Certified Cybersecurity Technician Certification Course Outline
Module 1: Information Security Threats and Vulnerabilities
- Identifying Common Threats
- Vulnerability Assessment
- Risk Evaluation
Module 2: Information Security Attacks
- Social Engineering Attacks
- Network Attacks
- Application-Level Attacks
Module 3: Network Security Fundamentals
- Basics of Network Layers
- Security Protocols
- Network Architecture Security
Module 4: Identification, Authentication, and Authorisation
- Types of Authentication Methods
- Role-Based Access Control (RBAC) Systems
- Biometric Systems
Module 5: Network Security Controls – Administrative Controls
- Security Policies and Procedures
- Compliance and Auditing
- User Training and Awareness Programs
Module 6: Network Security Controls – Physical Controls
- Access Control Mechanisms
- Surveillance and Monitoring
- Environmental Controls
Module 7: Network Security Controls – Technical Controls
- Firewalls and Intrusion Detection Systems
- Encryption Technologies
- Endpoint Security
Module 8: Network Security Assessment Techniques and Tools
- Penetration Testing
- Vulnerability Scanning
- Security Audits
Module 9: Business Continuity and Disaster Recovery
- Disaster Recovery Planning
- Business Continuity Strategies
- Data Backup and Recovery Solutions
Module 10: Application Security
- Secure Software Development Lifecycle (SDLC)
- Application Vulnerability Testing
- Code Review and Security Testing
Module 11: Virtualisation and Cloud Computing
- Securing Virtual Environments
- Cloud Security Architectures
- Cloud Service Models and Security
Module 12: Wireless Network Security
- Wireless Protocols and Encryption
- Securing Wireless Networks
- Wireless Vulnerability Assessments
Module 13: Mobile Device Security
- Mobile Security Best Practices
- Mobile Device Management (MDM)
- Securing Mobile Applications
Module 14: IoT and OT Security
- Security Challenges in IoT
- Securing IoT Devices
- Security in Operational Technology
Module 15: Cryptography
- Fundamentals of Cryptography
- Cryptographic Algorithms
- Cryptography Applications
Module 16: Data Security
- Data Encryption
- Data Masking Techniques
- Secure Data Storage
Module 17: Network Troubleshooting
- Troubleshooting Methodologies
- Common Network Problems
- Tools for Troubleshooting
Module 18: Network Traffic Monitoring
- Techniques for Monitoring Traffic
- Tools and Applications for Traffic Analysis
- Real-Time Traffic Analysis
Module 19: Network Logs Monitoring and Analysis
- Log Management and Analysis Techniques
- Security Information and Event Management (SIEM)
- Log Analysis Tools
Module 20: Incident Response
- Incident Response Lifecycle
- Preparation and Identification
- Containment, Eradication, and Recovery
Module 21: Computer Forensics
- Fundamentals of Computer Forensics
- Forensic Analysis Techniques
- Legal Considerations in Forensics
Module 22: Risk Management
- Risk Assessment Methods
- Mitigation Strategies
- Continuous Monitoring and Review