Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

EC-Council Certified Cybersecurity Technician (C|CT)

Course: 2035

• Duration: 5 days
• Exam Voucher: Yes
• Language: English
• Level: Foundation

The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to


address specifically the increasing need for cybersecurity technicians with strong foundational skills. The
C|CT Certification validates an individual’s fundamental cybersecurity skills across the domains of
network defense, ethical hacking, digital forensics, and security operations.

EC-Council Certified Cybersecurity Technician (C|CT) Delivery Methods


• In-Person
• Online

EC-Council Certified Cybersecurity Technician (C|CT) Course


Information

Explain key concepts in cybersecurity, including information security and network security Information
security threats, vulnerabilities, and attacks

Describe the different types of malware Identification, authentication, and authorization

Understand network security assessment techniques and tools (threat hunting, threat intelligence,
vulnerability assessment, ethical hacking, penetration testing, configuration, and asset management)

Explore the fundamentals of virtualization, cloud computing, and cloud security Wireless network
fundamentals, wireless encryption, and related security measures

Describe the fundamentals of mobile, IoT, and OT devices and related security measures

Investigate breaches using computer forensics and digital evidence

Continue learning and face new challenges with after-course one-on-one instructor coaching

EC-Council Certified Cybersecurity Technician (C|CT) Course Outline


Important Course and Certification Information Course Information

1 of 3
Recommended Experience

Knowledge and experience in IT and networking

Exam Information

• 60 Question, Multiple Choice, 3 Hour Duration, 70% Passing Score


• Exam Voucher included with the course

Training Topics
Information Security Threats and Vulnerabilities

Information Security Attacks

Network Security Fundamentals

Identification, Authentication, and Authorization

Network Security Controls: Administrative Controls

Network Security Controls: Physical Controls

Network Security Controls: Technical Controls

Network Security Assessment Techniques and Tools

Application Security

Virtualization and Cloud Computing

Wireless Network Security

Mobile Device Security

Internet of Things (IoT) and Operational Technology (OT) Security

Cryptography

Data Security

Network Troubleshooting

Network Traffic Monitoring

Network Log Monitoring and Analysis

Incident Response

Computer Forensics

2 of 3
Business Continuity and Disaster Recovery

Risk Management

3 of 3

You might also like