top of page
Cibersegurança

 Course Outline for E|CDE: 

  • Understanding DevOps Culture

  • Introduction to DevSecOps

  • DevSecOps Pipeline—Plan Stage

  • DevSecOps Pipeline—Code Stage

  • DevSecOps Pipeline—Build and Test Stage

  • DevSecOps Pipeline—Release and Deploy Stage

  • DevSecOps Pipeline—Operate and Monitor Stage

ecde
Cibersegurança

EC-COUNCIL C|CT

CCTLogo2.png
CCTImage.png

​​​​​​Description:

 

The Certified Cybersecurity Technician (C|CT) certification is an entry-level security program developed by EC-Council, the same organization behind the prestigious Certified Ethical Hacker (C|EH) certification. This program has been specifically designed to address the growing global demand for security technicians with practical and solid knowledge in key areas of digital security.

The C|CT provides essential foundations for individuals looking to enter the field of security, equipping them with the skills needed to identify, mitigate, and respond to a wide range of threats and vulnerabilities in digital environments. The course covers crucial topics such as networking, system security, vulnerability analysis, incident management, and more, ensuring professionals are well-prepared for the real-world challenges they will encounter.

With the C|CT, you will gain a globally recognized certification that validates your technical expertise and opens doors to numerous opportunities in the security sector. It is the ideal choice for those starting their careers or professionals seeking to enhance their knowledge and gain a competitive edge in the market.

AN EXCITING CAREER IN SECURITY AWAITS YOU:

As businesses and industries increasingly rely on technology, digital transformation has become ubiquitous in today’s corporate environment. Consequently, security is now critical to every system, device, and data that organizations depend on to operate effectively.

The COVID-19 pandemic further heightened the demand for skilled professionals to address the crises organizations face in the context of growing digitalization and rising cybercrime. According to PayScale (2022), security analysts in the United States earn an average annual salary of $77,000, with most salaries ranging from $54,000 to $116,000 per year. Despite this high demand and attractive compensation, there remains a significant shortage of qualified talent to fill positions and safeguard organizations’ security postures.

Lock2CCT.png

THE CYBERSECURITY TALENT SHORTAGE:

According to a report by the Centre for Strategic & International Studies, 82% of employers face a shortage of security talent (Crumpler & Lewis, 2019). The industry urgently needs IT and security professionals who can tackle the growing global threat of cybercrime.

To address the cybersecurity skills gap, EC-Council developed the Certified Cybersecurity Technician (C|CT) certification. The C|CT goes beyond teaching fundamental concepts, validating participants' IT and security skills through assessments and practical exercises.

Building this strong technical foundation paves the way for a future career in a variety of IT roles. The knowledge and skills acquired through the C|CT can open doors to further specialization in many areas of security, including ethical hacking, penetration testing, digital forensics, and application security.

The EC-Council developed the C|CT to provide individuals starting their careers in IT and security with a certification that validates their practical technical skills.

With the C|CT, EC-Council aims to equip entry-level professionals with the foundational technical skills needed to advance in their careers as security analysts, consultants, engineers, IT administrators, and more. The C|CT lays a groundwork that allows individuals to develop their expertise in specialized domains such as penetration testing, security auditing, and system and network administration.

CCTSolution.png

WHAT IS THE C|CT CERTIFICATION?


The Certified Cybersecurity Technician (C|CT) certification is an entry-level security program developed by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, designed to meet the global demand for security technicians with strong foundational skills.

WHAT MAKES THE C|CT UNIQUE?

 

  • The only foundational security program in the world offering 85 hands-on, real-world labs.

  • An immersive, practical certification delivered in a live Cyber Range.

  • 50% of the training time dedicated to hands-on labs.

  • Performance-based exam, combined with activities in a live Cyber Range.

  • Multidisciplinary learning, covering network defense, ethical hacking, digital forensics, and security operations.

join-world-of-cybersecurity-cct-certification-blog.jpg

WHAT DOES THE C|CT PROGRAM OFFER?

The C|CT equips you with the essential skills to start a career in security, focusing on four core disciplines: network defense, ethical hacking, digital forensics, and security operations.

Key Features:

  1. Solid Foundational Coverage
    The C|CT certification provides comprehensive coverage of the fundamental security domains, combining key concepts with hands-on labs and critical thinking challenges, shaping world-class security technologists.

  2. Live Cyber Range Experience
    While other popular programs rely on simulation and interactivity for practical assessment, the C|CT is conducted in a live Cyber Range using real targets and actual attack systems, offering an immersive and realistic practice and assessment platform.

  3. Capture the Flag Challenges
    The C|CT certification offers critical thinking challenges in a "capture the flag" (CTF) style, accompanying each hands-on exercise. This allows candidates to apply knowledge in practice, providing proven records of skill demonstration. Those who complete the C|CT program will earn the certification and have a verified track record of task completion in a live Cyber Range, proving their ability to perform critical job functions to employers.

  4. Multiple Certifications
    The C|CT program surpasses some of the more common entry-level certifications, like Security+, by offering a fully practical Cyber Range environment instead of simulations, ensuring comprehensive skill development. We believe that candidates who successfully complete the C|CT will also be able to attain advanced-level certifications, such as Security+, without additional training.

  5. More Affordable
    Despite the highly practical and uniquely designed course, incorporating real-world Cyber Range capabilities, the certification remains one of the most affordable in the world!

ec-council-cybersecurity-technician-certification-blog.jpg

Professional Roles for C|CT Certified Professionals:


The C|CT certification prepares IT and security professionals to handle a wide range of complex issues related to the security of software, networks, and IT systems against common threats and attacks.

The C|CT offers a multifaceted approach incorporating network defense, ethical hacking, and security operations to ensure that certification holders have a strong and comprehensive foundation. This foundation allows them to configure, analyze, and identify issues within an organization. The C|CT course equips participants with the skills necessary to perform the following roles:

  • IT Network Specialist

  • Security Technician

  • IT Manager

  • Network Administrator

  • Network Engineer

  • Security Operations Center (SOC) Analyst

Job Description of a Security Technician:


Security technicians provide technical support in security, resolve network security issues, monitor alerts, and follow relevant policies, procedures, and standards to protect an organization's information assets.

StartCarearCCT.png
CCT-1250-x-1667-1.jpg

C|CT Course Program – Topics Covered:

  1. Information Security Threats and Vulnerabilities

  2. Information Security Attacks

  3. Fundamentals of Network Security

  4. Identification, Authentication, and Authorization

  5. Network Security Control: Administrative Control

  6. Network Security Control: Physical Control

  7. Network Security Control: Technical Control

  8. Network Security Evaluation Techniques and Tools

  9. Application Security

  10. Virtualization and Cloud Computing

  11. Wireless Network Security

  12. Mobile Device Security

  13. Internet of Things (IoT) and Operational Technology (OT) Security

  14. Cryptography

  15. Data Security

  16. Network Troubleshooting

  17. Network Traffic Monitoring

  18. Network Log Monitoring and Analysis

  19. Incident Response

  20. Digital Forensics

  21. Business Continuity and Disaster Recovery

  22. Risk Management

What You Will Learn in This Course:

  • Key Concepts in Security, including information security and network security

  • Information Security Threats, Vulnerabilities, and Attacks

  • Different Types of Malware

  • Identification, Authentication, and Authorization

  • Network Security Controls:

    • Administrative Control (structures, laws, acts, governance and compliance programs, security policies)

    • Physical Control (physical and workplace security policies, environmental controls)

    • Technical Control (network security protocols; network segmentation; firewalls; intrusion detection and prevention systems; honeypots; proxies; VPNs; user behavior analysis; network access control; unified threat management; information security and event policies; security orchestration, automation and response; load balancers; antivirus)

  • Network Security Evaluation Techniques and Tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, asset configuration and management)

  • Application Security Design and Testing Techniques

  • Fundamentals of Virtualization, Cloud Computing, and Cloud Security

  • Fundamentals of Wireless Networks, wireless cryptography, and related security measures

  • Fundamentals of Mobile Devices, IoT, OT, and Related Security Measures

  • Cryptography and Public Key Infrastructure

  • Data Security Controls, backup and data retention methods, and data loss prevention techniques

  • Network Troubleshooting, traffic and log monitoring, and suspicious traffic analysis

  • Incident Management and Response Process

  • Digital Forensics and Fundamentals of Digital Evidence, including the phases of a forensic investigation

  • Business Continuity and Disaster Recovery Concepts

Cybersecurity-Technician-ipad.jpg

Who Can Take This Course?

The C|CT is ideal for anyone looking to start a career in security or to build a solid foundation of security concepts and techniques necessary for effectiveness in the field. This course is particularly suited for:

  • Entry-level IT professionals, IT managers, career changers, and those looking to advance in their careers

  • Students and recent graduates

Prerequisites for the C|CT:

There are no specific prerequisites for the C|CT certification, although prior knowledge and experience in IT and networking, with a focus on security, can be beneficial. Candidates should have a basic understanding of computers and computer networks before starting the C|CT program, although essential technologies are covered in the curriculum.

KickstartCCT.png

​​​​​​​Exam Information:

• Exam name: EC-C|CT

• Test format: Multiple Choice

• Total number of questions: 60

• Test duration: 3 hours

• Required score: 70%

Course Duration:

5 Days | 20 Hours | 4 hours per day

SCORPIONSHIELD
CCT

Course Brochures (click the icon)

For more information:

Privacy Notice (GDPR):

Information will not be shared and used exclusively to communicate.

bottom of page