT networking specialist
- Cybersecurity technician
- IT manager
- Network administrator
- Network engineer
- Security operations centre (SOC) analyst
Pre-requisites
The CCT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The knowledge and skills that a learner must have before attending this course is as follows:
- Early-career IT professionals
- IT managers
- Career changers and career advancers
- Students and recent graduates
What is EC-Council iLearn?
iLearn is EC Council’s online, self-paced option which means that all of the same modules taught in the live course are recorded and presented in a streaming video format. A certification candidate can set their own learning pace by pausing the lectures and returning to their studies as their schedule permits! This all-inclusive training program provides the benefits of classroom training at your own pace.
What is included?
- Streaming video training modules – 1 year access
- Official EC-Council E-Courseware – 1 year access
- iLabs, Virtual Lab Platform – 6 months access
- One Certification exam voucher
- One Certificate of Attendance
How to Access the iLearn Portal?
All learning resources will be released directly to the delegate and a notification will be shared via email after your booking is complete. You may then login anytime by following this link.
Course objectives
Upon completing this course, the learner will have the following knowledge and skills:
- Key concepts in cybersecurity, including information security and network security
- Information security threats, vulnerabilities, and attacks
- The diverse types of malware Identification, authentication, and authorization
- Network security controls:
- Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)
- Physical controls (physical and workplace security policies, environmental controls)
- Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behaviour analytics; network access control; unified threat management; security information and event management; security orchestration, automation, and response; load balancers; anti-malware
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration, and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures
- Cryptography and public-key infrastructure
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
- The incident handling and response process
- Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
- Concepts in business continuity and disaster recovery
- Risk management concepts, phases, and frameworks
Course content
Module 01: Information Security Threats and Vulnerabilities | |
|
|
|
|
|
|
Module 02: Information Security Attacks | |
|
|
|
|
|
|
|
|
|
|
Module 03: Network Security Fundamentals | |
|
|
Module 04: Identification, Authentication, and Authorization | |
|
|
Module 05: Network Security Controls – Administrative Controls | |
|
|
|
|
Module 06: Network Security Controls – Physical Controls | |
|
|
|
|
Module 07: Network Security Controls – Technical Controls | |
|
|
|
|
|
|
|
|
|
|
Module 08: Network Security Assessment Techniques and Tools | |
|
|
|
|
|
|
Module 09: Application Security | |
|
|
|
|
Module 10: Virtualization and Cloud Computing | |
|
|
|
|
Module 11: Wireless Network Security | |
|
|
|
|
Module 12: Mobile Device Security | |
|
|
|
|
|
|
Module 13: IoT and OT Security | |
|
|
|
|
Module 14: Cryptography | |
|
|
|
|
|
|
Module 15: Data Security | |
|
|
|
|
Module 16: Network Troubleshooting | |
|
|
Module 17: Network Traffic Monitoring | |
|
|
|
|
Module 18: Network Logs Monitoring and Analysis | |
|
|
|
|
Module 19: Incident Response | |
|
|
Module 20: Computer Forensics | |
|
|
|
|
|
|
|
|
|
|
Module 21: Business Continuity and Disaster Recovery | |
|
|
|
|
|
|
|
|
|
Associated Certifications & Exam
Exam Details | CCT |
Exam Title | Certified Cybersecurity Technician |
Number of Questions/Practical Challenges | 60 Questions |
Test Duration | 3 Hours |
Test Format | Multiple choice and Real-life hands-on Practical exam |
Test Delivery | ECC EXAM portal |
Availability | ECC EXAM / Remote Proctoring Services |
Exam Prefix | 212-82 (ECC EXAM) |
Passing Score | 70% |
On successful completion of this course students will receive a Torque IT attendance certificate.
Note:
When you attend any authorised EC Council training course at Torque IT you will receive the associated examination voucher as part of your course material. Your certification examination voucher can be used to book and pay for your certification examination at an Authorised EC Council Testing Center (ETC) only. If you are not able to sit your certification examination at Torque IT, and you have no other ETC locally available, you do have the ability to convert your examination voucher into a Pearson VUE examination voucher (Remote Procuring Services), at an additional cost.
EC-Council Overview
To beat a hacker, you need to think like one…
Ethical Hacking is the process of proactively penetrating systems, to which one has official permission to do so, with a view to determining whether vulnerabilities exist and then to undertake the necessary preventive, corrective, and protective countermeasures before an actual compromise to the systems can occur.
Torque IT’s authorised EC-Council training, and associated certification, solutions empower you to identify vulnerabilities and to assess the security posture of target systems. EC-Council certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Torque IT being an EC-Council Accredited Training Center (ATC) has been the recipient of EC-Council’s most prestigious ATC of the year awards for 2016, 2014 and EC-Council’s Circle of Excellence Awards for 2015.
These achievements reflect our commitment to providing you with quality skills development, enablement, training, and certification solutions that demonstrate exceptional quality, depth and breadth.