Certified CyberSecurity
Technician
Overview
Course Objective
At the end of the course, students will be able to:
• Key issues plaguing the cybersecurity industry (information security and network security)
• Information security threats, vulnerabilities, and attacks
• Different types of malware
• Network security fundamentals
• Identification, authentication, and authorization concepts
• Network security controls
o Administrative controls (frameworks, laws, acts, governance and compliance program,
and security policies)
o Physical controls (physical security controls, workplace security, and environmental
controls)
o Technical controls (network security protocols, network segmentation, firewall, IDS/IPS,
honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti
malware tools)
• Network security assessment techniques and tools (threat hunting, threat intelligence,
vulnerability assessment, ethical hacking, penetration testing, and configuration and asset
management)
• Application security design and testing techniques
• Fundamentals of virtualization, cloud computing, and cloud security
• Wireless network fundamentals, wireless encryption, and security measures
• Fundamentals of mobile, IoT, and OT devices and their security measures
• Cryptography and public key infrastructure concepts
• Data security controls, data backup and retention methods, and data loss prevention techniques
• Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
• Incident handling and response process
• Computer forensics fundaments, digital evidence, and forensic investigation phases
Who Should Attend
Prerequisites

Training Calendar
Intake
Duration
Program Fees
Module
Module 1 - Information Security Threats and Vulnerabilities
Module 2 - Information Security Attacks
Module 3 - Network Security Fundamentals
Module 4 - Identification, Authentication, and Authorization
Module 5 - Network Security Controls – Administrative Controls
Module 6 - Network Security Controls – Physical Controls
Module 7 - Network Security Controls – Technical Controls
Module 8 - Network Security Assessment Techniques and Tools
Module 9 - Application Security
Module 10 - Virtualization and Cloud Computing
Module 11 - Wireless Network Security
Module 12 - Mobile Device Security
Module 13 - IoT and OT Security
Module 14 - Cryptography
Module 15 - Data Security
Module 16 - Network Troubleshooting
Module 17 - Network Traffic Monitoring
Module 18 - Network Logs Monitoring and Analysis
Module 19 - Incident Response
Module 20 - Computer Forensics
Module 21 - Business Continuity and Disaster Recovery
Module 22 - Risk Management
FAQs
General Questions:
Q: What is the Certified CyberSecurity Technician (C|CT) course about?
A: The C|CT course, developed by EC-Council (creators of the Certified Ethical Hacker), is an entry-level program that provides hands-on, foundational cybersecurity skills. It covers information security, network security, threat assessment, incident response, cryptography, cloud security, mobile and IoT security, and more.
Q: Who should attend this course?
A: This course is ideal for students, IT professionals, career changers, and anyone aspiring to begin or grow a career in cybersecurity. It’s designed for individuals entering the cybersecurity workforce, providing technician-level skills to address common organizational security issues.
Q: What are the prerequisites for this course?
A: There are no formal prerequisites for the C|CT course or certification exam. However, having a basic understanding of IT networking and cybersecurity concepts can be beneficial.
Q: How long is the course?
A: The course duration is 5 days.
Q: What key topics are covered in this course?
A: Topics include information security threats and attacks, network and wireless security, malware types, authentication and access controls, network assessment tools, application security, cloud and virtualization, cryptography, mobile/IoT/OT security, incident response, computer forensics, and risk management.
Q: Will I receive a certification after completing the course?
A: Yes, upon completing the course and passing the certification exam, you will earn the EC-Council Certified CyberSecurity Technician (C|CT) credential.
Program Content & Skills:
Q: What skills will I gain from the Certified CyberSecurity Technician course?
A: You’ll develop hands-on skills in identifying and mitigating cybersecurity threats, securing networks and systems, managing access controls, analyzing network traffic and logs, and responding to incidents. You’ll also learn to assess vulnerabilities, implement security controls, and understand the basics of forensics, cloud, and mobile security.
Q: What topics are included in the program content?
A: The course includes 22 modules covering areas such as:
Information security threats and vulnerabilities
Malware types and attack vectors
Network security fundamentals
Administrative, physical, and technical controls
Security assessment tools and techniques
Application security and ethical hacking
Cloud, virtualization, and wireless security
Mobile, IoT, and OT device security
Cryptography and PKI concepts
Data protection and loss prevention
Traffic and log analysis
Incident response and digital forensics
Business continuity, disaster recovery, and risk management
Q: Is the course more theoretical or practical?
A: The C|CT course is designed to be highly practical. It emphasizes real-world, hands-on cybersecurity technician skills through labs and simulations that prepare you to tackle actual security challenges in a workplace environment.
Q: Will this course help me understand modern security tools?
A: Yes, you’ll gain exposure to a variety of modern security tools and technologies such as SIEM, IDS/IPS, firewalls, VPNs, honeypots, threat intelligence platforms, vulnerability scanners, and digital forensic tools.
Q: Does the course cover incident handling and response?
A: Yes, incident handling and response is a dedicated module. You’ll learn how to detect, respond to, and recover from security incidents using structured response procedures.
Submit your interest today !