1 - Course Outline
Information Security Threats and Vulnerabilities Information Security AttacksNetwork Security FundamentalsIdentification, Authentication, and AuthorizationNetwork Security Controls: Administrative ControlsNetwork Security Controls: Physical ControlsNetwork Security Controls: Technical ControlsNetwork Security Assessment Techniques and ToolsApplication SecurityVirtualization and Cloud ComputingWireless Network SecurityMobile Device SecurityInternet of Things (IoT) and Operational Technology (OT) SecurityCryptographyData SecurityNetwork TroubleshootingNetwork Traffic MonitoringNetwork Log Monitoring and AnalysisIncident ResponseComputer ForensicsBusiness Continuity and Disaster RecoveryRisk Management
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to:
Early-career IT professionals, IT managers, career changers, and career advancers
Students and recent graduates
No specific prerequisites are required for the C|CT certification, although previous knowledge and experience in IT and networking with a focus on cybersecurity can be an advantage. Candidates should have knowledge of computers and computer networks prior to entering the C|CT program, although core technologies are covered in the curriculum.