Certified CyberSecurity
Technician

Overview

The Certified Cybersecurity Technician is an entry-level cybersecurity program created by Ec-Council, the creator of the Certified Ethical Hacker (CEH) certification, to address the global demand for a qualified cybersecurity workforce.

Course Objective

At the end of the course, students will be able to:
• Key issues plaguing the cybersecurity industry (information security and network security)
• Information security threats, vulnerabilities, and attacks
• Different types of malware
• Network security fundamentals
• Identification, authentication, and authorization concepts
• Network security controls
o Administrative controls (frameworks, laws, acts, governance and compliance program,
and security policies)
o Physical controls (physical security controls, workplace security, and environmental
controls)
o Technical controls (network security protocols, network segmentation, firewall, IDS/IPS,
honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti
malware tools)
• Network security assessment techniques and tools (threat hunting, threat intelligence,
vulnerability assessment, ethical hacking, penetration testing, and configuration and asset
management)
• Application security design and testing techniques
• Fundamentals of virtualization, cloud computing, and cloud security
• Wireless network fundamentals, wireless encryption, and security measures
• Fundamentals of mobile, IoT, and OT devices and their security measures
• Cryptography and public key infrastructure concepts
• Data security controls, data backup and retention methods, and data loss prevention techniques
• Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
• Incident handling and response process
• Computer forensics fundaments, digital evidence, and forensic investigation phases

Who Should Attend

The C|CT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role. This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.

Prerequisites

There are no specific prerequisites to take the C|CT course and attempt the C|CT certification exam. Although this is an entry-level course, a working knowledge of IT networking and basic cybersecurity concepts will be an advantage to anyone taking this course.
Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

5 Day

Contact us to find out more

Module

FAQs

Q: What is the Certified CyberSecurity Technician (C|CT) course about?
A: The C|CT course, developed by EC-Council (creators of the Certified Ethical Hacker), is an entry-level program that provides hands-on, foundational cybersecurity skills. It covers information security, network security, threat assessment, incident response, cryptography, cloud security, mobile and IoT security, and more.

Q: Who should attend this course?
A: This course is ideal for students, IT professionals, career changers, and anyone aspiring to begin or grow a career in cybersecurity. It’s designed for individuals entering the cybersecurity workforce, providing technician-level skills to address common organizational security issues.

Q: What are the prerequisites for this course?
A: There are no formal prerequisites for the C|CT course or certification exam. However, having a basic understanding of IT networking and cybersecurity concepts can be beneficial.

Q: How long is the course?
A: The course duration is 5 days.

Q: What key topics are covered in this course?
A: Topics include information security threats and attacks, network and wireless security, malware types, authentication and access controls, network assessment tools, application security, cloud and virtualization, cryptography, mobile/IoT/OT security, incident response, computer forensics, and risk management.

Q: Will I receive a certification after completing the course?
A: Yes, upon completing the course and passing the certification exam, you will earn the EC-Council Certified CyberSecurity Technician (C|CT) credential.

Q: What skills will I gain from the Certified CyberSecurity Technician course?
A: You’ll develop hands-on skills in identifying and mitigating cybersecurity threats, securing networks and systems, managing access controls, analyzing network traffic and logs, and responding to incidents. You’ll also learn to assess vulnerabilities, implement security controls, and understand the basics of forensics, cloud, and mobile security.

Q: What topics are included in the program content?
A: The course includes 22 modules covering areas such as:

  • Information security threats and vulnerabilities

  • Malware types and attack vectors

  • Network security fundamentals

  • Administrative, physical, and technical controls

  • Security assessment tools and techniques

  • Application security and ethical hacking

  • Cloud, virtualization, and wireless security

  • Mobile, IoT, and OT device security

  • Cryptography and PKI concepts

  • Data protection and loss prevention

  • Traffic and log analysis

  • Incident response and digital forensics

  • Business continuity, disaster recovery, and risk management

Q: Is the course more theoretical or practical?
A: The C|CT course is designed to be highly practical. It emphasizes real-world, hands-on cybersecurity technician skills through labs and simulations that prepare you to tackle actual security challenges in a workplace environment.

Q: Will this course help me understand modern security tools?
A: Yes, you’ll gain exposure to a variety of modern security tools and technologies such as SIEM, IDS/IPS, firewalls, VPNs, honeypots, threat intelligence platforms, vulnerability scanners, and digital forensic tools.

Q: Does the course cover incident handling and response?
A: Yes, incident handling and response is a dedicated module. You’ll learn how to detect, respond to, and recover from security incidents using structured response procedures.

Submit your interest today !

Contact us