1 – Information Security Threats and Vulnerabilities
2 – Information Security Attacks
3 – Network Security Fundamentals
4 – Identification, Authentication, and Authorization
5 – Network Security Controls: Administrative Controls
6 – Network Security Controls: Administrative Controls
7 – Network Security Controls: Technical Controls
8 – Network Security Assessment Techniques and Tools
9 – Application Security
10 – Virtualization and Cloud Computing
11 – Wireless Network Security
12 – Mobile Device Security
13 – Internet of Things (IoT) and Operational Technology (OT) Security
14 – Cryptography
15 – Data Security
16 – Network Troubleshooting
17 – Network Traffic Monitoring
18 – Network Log Monitoring and Analysis
19 – Incident Response
20 – Computer Forensics
21 – Business Continuity and Disaster Recovery
22 – Risk Management
- Key concepts in cybersecurity, including information security and network security
- Information security threats, vulnerabilities, and attacks
- The different types of malware
- Identification, authentication, and authorization
- Network security controlsNetwork security assessment techniques and tools (threat hunting, threat intelligence, vulnerability
assessment, ethical hacking, penetration testing, configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and related security measures
- Fundamentals of mobile, IoT, and OT devices and related security measures
- Cryptography and public-key infrastructure
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
- The incident handling and response process
- Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
- Concepts in business continuity and disaster recovery
- Risk management concepts, phases, and frameworks
No specific prerequisites are required for the C|CT certification, although previous knowledge and experience in IT and networking with a focus on cybersecurity can be an advantage. Candidates should have knowledge of computers and computer networks prior to entering the C|CT program, although core technologies are covered in the curriculum.
Ten (10) business days’ notice is required to reschedule a class with no additional fees. Notify TOPTALENT LEARNING as soon as possible at 469-721-6100 or by written notification to info@toptalentlearning.com to avoid rescheduling penalties.
Please contact our team at 469-721-6100; we will gladly guide you through the online purchasing process.
You will receive a receipt and an enrollment confirmation sent to the email you submitted at purchase. Your enrollment email will have instructions on how to access the class. Any additional questions our team is here to support you. Please call us at 469-721-6100.
If a student is 15 minutes late, they risk losing their seat to a standby student. If a student is 30 minutes late or more, they will need to reschedule. A no-show fee will apply. Retakes are enrolled on a stand-by basis. The student must supply previously issued courseware. Additional fees may apply.
You will receive a ‘Certificate of Completion’ once you complete the class. If you purchased an exam voucher for the class, a team member from TOPTALENT LEARNING will reach out to discuss your readiness for the voucher and make arrangements to send it.