TDI

Certified Cybersecurity Technician (C_CT)

Duration

5 Days

Start Date

25-May-2026

End Date

29-May-2026

Venue

CAIRO – EGYPT

price

1475 KD

20% discount for group above 5 attendees

Course Overview

This foundational training provides hands-on cybersecurity skills development aligned with EC-Council’s C|CT certification. Covering essential defensive and offensive security concepts, the course equips participants with practical abilities in network defense, ethical hacking, and security operations. Through immersive labs and real-world scenarios, attendees will gain technical proficiency across multiple security domains.

Course Objectives

Upon completion, participants will be able to:
✔ Implement basic network security controls and monitoring
✔ Conduct vulnerability assessments and basic penetration tests
✔ Analyze security events and identify threats
✔ Apply fundamental digital forensic techniques
✔ Understand security policies and compliance requirements
✔ Prepare for the EC-Council C|CT certification exam

Who Should Attend

This course is designed for:
◼ Entry-level cybersecurity professionals
◼ IT administrators transitioning to security roles
◼ SOC analysts and security operations staff
◼ Network engineers expanding security skills
◼ Students pursuing cybersecurity careers

Course Content 

 Cybersecurity Fundamentals

  • Cybersecurity concepts and threat landscape
    • Security policies and compliance basics
    • Network protocols and security implications
    • Hands-on: Configuring basic firewall rules

 Network Defense & Monitoring

  • Network security architecture components
    • Intrusion detection/prevention systems (IDS/IPS)
    • Security Information and Event Management (SIEM) basics
    • Lab: Analyzing network traffic for threats

 Vulnerability Assessment

  • Vulnerability scanning methodologies
    • Common vulnerability scoring system (CVSS)
    • Configuration assessment techniques
    • Practical: Conducting vulnerability scans

 Ethical Hacking Essentials

  • Reconnaissance and footprinting techniques
    • Basic penetration testing methodology
    • Exploitation fundamentals
    • Lab: Simulated penetration test exercise

Incident Response & Digital Forensics

  • Security incident handling process
    • Basic digital forensic investigation
    • Malware analysis fundamentals
    • Capstone: Responding to a security breach scenario