COURSE OBJECTIVE:
• Key concepts in cybersecurity, including information security and network security
• Information security threats, vulnerabilities, and attacks
• The different types of malware
• Identification, authentication, and authorization
• Network security controls
– Administrative controls (frameworks, laws, acts, governance and compliance programs, security policies)
– Physical controls (physical and workplace security policies, environmental controls
– Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots;
proxy servers; VPNs; user behavior analytics; network access control; unified threat management; security information and event
management; security orchestration, automation, and response; load baancers; anti-malware
• Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
• Application security design and testing techniques
• Fundamentals of virtualization, cloud computing, and cloud security
• Wireless network fundamentals, wireless encryption, and related security measures
• Fundamentals of mobile, IoT, and OT devices and related security measures
• Cryptography and public-key infrastructure
• Data security controls, data backup and retention methods, and data loss prevention techniques
• Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
• The incident handling and response process
• Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
• Concepts in business continuity and disaster recovery
• Risk management concepts, phases, and frameworks
TARGET AUDIENCE:
The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job.
The course is especially well suited to:
• Early-career IT professionals, IT managers, career changers, and career advancers
• Students and recent graduates
COURSE PREREQUISITES:
No specific prerequisites are required for the C|CT certification, although previous knowledge and experience in IT and networking with a focus on cybersecurity can be an advantage. Candidates should have knowledge of computers and computer networks prior to entering the C|CT program, although core technologies are covered in the curriculum.
COURSE CONTENT:
• Module 01: Information Security Threats and Vulnerabilities
• Module 02: Information Security Attacks
• Module 03: Network Security Fundamentals
• Module 04: Identification, Authentication, and Authorization
• Module 05: Network Security Controls – Administrative Controls
• Module 06: Network Security Controls – Physical Controls
• Module 07: Network Security Controls – Technical Controls
• Module 08: Network Security Assessment Techniques and Tools
• Module 09: Application Security
• Module 10: Virtualization and Cloud Computing
• Module 11: Wireless Network Security
• Module 12: Mobile Device Security
• Module 13: IoT and OT Security
• Module 14: Cryptography
• Module 15: Data Security
• Module 16: Network Troubleshooting
• Module 17: Network Traffic Monitoring
• Module 18: Network Logs Monitoring and Analysis
• Module 19: Incident Response
• Module 20: Computer Forensics
• Module 21: Business Continuity and Disaster Recovery
• Module 22: Risk Management
FOLLOW ON COURSES:
Not available. Please contact.