Preparation Course: Certified Cybersecurity Technician
By the end of this course, participants will be able to:
· Have Strong Foundational Coverage because the C|CT certification provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cybersecurity technologists.
· Understand key concepts in cybersecurity, including information security and network security
· Realize information security threats, vulnerabilities, and attacks
· Recognize the different types of malwares
· Understand identification, authentication, and authorization Network security control
- Administrative controls (frameworks, laws, acts, governance, and compliance programs, security policies)
- Physical controls (physical and workplace security policies, environmental controls)
- Technical controls (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxy servers; VPNs; user behavior analytics; network access control; unified threat management; security information and event management; security orchestration, automation, and response; load balancers; anti-malware
· Master network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
· Perform application security design and testing techniques
· Understand fundamentals of virtualization, cloud computing, and cloud security
· Understand wireless network fundamentals, wireless encryption, and related security measures
· Understand fundamentals of mobile, IoT, and OT devices and related security measures
· Understand cryptography and public-key infrastructure
- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Network Security Assessment Techniques and Tools
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- Internet of Things (IoT) and Operational Technology (OT) Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
- Network Log Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management
Saudi Arabia
Egypt
UAE
Canada