EC-Council

C|CT (Certified Cybersecurity Technician by EC-Council)

EC-Councilβs C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.
Key concepts in cybersecurity, including information security and network security
Information security threats, vulnerabilities, and attacks
The different types of malware Identification, authentication, and authorization
Network security controls
Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)
Physical controls (physical and workplace security policies, environmental controls)
Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behavior analytics;network access control; unified threat management; security information and event management; security orchestration, automation, and response; load baancers; anti-malware
Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
Application security design and testing techniques
Fundamentals of virtualization, cloud computing, and cloud security
Wireless network fundamentals, wireless encryption, and related security measures
Fundamentals of mobile, IoT, and OT devices and related security measures
Cryptography and public-key infrastructure
Data security controls, data backup and retention methods, and data loss prevention techniques
Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
The incident handling and response process
Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
Concepts in business continuity and disaster recovery
Risk management concepts, phases, and frameworks
Ethical Hacking Essentials (EHE)
Fundamentals of information security and ethical hacking
Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
Password cracking techniques, tools, and countermeasures
Social engineering concepts, its phases, techniques, and countermeasures
Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
Wireless encryption, attacks, and countermeasures
Mobile, IoT, and OT attacks, and countermeasures
Cloud computing threats and countermeasures
Penetration testing fundamentals, its benefits, strategies, and phases
Network Defense Essentials(NDE)
Fundamental concepts of network security
Identification, authentication, and authorization
Administrative network defense controls
Physical network defense controls
Technical network defense controls
Virtualization and cloud computing concepts and best practices
Wireless network fundamentals, types of wireless encryption, and security measures
Mobile device security
IoT device security
Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)
Data security concepts, data encryption, and data loss prevention
Network traffic monitoring
Digital Forensics Essentials (DFE)
Fundamental concepts of computer forensics
Computer forensics investigation process and its phases
Types of disk drives, their characteristics, logical structure, and various OS booting processes
Data acquisition concepts, types, format, and methodology
Anti-forensics techniques and countermeasures
Windows, Linux, and MAC forensics
Network forensics fundamentals, event correlation, and network traffic investigation
Investigating web and email attacks
Dark web and TOR browser forensics
Malware forensics
Python Hacking course
Introduction and setup
Port and vulnerability scanning
SSH and FTP attacks
Password cracking
Sniffers, flooders and spoofers
DNS spoofing
Network analysis
Coding a multi-functioning reverse shell
Keyloggers
Command and control centre
Website penetration testing
Pentesting and Privilege Escalation course
Mobile Ethical Hacking course
Last updated