Course Outline
1 - Course Outline
- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Network Security Assessment Techniques and Tools
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- Internet of Things (IoT) and Operational Technology (OT) Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
- Network Log Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management
Target Audience
The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to:
Early-career IT professionals, IT managers, career changers, and career advancers
Students and recent graduates