CCT COURSE MODULES
1. Module 1 - Information Security Threats and Vulnerabilities
Overview of Threats Sources
Overview of Threat Actors/Agents
Understanding Malware and its Types
Overview of Vulnerabilities
Understanding Different Types of Vulnerabilities
2. Module 2 - Information Security Attacks
Overview of Information Security Attacks
Overview of Hacking Methodologies and Frameworks
Understanding Network-level Attacks
Understanding Application-level and OS-level Attacks
Understanding Social Engineering Attacks
Understanding Wireless Network-specific Attacks
Understanding IoT, OT, and Cloud Attacks
Understanding Cryptographic Attacks
3. Module 3 - Network Security Fundamentals
verview of Information Security Fundamentals
Overview of Network Security Fundamentals
4. Module 4 - Identification, Authentication, and Authorization
Overview of Access Control Principles, Terminologies, and Models
Overview of Identity and Access Management (IAM)
5. Module 5 - Network Security Controls - Administrative Controls
Understanding Various Regulatory Frameworks, Laws, and Acts
Overview of Information Security Governance and Compliance Program
Learn to Design and Develop Security Policies
Learn to Conduct Different Type of Security and Awareness Training
6. Module 6 - Network Security Controls - Physical Controls
Understanding the Importance of Physical Security
Understanding Various Physical Security Controls
Overview of Workplace Security
Understanding Various Environmental Controls
7. Module 7 - Network Security Controls - Technical Controls
Overview of Essential Network Security Protocols
Understanding Security Benefits of Network Segmentation
Understanding Different Types of Firewalls and their Role
Understanding Different Types of IDS/IPS and their Role
Understanding Different Types of Honeypots
Understanding Different Types of Proxy Servers and their Benefits
Overview of VPN and its importance in Network Security
Overview of Other Network Security Controls
Understanding Importance of Load Balancing in Network Security
Understanding Various Antivirus/Anti-malware Software
8. Module 8 - Network Security Assessment Techniques and Tools
Overview of Threat Hunting
Understanding Various Threat Intelligence Feeds and Sources
Overview of Vulnerability Assessment
Overview of Ethical Hacking Concepts
Understanding Fundamentals of Penetration Testing and its Benefits
Understanding the Fundamentals of Configuration Management and Asset
Management
9. Module 9 - Application Security
Understanding Secure Application Design and Architecture
Understanding Software Security Standards, Models, and Frameworks
Understanding Secure Application, Development, Deployment, and Automation
Overview of Application Security Testing Techniques and Tools
10. Module 10 - Virtualization and Cloud Computing
Overview of Virtualization Essential Concepts and OS Virtualization Security
Overview of Cloud Computing Fundamentals
Understanding the Insights of Cloud Security and Best Practices
11. Module 11 - Wireless Network Security
Overview of Wireless Network Fundamentals
Overview of Wireless Network Encryption Mechanisms
Understanding Different Types of Wireless Network Authentication Methods
Understanding and Implementing Wireless Network Security Measures
12. Module 12 - Mobile Device Security
Understanding Various Mobile Device Connection Methods
Understanding Various Mobile Device Management Concepts
Overview of Common Mobile Usage Policies in Enterprises
Overview of Security Risks and Guidelines Associated with Enterprises Mobile
Usage Policies
Understanding and Implementing Various Enterprise-level Mobile Security
Management Solutions
Understanding and Implementing General Security Guidelines and Best Practices on
Mobile Platforms
13. Module 13 - IoT and OT Security
Understanding IoT Devices, Application Areas, and Communication Models
Overview of Security in IoT-enabled Environments
Understanding OT Concepts, Devices, and Protocols
Overview of Security in OT-enabled Environments
14. Module 14 - Cryptography
Overview of Cryptographic Security Techniques
Understanding Various Cryptographic Algorithms
Understanding Various Hash Functions and Cryptography Tools
Overview of PKI and Certificate Management Concepts
Understanding Other Applications of Cryptography
15. Module 15 - Data Security
Understanding Data Security and its Importance
Understanding Various Data Security Controls
Overview of Data Backup, Retention, and Destruction
Overview of Data Loss Prevention Concepts
16. Module 16 - Network Troubleshooting
Overview of Network Troubleshooting
Learn Troubleshooting Basic Network Issues using Utilities and Tools
17. Module 17 - Network Traffic Monitoring
Understanding the Need and Advantages of Network Traffic Monitoring
Understanding Baseline Traffic Signatures for Normal and Suspicious Network
Traffic
Perform Network Monitoring for Suspicious Traffic
18. Module 18 - Network Logs Monitoring and Analysis
Overview of Logging Concepts
Understanding Log Monitoring and Analysis on Windows Systems
Understanding Log Monitoring and Analysis on Linux
Understanding Various Log Management Tools
19. Module 19 - Incident Response
Overview of Incident Response Concepts
Understanding the Role of First Responder in Incident Response
Overview of Incident Handling and Response Process
20. Module 20 - Computer Forensics
Understanding the Fundamentals of Computer Forensics
Understanding Digital Evidence
Identify the Roles and Responsibilities of a Forensic Investigator
Understanding the Forensic Investigation Process and its Importance
Understanding Various Forensic Investigation Phases
Understanding Digital Evidence Sources to Support Forensic Investigation
Collecting the Evidence
Securing the Evidence
Overview of Data Acquisition
Performing Evidence Analysis
21. Module 21 - Business Continuity and Disaster Recovery
Understanding Business Continuity (BC) and Disaster Recovery (DR) Concepts
Overview of BC/DR Activities
Understanding Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
22. Module 22 - Risk Management
Understanding Risk Management Concepts
Understanding Various Risk Management Phases
Understanding Various Risk Management Frameworks