Facebook Pixel
Microsoft Certification Training
Search classes by keyword:
Search classes by category:
Microsoft Certification and Microsoft Training, Cisco Certification and MCSE Certification
EC-Council CTT space



EC-Council CTT Certification Training Course

EC-Council Certified Cybersecurity Technician (CCT)

Course Number: #CED-1704
Course Length: 5 days
Number of Exams: 1
Certifications: EC-Council CCT

Grants (discounts) are available for multiple students for the same or different courses.

Guaranteed to Run Guaranteed to Run


Upcoming Dates Class Times Class Format Quote
4/8 - 4/12, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
4/29 - 5/3, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
5/20 - 5/24, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
6/24 - 6/28, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
8/5 - 8/9, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
9/16 - 9/20, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
10/7 - 10/11, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
11/11 - 11/15, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
12/16 - 12/20, 2024Guaranteed to Run 10:00 AM - 6:00 PM ET
9:00 AM - 5:00 PM CT
7:00 AM - 3:00 PM PT
4:00 AM - 12:00 PM HT
Instructor-Led Instant Quote
 Guaranteed to Run Self-Paced Online Self-Study Instant Quote

Online Self-Study courses allow you to study around your busy schedule, remain working as you train, work at your own pace.


Online Self-Study

  • EC-Council Official Courseware
  • EC-Council Official Labs
  • Lifetime access to Courseware
  • Labs are available for 1 year from date of redemption
  • Apply Cost to Instructor-led Training of Same Course

Instant Quote

Instructor-Led

  • Certified Instructor
  • Includes all course materials

Can't travel or you want to stay with your family or business. No problem!

Stay in your own city and save the additional expenses of roundtrip airfare, lodging, transportation, and meals and receive the same great instruction live from our instructors in our Live Instructor-Led Remote Classroom Training.

Remote Classroom Training

Our Remote Classroom Training is a live class with students observing the instructor and listening through your computer speakers.

You will see the instructor's computer, slides, notes, etc., just like in the classroom. You will be following along, doing work, labs, and individual assignments.

Like us on Facebook and SAVE $100 on your next course

The Certified Cybersecurity Technician (CCT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (CEH) certification, to address the global demand for a qualified cybersecurity workforce.

EC-Council developed the CCT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills.

What Are the Benefits of the CCT Credential?

  • Paves the way for a promising career in the realm of cybersecurity
  • Teaches the fundamental knowledge that cybersecurity professionals need
  • Improves employability by validating certification holders' skills as cybersecurity specialists who can strengthen organizational security
  • Provides extensive opportunities to practice the hands-on skills necessary for any technical role involving administrative privileges and cybersecurity considerations

CCT - Become a Responsible Cyber Operator in Any IT Role:

The CCT program allows individuals to eventually grow their skills into various roles, including penetration testing, security consulting, auditor and administrator roles, and beyond. It establishes a foundation of technical skills required to create successful technologists who will advance across various work roles.

Job Description of a Cybersecurity Technician:

A professional who provides technical cybersecurity support, troubleshoots network security problems, monitors alerts, and follows policies, procedures, and standards to protect information assets.

Job Opportunities & Job Roles for CCT Credential:

The Certified Cybersecurity Technician certification prepares IT and Cybersecurity professionals for a wide range of complex issues that focus on securing software, networks, and IT systems while understanding common threats and attacks. CCT offers a multifaceted approach to network defense, ethical hacking, and security operations to ensure individuals use their strongest abilities to configure, analyze, and identify problems within their organization. This course will prepare and enhance skills in the following roles:

  • IT Support Specialist
  • IT Networking Specialist
  • Cybersecurity Technicians
  • Network Engineers
  • SOC Analyst
  • IT Managers

Who Can Attend This Course?

The CCT course can be taken by students, IT professionals, IT managers, career changers, and any individual seeking a career in cybersecurity, or aspiring to advance their existing role. This course is ideal for those entering the cybersecurity workforce, providing foundational technician level, hands-on skills to solve the most common security issues organizations face today.

What Are the Prerequisites for the CCT Program?

There are no specific prerequisites to take the CCT course and attempt the CCT certification exam. Although this is an entry-level course, a working knowledge of IT networking and basic cybersecurity concepts will be an advantage to anyone taking this course.

What Will You Learn

  1. Key issues plaguing the cybersecurity industry (information security and network security)
  2. Information security threats, vulnerabilities, and attacks
  3. Different types of malware
  4. Network security fundamentals
  5. Identification, authentication, and authorization concepts
  6. Network security controls 7. Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
  7. Application security design and testing techniques
  8. Fundamentals of virtualization, cloud computing, and cloud security
  9. Wireless network fundamentals, wireless encryption, and security measures
  10. Fundamentals of mobile, IoT, and OT devices and their security measures
  11. Cryptography and public key infrastructure concepts
  12. Data security controls, data backup and retention methods, and data loss prevention techniques
  13. Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
  14. Incident handling and response process
  15. Computer forensics fundaments, digital evidence, and forensic investigation phases

Course Outline

Module 01: Information Security Threats and Vulnerabilities
Module 02: Information Security Attacks
Module 03: Network Security Fundamentals
Module 04: Identification, Authentication, and Authorization
Module 05: Network Security Controls - Administrative Controls
Module 06: Network Security Controls - Physical Controls
Module 07: Network Security Controls - Technical Controls
Module 08: Network Security Assessment Techniques and Tools
Module 09: Application Security
Module 10: Virtualization and Cloud Computing
Module 11: Wireless Network Security
Module 12: Mobile Device Security
Module 13: IoT and OT Security
Module 14: Cryptography
Module 15: Data Security
Module 16: Network Troubleshooting
Module 17: Network Traffic Monitoring
Module 18: Network Logs Monitoring and Analysis
Module 19: Incident Response
Module 20: Computer Forensics
Module 21: Business Continuity and Disaster Recovery
Module 22: Risk Management

CED Solutions is your best choice for EC-Council CTT, EC-Council CTT training, EC-Council CTT certification, EC-Council CTT boot camp, EC-Council CTT certification training, EC-Council CTT certification course, EC-Council CTT course, EC-Council CTT class.



EC-Council CTT space
Search classes by keyword:
Search classes by category:


Copyright © 2024 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.