Certified Cybersecurity Technician

CCT Banner
  • Avatar
    SQI
  • 40 hours

Introduction

  • Provides total foundational cybersecurity domain coverage with key concepts in each domain combined with practical hands-on labs and critical thinking challenges producing world-class cyber security technologists.
  • Practise based on live Cyber Range utilizing live targets and real attack systems for a truly immersive, real attack systems for a truly immersive, real-life practice and assessment platform.
  • Acquire capture the flag (CTF) style critical thinking challenges to accompany each lab exercise putting knowledge into practice and providing a proven record of skill demonstration.

Duration

5 days | 9am – 6pm | 40 hours

Who Should Attend

Individuals with core security skills.

Entry Requirement

GCE O’level, ITE, Diploma, or an equivalent qualification with experience in IT or Cybersecurity.

Methodology

Prepares IT & Cybersecurity professionals to handle a wide range of complex issues related to securing software, networks, and IT systems against common cyberthreats and attacks.

Incorporating network defense, ethical hacking, and security operations to ensure that certification holders have a strong, well rounded background that enables them to configure, analyze and identify problems within an organization.

Course Fees

Member: S$1,928.88
Non-Member: S$2052.00

Registration Fee of S$17.28 apply.
All fees stated are inclusive of 8% GST

Award of Certificate

Certificate of Completion will be issued to participants who have attended at least 75% of the course.

Exam Certification will be issued by EC-Council upon passing of the exam.

Course Content

Total Training Hours: 40 hours
  • Course Outline  0/22

    • Lecture1.1
      Information security threats and vulnerabilities
    • Lecture1.2
      Information Security Attacks
    • Lecture1.3
      Network Security Fundamentals
    • Lecture1.4
      Identification, Authentication & Authorization
    • Lecture1.5
      Network Security Controls: Administrative Controls
    • Lecture1.6
      Network Security Controls: Physical Controls
    • Lecture1.7
      Network Security Controls: Technical Controls
    • Lecture1.8
      Network Security Assessment Techniques and Tools
    • Lecture1.9
      Application Security
    • Lecture1.10
      Virtualization and Cloud Computing
    • Lecture1.11
      Wireless Network Security
    • Lecture1.12
      Mobile Device Security
    • Lecture1.13
      Internet of Things (IoT) and Operational Technology (OT) Security
    • Lecture1.14
      Cryptography
    • Lecture1.15
      Data Security
    • Lecture1.16
      Network Troubleshooting
    • Lecture1.17
      Network Traffic Monitoring
    • Lecture1.18
      Network Log Monitoring & Analysis
    • Lecture1.19
      Incident response
    • Lecture1.20
      Computer Forensics
    • Lecture1.21
      Business Continuity and Disaster Recovery
    • Lecture1.22
      Risk Management

Trainer

Avatar
SQI
CCT