- Instructor: arafat.yasir2010@gmail.com
- Duration: 10 weeks
Certified Cyber Security Technician
The Certified Cybersecurity Technician (CICT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (CEH) certification, to address the global demand for a qualified cybersecurity workforce.
EC-Council developed the CICT to provide individuals starting their careers in IT and cybersecurity with a certification that validates their hands-on technical skills.
To equip individuals with the skills they need to pursue and develop their careers as cybersecurity specialists, consultants, network engineers, IT administrators, and more.
View Training Brochure
View Course ContentWHAT IS UNIQUE ABOUT THE C|CT?
Benefits of C|CT
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v12 continues to Introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.
- Key issues plaguing the cybersecurity industry (information security and network security)
- Information security threats, vulnerabilities, and attacks
- Different types of malware
- Network security fundamentals
- Identification, authentication, and authorization concepts
- Network security controls Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies) Physical controls (physical security controls, workplace security, and environmental controls) Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing. and configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of mobile, loT, and OT devices and their security measures
- Cryptography and public key infrastructure concepts
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
Why Certified Ethical Hacker V12 (CEHv12)?
Incorporating Parrot Security OS
Parrot Security OS outperforms Kali Linux in terms of performance on laptops and other low-powered devices while providing a more user-friendly interface and a wider selection of general tools.
Re-Mapped to NIST/NICE Framework
The NIST/NICE framework’s Protect and Defend (PR) job role category overlaps with other job roles, such as Analyze (AN) and Securely Provision, and CEH v12 is carefully linked to significant Specialty Areas (SP).
Enhanced Cloud Security, IoT, and OT Modules
Updated Cloud and IoT modules in CEH v12 include Cloud Computing risks, IoT hacking tools, and CSP’s Container Technologies (such as Docker and Kubernetes) (e.g. Shikra, Bus Pirate, Facedancer21, and more). As the world goes toward bigger and deeper cloud adoptions, this is crucial.
Cloud−Based Threats
Businesses struggle to reduce the frequency of data theft events caused by improperly configured cloud systems as the cloud market is predicted to reach $354 billion by 2022. Just from January to April 2020, cloud-based attacks increased by 630%. With CEH v12, discover how to avoid, recognise, and react to cloud-based threats.
IoT Threats
According to market forecasts, 43 billion IoT-connected devices are predicted to exist worldwide by 2023. In order to accommodate this quick expansion, major internet giants like Amazon Web Services, Google, IBM, and Microsoft are moving quickly to private cloud services, complicating IoT ecosystems. The latest IoT hacking tools, including Shikra, Bus Pirate, Facedancer21, and many others, are covered in the CEH v12 course on how to defend against IoT-based assaults.
Operational Technology (OT} Attacks
Businesses saw a 2000% increase in OT-related occurrences last year. For the purpose of securing crucial enterprise OT/IoT projects, you can obtain knowledge in OT, IT, and IIoT (industrial IoT). To learn the advanced OT skills, CEH covers OT concepts like ICS, SCADA, and PLC, as well as OT challenges, OT hacking techniques, tools, and OT network communication protocols like Modbus, Profinet, HART-IP, SOAP, CANopen, DeviceNet, Zigbee, Profibus, etc. Remote access is also covered using the DNP3 protocol.
Modern Malware Analysis
The most recent malware analysis techniques for ransomware, financial and banking malware, IoT botnets, OT malware analysis, Android malware, and more are now included in CEH v12!
Covering the Latest Threats – Fileless Malware
The security community started to express worries about fileless malware assaults as it noticed an increase in fileless attacks. As a relatively new type of malware assault, fileless malware is challenging for enterprises to identify using endpoint protection solutions. The course focuses on the taxonomy of fileless malware threats, fileless malware obfuscation techniques to bypass antivirus, launching fileless malware through script-based injection, launching fileless malware through phishing, and more. With the CEH v12, you can now learn various fileless malware techniques with associated defensive strategies.
New Lab Designs and Operating Systems
The most recent version of CEH v12 comes with new operating systems, including Windows Server 2019, Windows Server 2016, and Windows 10 equipped with Domain Controller, firewalls, and vulnerable web applications for hacking practise and skill improvement.
Increased Lab Time and Hands−on Focus
Through EC-Council labs, more than 50% of the CEH v12 course is devoted to practical skills on real shooting ranges. Leading the industry in this area is EC-Council.
Industry’s Most Comprehensive Tools Library.
A library of the most recent tools needed by security professionals and pen testers worldwide is included in the CEH v12 course.