The C|CT certification provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cyber security technologists. The course outline of the C|CT program goes above and beyond some of the more common entry-level cybersecurity programs, such as the Security+, in a completely hands-on cyber range environment instead of simulations to ensure cybersecurity skills development.
Learning Objectives
1. Key issues plaguing the cybersecurity industry (information security and network security)
2. Information security threats, vulnerabilities, and attacks
3. Different types of malware
4. Network security fundamentals
5. Identification, authentication, and authorization concepts
6. Network security controls
Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
Physical controls (physical security controls, workplace security, and environmental controls)
Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
7. Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
8. Application security design and testing techniques
9. Fundamentals of virtualization, cloud computing, and cloud security
10. Wireless network fundamentals, wireless encryption, and security measures
11. Fundamentals of mobile, IoT, and OT devices and their security measures
12. Cryptography and public key infrastructure concepts
13. Data security controls, data backup and retention methods, and data loss prevention techniques
14. Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
15. Incident handling and response process
16. Computer forensics fundaments, digital evidence, and forensic investigation phases