Course Overview
This foundational training provides hands-on cybersecurity skills development aligned with EC-Council’s C|CT certification. Covering essential defensive and offensive security concepts, the course equips participants with practical abilities in network defense, ethical hacking, and security operations. Through immersive labs and real-world scenarios, attendees will gain technical proficiency across multiple security domains.
Course Objectives
Upon completion, participants will be able to:
✔ Implement basic network security controls and monitoring
✔ Conduct vulnerability assessments and basic penetration tests
✔ Analyze security events and identify threats
✔ Apply fundamental digital forensic techniques
✔ Understand security policies and compliance requirements
✔ Prepare for the EC-Council C|CT certification exam
Who Should Attend
This course is designed for:
◼ Entry-level cybersecurity professionals
◼ IT administrators transitioning to security roles
◼ SOC analysts and security operations staff
◼ Network engineers expanding security skills
◼ Students pursuing cybersecurity careers
Course Content
Cybersecurity Fundamentals
- Cybersecurity concepts and threat landscape
• Security policies and compliance basics
• Network protocols and security implications
• Hands-on: Configuring basic firewall rules
Network Defense & Monitoring
- Network security architecture components
• Intrusion detection/prevention systems (IDS/IPS)
• Security Information and Event Management (SIEM) basics
• Lab: Analyzing network traffic for threats
Vulnerability Assessment
- Vulnerability scanning methodologies
• Common vulnerability scoring system (CVSS)
• Configuration assessment techniques
• Practical: Conducting vulnerability scans
Ethical Hacking Essentials
- Reconnaissance and footprinting techniques
• Basic penetration testing methodology
• Exploitation fundamentals
• Lab: Simulated penetration test exercise
Incident Response & Digital Forensics
- Security incident handling process
• Basic digital forensic investigation
• Malware analysis fundamentals
• Capstone: Responding to a security breach scenario