Training plan
Module 1: Information security threats and vulnerabilities
This module explores the various threats and vulnerabilities that information systems face.
Module 2: Information Security Attacks
This module covers the different attacks against information security and their execution methods.
Module 3: Network Security Fundamentals
This module introduces the basic principles of computer network security.
Module 4: Identification, Authentication, and Authorization
This module addresses the mechanisms of identification, authentication, and authorization of users and systems.
Module 5: Network Security Controls: Administrative Controls
This module focuses on the administrative controls necessary to secure a network.
Module 6: Network Security Controls: Physical Controls
This module deals with physical controls intended to protect network infrastructure.
Module 7: Network Security Controls: Technical Controls
This module examines the technical controls that enhance network security.
Module 8: Network Security Assessment Techniques and Tools
This module explores the techniques and tools used to assess network security.
Module 9: Application Security
This module focuses on the practices and methods for securing applications.
Module 10: Virtualization and Cloud Computing
This module addresses the security challenges and solutions in virtualization and Cloud Computing environments.
Module 11: Wireless Network Security
This module examines the specific aspects of security for wireless networks.
Module 12: Mobile Device Security
This module addresses the security issues and solutions for mobile devices.
Module 13: Internet of Things (IoT) and Operational Technology (OT) Security
This module covers the specifics of security for the Internet of Things and operational technologies.
Module 14: Cryptography
This module presents the principles and applications of cryptography for data protection.
Module 15: Data Security
This module deals with the methods and practices for ensuring data security.
Module 16: Network Troubleshooting
This module focuses on troubleshooting techniques to resolve network issues.
Module 17: Network Traffic Monitoring
This module examines the methods for monitoring network traffic to detect suspicious activities.
Module 18: Network Log Monitoring and Analysis
This module deals with the monitoring and analysis of network logs to identify security incidents.
Module 19: Incident Response
This module explores the procedures and strategies for responding to security incidents.
Module 20: Computer Forensics
This module addresses the principles and practices of digital forensics for investigating cybercrimes.
Module 21: Business Continuity and Disaster Recovery
This module deals with business continuity and disaster recovery plans to ensure system resilience.
Module 22: Risk Management
This module focuses on risk management techniques to identify and mitigate potential threats.
Recommended Prerequisite Knowledge
- Basic Knowledge: Participants should have a fundamental understanding of computer systems and basic networking principles.
- Prior Experience: While not mandatory, having some practical experience in IT or related fields can be beneficial.
- Technical Skills: Familiarity with operating systems, particularly Windows and Linux, as well as a basic understanding of cybersecurity concepts, is recommended.
- Interest in Cybersecurity: A strong interest and enthusiasm for learning the fundamentals and techniques of cybersecurity.
Credentials and certification
Exam features
- Code: 212-82
- Title: Certified Cybersecurity Technician
- Duration: 3 hours
- Number of Questions: 60
- Question Format: Multiple Choice
- Online with EC-Council Exam Center
- Cost: $0 (included in your training)