Certified Cybersecurity Technician (C|CT)
- 01 January 2040
- 5 days
- 01 January 2050
- 5 days
Launch your future in cybersecurity with globally recognized C|CT training
As an Authorized Training Center of EC-Council, we deliver official C|CT training that equips you with hands-on skills in networks, SOC operations, ethical hacking, and incident response
Key features & benefits
Gain foundational cybersecurity knowledge through practical, hands-on labs
Learn core skills in networks, SOC operations, ethical hacking, and incident response
Build confidence with real-world scenarios and interactive exercises
Get official EC-Council courseware and globally recognized certification
Open the door to entry-level cybersecurity jobs and future career growth
Course outline
Module 01
Information security threats and vulnerabilities
Information security threats and vulnerabilities
Learn how to identify and analyze the most common threats, vulnerabilities, and risks that affect modern systems.
Module 02
Information security attacks
Information security attacks
Understand different attack types, tactics, and techniques used by cybercriminals to compromise networks and data.
Module 03
Network security fundamentals
Network security fundamentals
Build a strong foundation in networking principles, protocols, and core security practices.
Module 04
Identification, authentication, and authorization
Identification, authentication, and authorization
Explore access control mechanisms, authentication methods, and secure identity management.
Module 05
Network security controls – administrative controls
Network security controls – administrative controls
Study frameworks, laws, compliance programs, and governance policies that shape security management.
Module 06
Network security controls – physical controls
Network security controls – physical controls
Understand workplace security, environmental controls, and protection against physical threats.
Module 07
Network security controls – technical controls
Network security controls – technical controls
Learn practical tools and protocols including firewalls, IDS/IPS, segmentation, VPNs, and anti-malware.
Module 08
Network security assessment techniques and tools
Network security assessment techniques and tools
Gain hands-on experience in threat hunting, vulnerability assessment, penetration testing, and asset management.
Module 09
Application security
Application security
Discover secure design principles, testing techniques, and strategies to protect applications.
Module 10
Virtualization and cloud computing
Virtualization and cloud computing
Understand the fundamentals of virtualization and learn how to secure cloud environments.
Module 11
Wireless network security
Wireless network security
Explore wireless encryption, Wi-Fi security standards, and common attack vectors.
Module 12
Mobile device security
Mobile device security
Learn how to secure smartphones, tablets, and other mobile endpoints.
Module 13
IoT and OT security
IoT and OT security
Understand the unique risks of IoT and operational technology devices, and how to secure them.
Module 14
Cryptography
Cryptography
Study encryption methods, digital signatures, and public key infrastructure (PKI).
Module 15
Data security
Data security
Learn about data protection techniques, backup strategies, and data loss prevention.
Module 16
Network troubleshooting
Network troubleshooting
Develop the ability to analyze and resolve common network issues.
Module 17
Network traffic monitoring
Network traffic monitoring
Use monitoring tools to analyze traffic patterns and detect suspicious activity.
Module 18
Network logs monitoring and analysis
Network logs monitoring and analysis
Understand logging, SIEM integration, and how to detect threats using log data.
Module 19
IoT Incident response
IoT Incident response
Gain practical knowledge in incident handling, mitigation, and recovery
Module 20
Computer forensics
Computer forensics
Learn the basics of digital forensics, evidence collection, and investigation procedures.
Module 21
Business continuity and disaster recovery
Business continuity and disaster recovery
Study strategies to maintain operations and recover from security incidents or outages.
Module 22
Risk management
Risk management
Understand risk management concepts, frameworks, and processes for ongoing security.
Our partners & vendors







Ready to grow your cybersecurity team?
Training prerequisites
Core knowledge
Basic understanding of computer usage and operating systems.
Familiarity with fundamental IT concepts is recommended.
Technical skills
General awareness of networking and security concepts is helpful, but not mandatory.
Enthusiasm to learn and apply cybersecurity practices in hands-on labs.
OS & tools
Comfortable using Windows or Linux environments at a beginner level.
Willingness to work with common IT and security tools during training.
Training & register details
TRAINING OVERVIEW
Certified Cybersecurity Technician (C|CT)
Build a strong foundation to launch your career in one of the world’s fastest-growing industries

Training Duration: 5 days (40 hours)

Format: Instructor-Led Online

Level: Entry-level (no prior cybersecurity experience required)

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 offline
HOW TO REGISTER
1. Submit your application
Submit a quick application to let us know you’re interested in the course.
2. Intro call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm your spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start learning
Access your learning platform and get familiar with the materials.
5. Join the community
Get access to the student chat, events, and mentorship opportunities.
Who is C|CT for?
Aspiring professionals
Start your cybersecurity career with a globally recognized certification that provides hands-on, practical skills
Students & graduates
Build a strong technical foundation and gain job-ready skills that employers in the cybersecurity industry demand
IT support & helpdesk staff
Expand your knowledge beyond IT basics and step into security roles with practical SOC and network defense skills.
Organizations & teams
Equip entry-level employees with standardized, vendor-approved cybersecurity training to strengthen your workforce
FAQ
What are the prerequisites for the C|CT Program?
A cybersecurity technician is engaged in providing technical assistance to protect an organization from cyber threats. While their role may vary depending on the enterprise, some of the key responsibilities of a cyber technician include troubleshooting network performance issues, reporting and escalating issues, implementing security measures, and conducting risk assessments, among other tasks.
Is C|CT accredited?
C|CT is accredited by the ANAB (ANSI National Accreditation Board) under the ISO/IEC 17024 standards.
What are the prerequisites for the C|CT Program?
There are no specific prerequisites for enrolling in the C|CT course or attempting the C|CT certification exam. While this is an entry-level course, having a basic understanding of IT networking and cybersecurity concepts will be beneficial.
Who can attend this Certified Cybersecurity Technician course?
The C|CT course is open to students, IT professionals, IT managers, career changers, and anyone seeking a career in cybersecurity or aspiring to advance in their existing role. This course is ideal for those entering the cybersecurity workforce, as it provides foundational, technician-level, hands-on skills to address the most common security challenges organizations face today.
