Certified Cybersecurity Technician (CCT)
ONLINE
Level: Beginner
Build a strong foundation in IT and security concepts, from network defense and risk management to incident response and forensics.
The Certified Cybersecurity Technician (CCT) is an entry-level certification by EC-Council, the creators of the Certified Ethical Hacker (CEH) certification.
Developed for individuals with limited IT or security experience, this program combines theoretical knowledge with practical, hands-on exercises to help learners understand, detect, and respond to security threats across diverse environments.
Prerequisites: HS Diploma, G.E.D or equivalent; CompTIA Network+ or equivalent knowledge
Required materials: All required materials are included with tuition
-
There are no mandatory prerequisites for the CCT (Certified Cybersecurity Technician) exam.
Duration: 3 Hours
60 questions
Delivery: Online via the EC-Council exam portal
Passing score: 60% to 85%
-
Cybersecurity Technician
SOC Analyst (Tier 1)
Junior Cybersecurity Analyst
Network Security Technician
Junior Incident Responder
IT Administrator / Systems Administrator (with security duties)
IT Support Specialist (with security duties)
Vulnerability Assessor (Entry-Level)
Network Administrator (with security duties)
Delivery: Online
Format: Instructor-led
Duration: 6 weeks
One 4-hour live session per week
40 hours of self-study
Tuition: $1,499
What’s Included?
CCT exam voucher
Virtual labs
Practice exam
Instructor Support
Certified instructor
Weekly virtual classes
Direct access to instructor via email
Curriculum Breakdown
Topics Covered
Information Security Threats and Vulnerabilities
Information Security Attacks
Network Security Fundamentals
Identification, Authentication, and Authorization
Network Security Controls – Administrative Controls
Network Security Controls – Physical Controls
Network Security Controls – Technical Controls
Network Security Assessment Techniques and Tools
Business Continuity and Disaster Recovery
Application Security
Virtualization and Cloud Computing
Wireless Network Security
Mobile Device Security
IoT and OT Security
Cryptography
Data Security
Network Troubleshooting
Network Traffic Monitoring
Network Logs Monitoring and Analysis
Incident Response
Computer Forensics
Risk Management