Duration: 5 days

About this Course

The EC-Council CCT: Certified Cybersecurity Technician is an entry-level cybersecurity certification engineered by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, to address the global need and demand for cybersecurity technicians with strong foundational skills. CCT certification training is focused on hands-on practice, with more than 50% of training time dedicated to labs.

The EC-Council CCT certification course is accompanied by critical thinking tasks and immersive lab exercises that allow candidates to apply their knowledge and move into the skill development phase in the class itself.

The CCT certification training develops participants’ fundamental cybersecurity skills across the fields of network defense, ethical hacking, digital forensics, and security operations, giving learners the foundation they need to kickstart a career in cybersecurity. This course prepares you for EC-Council Certified Cybersecurity Technician exam 212-82.

Target Audience
* Early-career IT professionals
* IT Managers
* Career Changers
* Career Advancers
* Students and recent graduates

* 212-82 CCT: EC-Council CCT: Certified Cybersecurity Technician with Remote Proctoring Services

At the end of the course, students will be able to:
* Key concepts in cybersecurity, including information security and network security
* Information security threats, vulnerabilities, and attacks
* The different types of malware
* Identification, authentication, and authorization
* Network security controls
* Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability
assessment, ethical hacking, penetration testing, configuration and asset management)
* Application security design and testing techniques
* Fundamentals of virtualization, cloud computing, and cloud security
* Wireless network fundamentals, wireless encryption, and related security measures
* Fundamentals of mobile, IoT, and OT devices and related security measures
* Cryptography and public-key infrastructure
* Data security controls, data backup and retention methods, and data loss prevention techniques
* Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
* The incident handling and response process
Page 1 of 2
* Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
* Concepts in business continuity and disaster recovery
* Risk management concepts, phases, and frameworks

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

Training Solutions

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.


  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll

Course Outline

1) Information Security Threats and Vulnerabilities
2) Information Security Attacks
3) Network Security Fundamentals
4) Identification, Authentication, and Authorization
5) Network Security Controls – Administrative Controls
6) Network Security Controls – Physical Controls
7) Network Security Controls – Technical Controls
8) Network Security Assessment Techniques and Tools
9) Business Continuity and Disaster Recovery
10) Application Security
11) Virtualization and Cloud Computing
12) Wireless Network Security
13) Mobile Device Security
14) IoT and OT Security
15) Cryptography
16) Data Security
17) Network Troubleshooting
18) Network Traffic Monitoring
19) Network Logs Monitoring and Analysis
20) Incident Response
21) Computer Forensics
22) Risk Management