EC-Council

Certifications path

C|CT (Certified Cybersecurity Technician by EC-Council)

EC-Council’s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs.

  • Key concepts in cybersecurity, including information security and network security

  • Information security threats, vulnerabilities, and attacks

  • The different types of malware Identification, authentication, and authorization

  • Network security controls

    • Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)

    • Physical controls (physical and workplace security policies, environmental controls)

    • Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behavior analytics;network access control; unified threat management; security information and event management; security orchestration, automation, and response; load baancers; anti-malware

  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)

  • Application security design and testing techniques

  • Fundamentals of virtualization, cloud computing, and cloud security

  • Wireless network fundamentals, wireless encryption, and related security measures

  • Fundamentals of mobile, IoT, and OT devices and related security measures

  • Cryptography and public-key infrastructure

  • Data security controls, data backup and retention methods, and data loss prevention techniques

  • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic

  • The incident handling and response process

  • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation

  • Concepts in business continuity and disaster recovery

  • Risk management concepts, phases, and frameworks

Ethical Hacking Essentials (EHE)

  • Fundamentals of information security and ethical hacking

  • Information security threats and vulnerabilities, types of malwares, and vulnerability assessments

  • Password cracking techniques, tools, and countermeasures

  • Social engineering concepts, its phases, techniques, and countermeasures

  • Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures

  • Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures

  • Wireless encryption, attacks, and countermeasures

  • Mobile, IoT, and OT attacks, and countermeasures

  • Cloud computing threats and countermeasures

  • Penetration testing fundamentals, its benefits, strategies, and phases

Network Defense Essentials(NDE)

  • Fundamental concepts of network security

  • Identification, authentication, and authorization

  • Administrative network defense controls

  • Physical network defense controls

  • Technical network defense controls

  • Virtualization and cloud computing concepts and best practices

  • Wireless network fundamentals, types of wireless encryption, and security measures

  • Mobile device security

  • IoT device security

  • Cryptography techniques, cryptographic algorithms, and Public Key Infrastructure (PKI)

  • Data security concepts, data encryption, and data loss prevention

  • Network traffic monitoring

Digital Forensics Essentials (DFE)

  • Fundamental concepts of computer forensics

  • Computer forensics investigation process and its phases

  • Types of disk drives, their characteristics, logical structure, and various OS booting processes

  • Data acquisition concepts, types, format, and methodology

  • Anti-forensics techniques and countermeasures

  • Windows, Linux, and MAC forensics

  • Network forensics fundamentals, event correlation, and network traffic investigation

  • Investigating web and email attacks

  • Dark web and TOR browser forensics

  • Malware forensics

Python Hacking course

  • Introduction and setup

  • Port and vulnerability scanning

  • SSH and FTP attacks

  • Password cracking

  • Sniffers, flooders and spoofers

  • DNS spoofing

  • Network analysis

  • Coding a multi-functioning reverse shell

  • Keyloggers

  • Command and control centre

  • Website penetration testing

Pentesting and Privilege Escalation course

Mobile Ethical Hacking course

Last updated