Ec-council | Learning
Certified Cyber Security Technician | CTC
Get CTC certification: basic IT and cybersecurity skills to start your career as a specialist, consultant or network administrator.
About the Certified Cybersecurity Technician course
Course outline
Course plan
- Information security threats and vulnerabilities
- Information security attacks
- Fundamentals of network security
- Identification, authentication and authorisation
- Network security controls – Administrative checks
- Network security controls – Physical checks
- Network security controls – Technical inspections
- Network Security Assessment Techniques and Tools
- Business continuity and disaster recovery
- Application Security
- Virtualization and cloud computing
- Wireless network security
- Security of mobile devices
- IoT and OT security
- Cryptography
- Data security
- Network troubleshooting
- Network traffic monitoring
- Monitoring and analysis of network logs
- Response to incidents
- Judicial computer
- Risk management
Objectives of the course
Key issues affecting cybersecurity (information security and network security)
- Information security threats, vulnerabilities and attacks
- Different types of malware
- Fundamentals of network security
- Network Security Controls:
- Administrative controls (framework, laws, acts, governance and compliance programs, and security policies)
- Physical checks (physical safety checks, workplace safety and environmental checks)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypots, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancers, and anti-malware tools)
- Network security assessment techniques and tools (threat hunt, threat intelligence, vulnerability assessment, ethical hacking, intrusion testing, and configuration and asset management)
- Concepts of identification, authentication and authorisation
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing and cloud security
- Core wireless networks, wireless encryption and security measures
- Basic mobile devices, IoT and OT and their security measures
- Public Key Cryptography and Infrastructure Concepts
- Data security checks, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, surveillance and analysis of newspapers for suspicious traffic
- Incident management and response processes
- Basis of judicial analysis, numerical evidence and stages of judicial investigation
- Business Continuity (BC) and Disaster Recovery (DR) concepts
- Risk management concepts, phases and frameworks
Review
Success Score
In order to maintain the high integrity of our certification exams, the EC-Cuncil exams are offered in several forms (i.e. different question banks). Each form is carefully analyzed through beta tests with an appropriate sample group under the supervision of a committee of experts in the field who ensure that each of our examinations not only has academic rigour but also a applicability in the "real world". We also have a process to determine the difficulty rating of each issue. The individual rating then contributes to a global "Coupure Score" for each form of examination. To ensure that each form has equivalent evaluation standards, cut-off scores are established on a "by examination" basis. Depending on the form of examination being contested, cut-off scores may range from 60% to 78%.
Prefix of examination: 212-82
Number of questions: 60
Duration of examination: 3 hours
Review Format: Multiple Choices and Real Practical Examination
Modalities of the review: EC-Council Review Portal
Roles
- Junior Security Officer
- Network administrator
- Information technology (IT) technical support
- Junior Systems Engineer
- Junior safety engineer
- Systems Administrator
- Junior Cyber Security Technician
- Network Security Technician


