CCT is an entry-level cybersecurity program that is engineered by the creators of the Certified Ethical Hacker program to respond to the global need and demand for cybersecurity technicians.
CCT develops foundational multi-disciplinary cybersecurity skills across network defense, ethical hacking, digital forensics, and security operations to kickstart a cybersecurity career.
The CCT certification/credential is obtained through a comprehensive performance-based exam that combines live cyber range activities with a variety of knowledge assessments proving a grasp of both the knowledge and applied skills required to be successful in a cyber technician role.
1. Information Security Threats and Attacks
2. Network Security
3. Network Security Controls
4. Application Security and Cloud Computing
5. Wireless Device Security
6. Data Security
7. Network Monitoring and Analysis
8. Incident and Risk Management
1. It facilitates your entry into the world of cybersecurity as a cybersecurity technician
2. It provides a professional fundamental skill and solidifies the concepts of information security, network security, computer forensics, risk management, and incident handling
3. It provides best practices to improve organizational security posture
4. It enhances your skills as a cybersecurity specialist and increases your employability
5. It provides hands-on practical skills that you will use on the job every day as a cyber security technician, or any role in IT with administrative privileges where security should be considered and practiced.
This course will prepare and enhance skills in the following roles:
COURSE CONTENT: Not available. Please contact. ย TARGET AUDIENCE: ย Not available. Please contact. ย COURSE OBJECTIVE: ย Not available. Please contact. ย ย COURSE PREREQUISITES: Not available. Please contact. ย …
COURSE CONTENT: Not available. Please contact. ย TARGET AUDIENCE: ย Who Should Attend Anyone responsible for designing a Fortinet SD-WAN solution or for the day-to-day management of a Fortinet…
COURSE CONTENT: Cybersecurity Awareness โข What is security? โข Confidentiality, integrity, and availability โข Security baselining โข Security concerns: Humans โข Types of threats โข Security controls โข What…