Certified Cybersecurity Technician (C|CT) Program
Hands-on training for entry-level
cybersecurity professionals
- Course Overview
Your First Step into the World of Cybersecurity
Are you ready to defend today’s digital world? The Certified Cybersecurity Technician (C|CT) program arms you with essential, real-world skills needed to secure critical systems and networks. You'll dive into network defense strategies, explore the mindset of hackers in ethical hacking, and master security operations to handle incidents swiftly. Through hands-on labs that mimic real cyber attacks, this course transforms beginners into professionals who can tackle real threats head-on. Whether you’re a career changer or just starting out, C|CT offers practical training designed to propel you forward. With industry-leading guidance, you'll gain the confidence and skills to pursue roles like SOC Analyst or Cybersecurity Technician. Take control of your future—because the digital world needs defenders like you.
- Key Learning Areas
Hands-On Training That Prepares You for the Real World
The Certified Cybersecurity Technician (C|CT) program is built around real-world challenges. You won’t just read about cybersecurity; you’ll get your hands dirty with immersive, practical exercises.
Network Defense
Ethical Hacking
Security Operations
Risk Management
- Why Choose the C|CT Certification?
Cybersecurity is evolving fast, and you need more than theory to keep up. The Certified Cybersecurity Technician (C|CT) program goes beyond the basics, offering real-world experience that prepares you for the industry.
Real-World Labs
Hands-on exercises simulate actual cyber attacks and defenses. ICON: “A lab icon or computer screen.
Career Ready
Gain practical skills employers are actively looking for.
Global Recognition
Earn a certification trusted by cybersecurity professionals worldwide.
Expert Guidance
Learn from experienced professionals who know the field inside out.
- What is Unique About the C|CT Program?
Customizable Network Zones
Flexible network ranges where students are required to test different network segments with various levels of complexity to develop the skills necessary to tackle different types of real-life network configurations.
Hands-on Labs
Includes 100 labs and over. 40 Hour-course. Live Cyber Range simulations. Simulate real attacks.
Global Recognition
Recognized and endorsed by the US DoD, ANAB (National Accreditation board), ACA, NICE, American Council on Education and more.
Live Cyber Range
In the Cyber Range you will encounter real life penetration testing complexities such as multiple layers of network segmentation. methodology based penetration testing program.
Career Growth
One of the most sought after certifications for cybersecurity career hopefuls and your ticket to high paying Red team jobs.
- Career Opportunities
Start Building Your Future in Cybersecurity
With the C|CT Certification, you’ll be ready for key roles in cybersecurity, whether you’re stepping into the field or advancing your career. Employers are actively seeking professionals with hands-on skills to safeguard their systems.
- Popular Roles After Certification
SOC Analyst
respond to cyber threats.
Cybersecurity Technician
cybersecurity measures
Security Operations Specialist
security protocols and defenses.
Here’s a list of some of the topics you will learn in the topics:
● Key issues plaguing the cybersecurity industry (information security and network security) ● Information security threats, vulnerabilities, and attacks ● Different types of malware ● Network security fundamentals ● Identification, authentication, and authorization concepts ● Network security controls: ○ Administrative controls (frameworks, laws, acts, governance, compliance) ○ Physical controls (physical security, workplace, and environmental security) ○ Technical controls (firewall, VPN, SIEM, NAC, anti-malware tools, etc.) ● Network security assessment techniques and tools (threat hunting, vulnerability assessment, ethical hacking, etc.) ● Application security design and testing techniques ● Fundamentals of virtualization, cloud computing, and cloud security ● Wireless network fundamentals, encryption, and security measures ● Fundamentals of mobile, IoT, and OT device security ● Cryptography and public key infrastructure concepts ● Data security controls, data backup, and data loss prevention techniques ● Network troubleshooting, traffic/log monitoring, and suspicious traffic analysis ● Incident handling and response process ● Computer forensics fundamentals, digital evidence, and investigation phases. This comprehensive list covers essential cybersecurity skills, preparing candidates for real-world challenges.
|
Course Outline:
● Module 01: Information Security Threats and Vulnerabilities ● Module 02: Information Security Attacks ● Module 03: Network Security Fundamentals ● Module 04: Identification, Authentication, and Authorization ● Module 05: Network Security Controls – Administrative Controls ● Module 06: Network Security Controls – Physical Controls ● Module 07: Network Security Controls – Technical Controls ● Module 08: Network Security Assessment Techniques and Tools ● Module 09: Application Security ● Module 10: Virtualization and Cloud Computing ● Module 11: Wireless Network Security ● Module 12: Mobile Device Security ● Module 13: IoT and OT Security ● Module 14: Cryptography ● Module 15: Data Security ● Module 16: Network Troubleshooting ● Module 17: Network Traffic Monitoring ● Module 18: Network Logs Monitoring and Analysis ● Module 19: Incident Response ● Module 20: Computer Forensics ● Module 21: Business Continuity and Disaster Recovery ● Module 22: Risk Management |
- Module 01: Information Security Threats and Vulnerabilities
- Module 02: Information Security Attacks
- Module 03: Network Security Fundamentals
- Module 04: Identification, Authentication, and Authorization
- Module 05: Network Security Controls – Administrative Controls
- Module 06: Network Security Controls – Physical Controls
- Module 07: Network Security Controls – Technical Controls
- Module 08: Network Security Assessment Techniques and Tools
- Module 09: Application Security
- Module 10: Virtualization and Cloud Computing
- Module 11: Wireless Network Security
- Module 12: Mobile Device Security
- Module 13: IoT and OT Security
- Module 14: Cryptography
- Module 15: Data Security
- Module 16: Network Troubleshooting
- Module 17: Network Traffic Monitoring
- Module 18: Network Logs Monitoring and Analysis
- Module 19: Incident Response
- Module 20: Computer Forensics
- Module 21: Business Continuity and Disaster Recovery
- Module 22: Risk Management
Exam Title: Certified Cybersecurity Technician
Exam Code: 212-82
Test Format: Multiple Choice
Number of Questions: 60
Duration: 3 hours
Exam Availability Locations: ECC Exam Portal
Languages: English
Test Format: Multiple Choice and Real-Life Hands-on Practical Exam
Passing Score: 60% to 85%
Exam Mode: Remote Proctoring Services
Blueprint: (Clickable link, not visible in the image)
Course Title: Certified Cybersecurity Technician (CCT)
Training Duration: 5 Days
Delivery Mode: Instructor-Led Training (ILT), Week (Synchronous Online Learning), iLearn (Asynchronous Online Learning)
- Get Started Today
Your Path to Cybersecurity Begins Today!
Don’t wait—cybersecurity professionals are in high demand, and the Certified Cybersecurity Technician (C|CT) certification is your ticket to a thriving career. Whether you’re new to the field or looking to sharpen your skills, this is the perfect opportunity to step into a high-growth industry.