Show training

Certified Cybersecurity Technician

training code: CCT / ENG e-learning / EN

Pakiety e-learning

The Certified Cybersecurity Technician (C|CT) is an entry level certification program engineered to address the global need for cybersecurity technicians with handson, technician-level IT and cybersecurity foundational skills.

C|CT allows individuals at all levels to eventually grow their skills into various roles including Penetration Testing,

Security Consulting, Auditor and Administrator roles, and beyond.

 

*Specjal price CCT to minimum 20 kits purchase - 199$

Date

mode Distance Learning

level Basic

duration 1 day |  7h|  31.07
3,900.00 PLN + 23% VAT (4,797.00 PLN with TAX)
Previous lowest price:
3,900.00 PLN
duration 1 day |  7h|  30.09
3,900.00 PLN + 23% VAT (4,797.00 PLN with TAX)
Previous lowest price:
3,900.00 PLN
3,900.00 PLN 4,797.00 PLN with TAX
  • High School Students
  • Non-IT Professionals
  • IT Professionals
  • CCT curricula aligned to the expected technical-level job roles required today.
  • Uses real-world techniques and tools.
  • Highly realistic, deeply immersive experience through Capturethe-Flag challenges and hands-on labs

 

Exam Code: 212-82

Number of Questions: 60

Duration: 3 hours

Exam Availability Locations: ECC Exam Portal

Test Format: Multiple choice and Real Life hands-on Practical Exam

No Prerequisite is required. Anyone who wants to start a career in cybersecurity can apply for a CCT scholarship.

  • Training: english
  • Materials: english
  • Official Curricula e-Courseware covering 22 Immersive Modules
  • 200 Hours of Video Based Learning of the CCT course
  • 85 Hands- on Labs
  • Capture the Flag Exercises
  • Certification Exam Voucher for Performance- Based Exam
  • 2400Pages of Content (includes 900 pages of lab guides) 
  • Official EC-Council Certification
  • Ethical Hacking
  • Network Security DigitalForensics  
  • SOC
  • Incident Handling     
  • Risk Management  
  • Governance &Compliance   
  • BC & DR     
  • Application Security
  • Configuration & Asset Management 
  • OT Security  
  • Network Troubleshooting
  • Network log Monitoring & Analysis   
  • Threat Intelligence & hunting

 

Lab Exercises Included In CCT:

  • Create a Trojan to Gain Access to the Target System
  • User System Monitoring and Surveillance using Spytech SpyAgent
  • Perform Application SandboxingUsing Sandboxie
  • File Recovery using EaseUSData Recovery Wizard
  • Create a Virus Infect the Terget System
  • Manage Access Controls in Linux Machine
  • Detect Web Application Vulnerabilties using OWASP ZAP
  • Access Remote Machine using PuTTy
  • Create a Worm using the Internet Worm Maker Thing
  • Implement Network-Based Firewall Functionality
  • Calculate One-way Hashes using HashCalc
  • Acquire Volatile Information from a Live Windows System