![Intellectual Point](https://intellectualpoint.com/wp-content/uploads/2022/04/Certified-Cybersecurity-Technician.png)
Certified Cybersecurity Technician (C|CT)
Learning Objectives
![Intellectual Point](https://intellectualpoint.com/wp-content/uploads/2019/03/domain-4.png)
Key issues plaguing the cybersecurity industry (information security and network security)
Information security threats, vulnerabilities, and attacks
![Intellectual Point](https://intellectualpoint.com/wp-content/uploads/2019/03/domain-3.png)
Different types of malware
Network security fundamentals
![Intellectual Point](https://intellectualpoint.com/wp-content/uploads/2019/03/domain-2.png)
Identification, authentication, and authorization concepts
Network security controls
![Intellectual Point](https://intellectualpoint.com/wp-content/uploads/2019/04/icon_b_05.png)
Network security assessment techniques and tools
Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of mobile, IoT, and OT devices and their security measures
- Cryptography and public key infrastructure concepts
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
- Download Course PDF
Course Schedule
![](https://intellectualpoint.com/wp-content/uploads/2020/04/Server-Room-datacenter-1-scaled.jpg)
SESSION 1:
- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
SESSION 2:
- Network Security Controls – Administrative Controls
- Network Security Controls – Physical Controls
- Network Security Controls – Technical Controls
- Network Security Assessment Techniques and Tools
SESSION 3:
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
SESSION 4:
- IoT and OT Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
SESSION 5:
- Network Logs Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management
![](https://intellectualpoint.com/wp-content/uploads/2019/02/Banner-3-943067460.jpg)
Training program
How Will the Certified Cybersecurity Technician Credential Benefit You?
It facilitates your entry into the cybersecurity realm as a cybersecurity technician. It provides fundamental professional skills and solidifies the concepts of information security, network security, computer forensics, risk management, and incident handling.
It enhances your skills as a cybersecurity specialist and increases your employability chances. It provides hands-on practical skills essential for a cybersecurity technician or any role in IT with administrative privileges where security should be considered and practiced.
![](https://intellectualpoint.com/wp-content/uploads/2022/04/Certified-Cybersecurity-Technician.png)
Students will learn:
- To validate hands-on technician level IT and cybersecurity skills.
- It’s an entry-level cybersecurity program engineered by the creators of the Certified Ethical Hacker program to address the global demand for cybersecurity technicians.
- To prepare individuals with core security skills to pursue and develop their cybersecurity careers as cybersecurity specialists, consultants, network engineers, or IT administrators
![](https://intellectualpoint.com/wp-content/uploads/2022/04/carrer-starter-ec-council.jpg)
![](https://intellectualpoint.com/wp-content/uploads/2020/05/CreativeBusinessHexagons-scaled.jpg)
C|CT’s Key Offerings:
Strong Foundational Coverage
The C|CT certification provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cyber security technologists.
Live Range Experience
Other popular programs rely on simulation and interactivity as practical-based assessment, the C|CT program is delivered on a live Cyber Range utilizing live targets and real attack systems for a truly immersive, real-life practice and assessment platform.
Capture the Flag
The C|CT certification offers capture the flag (CTF) style critical thinking challenges to accompany each lab exercise putting knowledge into practice and providing a proven record of skill demonstration. Candidates completing the C|CT program will earn the C|CT certification and have a proven track record of performing the tasks required in a live Cyber Range, proving to employers their ability to perform critical job duties.
Multiple Certifications
The course outline of the C|CT program goes above and beyond some of the more common entry-level cybersecurity programs, such as the Security+, in a completely hands-on cyber range environment instead of simulations to ensure cybersecurity skills development. We believe that candidates who successfully attain the C|CT certification will attain other leading cybersecurity certifications, including Security+, without further training
Most Affordable
Despite the unique design of the heavily hands-on course and its uses of real-world cyber range capability, the certification is one of the most affordable in the world!
![](https://intellectualpoint.com/wp-content/uploads/2020/04/cloudnetwork-1-scaled.jpg)
Register For Class
Date |
Type |
Location |
---|
NOT SURE WHERE TO START?
Private Team Training
Enrolling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training
For details, call 704-554-3827
![Event Presentation in crowded room](https://intellectualpoint.com/wp-content/uploads/2019/04/Unknown-2.jpeg)
Come Learn With Intellectual Point
Price Match Guarantee!
We will match Competitor’s Price Quote.
Call for more details 703-554-3827
A Certified Certified Cybersecurity Technician (C|CT) Course at Intellectual Point Includes:
-
Live instructor-led training in modern classrooms
-
Thorough review of all EC-Council Certified Cybersecurity Technician (C|CT) topics by industry experts
-
Hands-on labs on real CCT technologies
-
24 x 7 access to the real labs in classrooms and remotely
-
100% latest material & and realistic practice questions
-
Confidence building hands-on training
-
Authorized Pearson VUE testing at the same location to help you complete your exam*
-
Study material, notes, videos, and practice questions included in the course price
happy clients
What Our Customers Say - Based on over 600+ Reviews!
![APEX COLOR LOGO](https://intellectualpoint.com/wp-content/uploads/2019/04/APEX20COLOR20LOGO-full20size.jpg)
![Booz Allen logo](https://intellectualpoint.com/wp-content/uploads/2019/04/Booz_Allen_logo.jpg)
![DARS Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/DARS.jpg)
![](https://intellectualpoint.com/wp-content/uploads/dbvispot-corrected-blue_original.png)
![HP logo](https://intellectualpoint.com/wp-content/uploads/2019/04/HP_logo.png)
![hpe logo](https://intellectualpoint.com/wp-content/uploads/2019/04/hpe_logo.png)
![INOVA Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/INOVA.png)
![Lockheed Martin Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/LockheedMartin_logo-1.png)
![mantech logo](https://intellectualpoint.com/wp-content/uploads/2019/04/mantech-vector-logo-1.png)
![northrop grumann logo](https://intellectualpoint.com/wp-content/uploads/2019/04/northrop-grumann-noc-logo.png)
![Optum Logo](https://intellectualpoint.com/wp-content/uploads/2019/06/image001.jpg)
![Verizon Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/Verizon.jpg)
![WIOA Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/WIOA.png)
![CompTIA Logo](https://intellectualpoint.com/wp-content/uploads/2019/03/AuthPartner-4c-1.jpg)
![AWS logo](https://intellectualpoint.com/wp-content/uploads/2019/04/aws-logo.png)
![ISACA logo](https://intellectualpoint.com/wp-content/uploads/2019/04/ISACAnewTag.4c.png)
![ITPG logo](https://intellectualpoint.com/wp-content/uploads/2019/04/ITPG_logo.jpg)
![Phoenix logo](https://intellectualpoint.com/wp-content/uploads/2019/04/Phoenix_logo.png)
![RedHat Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/RedHat-Logo.jpg)
![SunsetLearning Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/SunsetLearning.jpg)
![UoNA logo](https://intellectualpoint.com/wp-content/uploads/2019/04/UoNA_logo.jpg)
![UOPX logo](https://intellectualpoint.com/wp-content/uploads/2019/04/UOPX_logo_stacked_blackonwhite.jpg)
![certiport logo](https://intellectualpoint.com/wp-content/uploads/2019/04/certiport_logo.png)
![clep logo](https://intellectualpoint.com/wp-content/uploads/2019/04/clep.jpg)
![IQT-logo](https://intellectualpoint.com/wp-content/uploads/2019/03/IQT-logo-1.jpg)
![Kryterion_logo](https://intellectualpoint.com/wp-content/uploads/2019/03/Kryterion_logo-1.jpg)
![Pan Testing Center Logo](https://intellectualpoint.com/wp-content/uploads/2019/03/Pan-Testing-Center-1.jpg)
![dsst logo](https://intellectualpoint.com/wp-content/uploads/2019/04/dsst-logo-300x166.jpg)
![PearsonVue Logo](https://intellectualpoint.com/wp-content/uploads/2019/03/PearsonVue-1.jpg)
![Sanctum Federal](https://intellectualpoint.com/wp-content/uploads/2019/11/Sanctum-Federal-Logo-EPS-01-01.png)
![Scantron Castle Logo](https://intellectualpoint.com/wp-content/uploads/2019/04/xScantron-Castle-Lockup-vertical-e1558548108157.jpg.pagespeed.ic.BL5ALYEU7h.jpg)