CCT - Certified Cybersecurity Technician

Price included

790 € netto E-learning

Method

E-learning

Training with EC-Council training materials

Authorized manufacturer's examination

Contact with the trainer after the training

-

Exam voucher

Lunch and coffee breaks

-

ATTENTION!

The training takes place on a BYOL (Bring Your Own Laptop) basis. This means that you must bring your own laptop to the training or inform us if you do not have one.

Course description


CT offers a balanced approach to cybersecurity training, combining multi-domain skill-building with experiential learning.

C|CT is the only cybersecurity program that provides foundational, multi-domain skills necessary to start a career in cybersecurity. C|CT includes 85 hands-on labs (3 times more than most entry-level certifications), ensuring hands-on skill development.

Skills gained

  • Information Security Fundamentals and Ethical Hacking
    • Key issues plaguing cyber security
    • Information security threats, vulnerabilities, and attacks
    • Different types of malware
    • Identification, authentication, and authorization concepts
    • Cryptography and public key infrastructure concepts
  • Application and Device Security
    • Application security design and testing techniques
    • Fundamentals of mobile, IoT, and OT devices and their security measures
  • Monitoring, Assessment, and Troubleshooting
    • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
    • Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
  • Network Security
    • Network Security Fundamentals
    • Network Security Controls
    • Wireless network fundamentals, wireless encryption, and security measures
    • Fundamentals of virtualization, cloud computing, and cloud security
  • Incident Handling and Response
    • Incident handling and response process
    • Computer forensics fundaments, digital evidence, and forensic investigation phases
  • Risk Management and Continuity Planning
    • Data security controls, data backup and retention methods, and data loss prevention techniques
    • Risk management concepts, phases, and frameworks
    • Business continuity (BC) and disaster recovery (DR) concepts

Course outline

  • Module 01: Information Security Threats and Vulnarabilities
  • Module 02: Information Security Attacks
  • Module 03: Network Security Fundamentals
  • Module 04: Identification, Authentication, and Authorization
  • Module 05: Network Security Controls – Administrative Controls
  • Module 06: Network Security Controls – Physical Controls
  • Module 07: Network Security Controls – Technical Controls
  • Module 08: Network Security Assessment Techniques and Tools
  • Module 09: Application Security
  • Module 10: Virtualization and Cloud Computing
  • Module 11: Wireless Network Security
  • Module 12: Mobile Device Security
  • Module 13: IoT and OT Security
  • Module 14: Cryptography
  • Module 15: Data Security
  • Module 16: Network Troubleshooting
  • Module 17: Network Traffic Monitoring
  • Module 18: Network Logs Monitoring and Analysis
  • Module 19: Incident Response
  • Module 20: Computer Forensics
  • Module 21: Business Continuity and Disaster Recoverys
  • Module 22: Risk Management

NÄCHSTMÖGLICHE TERMINE:

Rufen Sie uns an: +48 800 080 322

Hast du Fragen?
Benötigst du zusätzliche Informationen
Möchtest du einen Platz vorreservieren?

Rufen Sie uns an!
+48 32 259 11 80

AUTORISIERTE EC-COUNCIL SCHULUNG

Autoryzowane szkolenia EC-Council