Certified Cybersecurity Technician: e-learning
training code: CCT / ENG e-learning / ENThe Certified Cybersecurity Technician (C|CT) is an entry level certification program engineered to address the global need for cybersecurity technicians with handson, technician-level IT and cybersecurity foundational skills.
C|CT allows individuals at all levels to eventually grow their skills into various roles including Penetration Testing,
Security Consulting, Auditor and Administrator roles, and beyond.
*Specjal price CCT to minimum 20 kits purchase - 199$
- High School Students
- Non-IT Professionals
- IT Professionals
- CCT curricula aligned to the expected technical-level job roles required today.
- Uses real-world techniques and tools.
- Highly realistic, deeply immersive experience through Capturethe-Flag challenges and hands-on labs
Exam Code: 212-82
Number of Questions: 60
Duration: 3 hours
Exam Availability Locations: ECC Exam Portal
Test Format: Multiple choice and Real Life hands-on Practical Exam
No Prerequisite is required. Anyone who wants to start a career in cybersecurity can apply for a CCT scholarship.
- Training: english
- Materials: english
- Official Curricula e-Courseware covering 22 Immersive Modules
- 200 Hours of Video Based Learning of the CCT course
- 85 Hands- on Labs
- Capture the Flag Exercises
- Certification Exam Voucher for Performance- Based Exam
- 2400Pages of Content (includes 900 pages of lab guides)
- Official EC-Council Certification
- Ethical Hacking
- Network Security DigitalForensics
- SOC
- Incident Handling
- Risk Management
- Governance &Compliance
- BC & DR
- Application Security
- Configuration & Asset Management
- OT Security
- Network Troubleshooting
- Network log Monitoring & Analysis
- Threat Intelligence & hunting
Lab Exercises Included In CCT:
- Create a Trojan to Gain Access to the Target System
- User System Monitoring and Surveillance using Spytech SpyAgent
- Perform Application SandboxingUsing Sandboxie
- File Recovery using EaseUSData Recovery Wizard
- Create a Virus Infect the Terget System
- Manage Access Controls in Linux Machine
- Detect Web Application Vulnerabilties using OWASP ZAP
- Access Remote Machine using PuTTy
- Create a Worm using the Internet Worm Maker Thing
- Implement Network-Based Firewall Functionality
- Calculate One-way Hashes using HashCalc
- Acquire Volatile Information from a Live Windows System