CCT Certified Cybersecurity Technician

Upcoming trainings

Level:For IT professionals
Lecturers:Mane Piperevski
Provider:EC-Council
Theme:Security
Length (days):5
Hours/day:8
Delivery method:On-line
Price:2.350$ + VAT

The Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.

EC-Council developed the C|CT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills.

To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more.

About CCT advantages

  • The C|CT is the world's only baseline cybersecurity program to offer 85 Hands-on Labs
  • An immersive Practical Certification Delivered in a Live Cyber Range
  • Performance-Based Exam, combined with Live Cyber Range
  • 50% of Training Time: Dedicated to Labs
  • Multidisciplinary Learnings: Network Defense, Ethical Hacking, Digital Forensics & Security Operations

What you will learn?

  • Key issues plaguing the cybersecurity industry (information security and network security)
  • Information security threats, vulnerabilities, and attacks
  • Different types of malware
  • Network security fundamentals
  • Identification, authentication, and authorization concepts
  • Network security controls 
    • Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
    • Physical controls (physical security controls, workplace security, and environmental controls)
    • Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
  • Application security design and testing techniques
  • Fundamentals of virtualization, cloud computing, and cloud security
  • Wireless network fundamentals, wireless encryption, and security measures
  • Fundamentals of mobile, IoT, and OT devices and their security measures
  • Cryptography and public key infrastructure concepts
  • Data security controls, data backup and retention methods, and data loss prevention techniques
  • Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
  • Incident handling and response process
  • Computer forensics fundaments, digital evidence, and forensic investigation phases

 

Goals

C|CT – Become a Responsible Cyber Operator in Any IT Role - The C|CT program allows individuals to eventually grow their skills into various roles, including penetration testing, security consulting, auditor and administrator roles, and beyond. It establishes a foundation of technical skills required to create successful technologists who will advance across various work roles.

Audience

The C|CT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role. This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.

Content

Module 01: Information Security Threats and Vulnerabilities
Module 02: Information Security Attacks
Module 03: Network Security Fundamentals
Module 04: Identification, Authentication, and Authorization
Module 05: Network Security Controls – Administrative Controls
Module 06: Network Security Controls – Physical Controls
Module 07: Network Security Controls – Technical Controls
Module 08: Network Security Assessment Techniques and Tools
Module 09: Application Security
Module 10: Virtualization and Cloud Computing
Module 11: Wireless Network Security
Module 12: Mobile Device Security
Module 13: IoT and OT Security
Module 14: Cryptography
Module 15: Data Security
Module 16: Network Troubleshooting
Module 17: Network Traffic Monitoring
Module 18: Network Logs Monitoring and Analysis
Module 19: Incident Response
Module 20: Computer Forensics
Module 21: Business Continuity and Disaster Recovery
Module 22: Risk Management

 

There are no specific prerequisites to take the C|CT course and attempt the C|CT certification exam. Although this is an entry-level course, a working knowledge of IT networking and basic cybersecurity concepts will be an advantage to anyone taking this course.

Exam Title: Certified Cybersecurity Technician
Exam Code: 212-82
Number of Questions: 60
Duration: 3 hours
Exam Availability Locations: ECC Exam Portal
Languages: English
Test Format: Multiple Choice and Real Life hands-on Practical Exam
Passing Score: 70%
Exam Mode: Remote Proctoring Services

Mane Piperevski

About

Mane is an Experienced Information Technology Expert with extensive experience in Cyber Security. Over 20 years in IT industry and 15 years experience in field of Cyber Security. With a breadth of technology skills, including networks, operating systems, databases and application development, Mane has provided penetration testing and IT forensics services in various industry sectors such as banking, electronic payment services, transportation, software development companies, utilities, pension and disability insurance and state courts. As experienced Microsoft Certified Trainer and Certified EC-Council Instructor, Mane has conducted training classes in Cyber security and Microsoft Products for over 1500 students in last 12 years. He is regular speaker at Cyber Security International Conferences and community events, leader and founder of OWASP Macedonian Chapter.

He is also AlienVault Certified Security Engineer (ACSE) capable for implementing, supporting and managing AlienVault USM solution.

As Security Expert he understands and knows how to look for the weaknesses and vulnerabilities in systems, how they work, how to investigate them and exploit for Proof of Concept.

Online Not Confirmed

27 January 2025 - 31 January 2025

  • Price: 2.350$ + VAT
Show Schedule
  • Contractor: Mane Piperevski
  • 27.01.2025, 09:00-17:00
    Online classroom
  • 28.01.2025, 09:00-17:00
    Online classroom
  • 29.01.2025, 09:00-17:00
    Online classroom
  • 30.01.2025, 09:00-17:00
    Online classroom
  • 31.01.2025, 09:00-17:00
    Online classroom

For more information please call +386 1 568 40 40 or send an e-mail to trzenje@housing.si