Kickstart your Career in Cybersecurity with Skills-Based Labs and Exams
CCT – Become a Responsible Cyber Operator in Any IT Role:
The CCT program allows individuals to eventually grow their skills into various roles, including penetration testing, security consulting, auditor and administrator roles, and beyond. It establishes a foundation of technical skills required to create successful technologists who will advance across various work roles.
What is Certified Cybersecurity Technician (CCT) Certification?
CCT is an entry-level cybersecurity program that is engineered by the creators of the Certified Ethical Hacker program to respond to the global need and demand for cybersecurity technicians.
What Does Certified Cybersecurity Technician (CCT) Offer?
CCT develops foundational multi-disciplinary cybersecurity skills across network defense, ethical hacking, digital forensics, and security operations to kickstart a cybersecurity career.
The CCT certification/credential is obtained through a comprehensive performance-based exam that combines live cyber range activities with a variety of knowledge assessments proving a grasp of both the knowledge and applied skills required to be successful in a cyber technician role.
Who should get trained in Certified Cybersecurity Technician (CCT)
This course will prepare and enhance skills in the following roles:
- IT Support Specialist
- IT Networking Specialist
- Cybersecurity Technicians
- Network Administrator
- SOC Analyst
- Network Engineers
- IT Managers
- Facility Administrators
- Career Starters, Career Changers, and Career Advancers– Students, Recent Graduates/IT Professionals, IT Managers. CCT Course is perfectly designed for anyone who is seeking to kickstart their Professional career journey in the field of Cybersecurity or add a strong foundational understanding of Cyber Security domains, and tactics required to be effective on the job.
How will the Certified Cybersecurity Technician Credential benefit you?
- It facilitates your entry into the world of cybersecurity as a cybersecurity technician
- It provides a professional fundamental skill and solidifies the concepts of information security, network security, computer forensics, risk management, and incident handling
- It provides best practices to improve organizational security posture
- It enhances your skills as a cybersecurity specialist and increases your employability
- It provides hands-on practical skills that you will use on the job every day as a cyber security technician, or any role in IT with administrative privileges where security should be considered and practiced.
Aceda aqui à brochura para saber mais acerca do curso
Objetivos
What will you learn?
- Key issues plaguing the cybersecurity industry (information security and network security)
- Information security threats, vulnerabilities, and attacks
- Different types of malware
- Network security fundamentals
- Identification, authentication, and authorization concepts
- Network security controls
- Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
- Physical controls (physical security controls, workplace security, and environmental controls)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of mobile, IoT, and OT devices and their security measures
- Cryptography and public key infrastructure concepts
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
Destinatários
- The C|CT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role.
- This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.
Condições
O exame EC-Council incluido no valor do curso deve ser obrigatoriamente realizado presencialmente, num dos centros de Exames GALILEU/Rumos.
Caso não tenha disponibilidade ou não pretenda realizar o exame de forma presencial e prefira uma solução remota acresce uma taxa de 89€ ao valor do curso.
Mensalidades (apenas para particulares): Taxa de inscrição de 10% + pagamento do valor restante em prestações flexíveis, sem juros, à escolha do cliente, através do parceiro Cofidis Pay. (Sujeito a aprovação, consulta-nos para mais informações).
Pré-Requisitos
- No specific prerequisites are required for CCT Certification.
- Having knowledge and experience in IT Networking with a CyberSecurity focus can be an advantage.
- Candidates should have knowledge of computers and computer networks prior to challenging the CCT program, though core technologies are covered in the curriculum.
Metodologia
Presencial ou Live Training
CCT Exam Details
- Duration 3 Hours
- Questions 60
Passing Criteria:
In order to maintain the high integrity of our certification exams, EC-Council Exams are provided in multiple forms (i.e., different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only have academic rigor but also have “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.
CCT – Exam Blueprint
Consultar Informação acerca dos Exames
Programa
- Module 01: Information Security Threats and Vulnerabilities
- Module 02: Information Security Attacks
- Module 03: Network Security Fundamentals
- Module 04: Identification, Authentication, and Authorization
- Module 05: Network Security Controls – Administrative Controls
- Module 06: Network Security Controls – Physical Controls
- Module 07: Network Security Controls – Technical Controls
- Module 08: Network Security Assessment Techniques and Tools
- Module 09: Application Security
- Module 10: Virtualization and Cloud Computing
- Module 11: Wireless Network Security
- Module 12: Mobile Device Security
- Module 13: IoT and OT Security
- Module 14: Cryptography
- Module 15: Data Security
- Module 16: Network Troubleshooting
- Module 17: Network Traffic Monitoring
- Module 18: Network Logs Monitoring and Analysis
- Module 19: Incident Response
- Module 20: Computer Forensics
- Module 21: Business Continuity and Disaster Recovery
- Module 22: Risk Management