Overview

Description

Course Outline
  • Module 1: Information Security Threats and Vulnerabilities
  • Module 2: Information Security Attacks
  • Module 3: Network Security Fundamentals
  • Module 4: Identification, Authentication and Authorization
  • Module 5: Network Security Controls – Administrative Controls
  • Module 6: Network Security Controls – Physical Security
  • Module 7: Network Security Controls – Technical Controls
  • Module 8: Network Security Assessments Techniques and Tools
  • Module 9: Application Security
  • Module 10: Virtualization and Cloud Computing
  • Module 11: Wireless Network Security
  • Module 12: Mobile Device Security
  • Module 13: IoT and OT Security
  • Module 14: Cryptography
  • Module 15: Data Security
  • Module 16: Network Troubleshooting
  • Module 17: Network Traffic Monitoring
  • Module 18: Network Logs Monitoring and Analysis
  • Module 19: Incident Response
  • Module 20: Computer Forensics
  • Module 21: Business Continuity and Disaster Recoveries
  • Module 22: Risk Management

The C|CT program allows individuals to eventually grow their skills into various roles, including penetration testing, security consulting, auditor and administrator roles, and beyond

5 days (40 hours)

Number of Questions: 60

Test Duration:
3 hours

Test Format:
Multiple Choice Questions

Passing Score:
70%