0% found this document useful (0 votes)
120 views4 pages

CCT Course Modules

The document outlines a comprehensive curriculum for a CCT course, consisting of 22 modules covering various aspects of information security, including threats, attacks, network security, application security, and incident response. Each module provides an overview of key concepts, techniques, and best practices essential for understanding and implementing effective security measures. The course also addresses emerging technologies such as IoT, cloud computing, and mobile device security, along with risk management and business continuity planning.

Uploaded by

Wakanda Citizen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views4 pages

CCT Course Modules

The document outlines a comprehensive curriculum for a CCT course, consisting of 22 modules covering various aspects of information security, including threats, attacks, network security, application security, and incident response. Each module provides an overview of key concepts, techniques, and best practices essential for understanding and implementing effective security measures. The course also addresses emerging technologies such as IoT, cloud computing, and mobile device security, along with risk management and business continuity planning.

Uploaded by

Wakanda Citizen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CCT COURSE MODULES

1. Module 1 - Information Security Threats and Vulnerabilities

 Overview of Threats Sources


 Overview of Threat Actors/Agents
 Understanding Malware and its Types
 Overview of Vulnerabilities
 Understanding Different Types of Vulnerabilities

2. Module 2 - Information Security Attacks

 Overview of Information Security Attacks


 Overview of Hacking Methodologies and Frameworks
 Understanding Network-level Attacks
 Understanding Application-level and OS-level Attacks
 Understanding Social Engineering Attacks
 Understanding Wireless Network-specific Attacks
 Understanding IoT, OT, and Cloud Attacks
 Understanding Cryptographic Attacks

3. Module 3 - Network Security Fundamentals

 verview of Information Security Fundamentals


 Overview of Network Security Fundamentals

4. Module 4 - Identification, Authentication, and Authorization

 Overview of Access Control Principles, Terminologies, and Models


 Overview of Identity and Access Management (IAM)

5. Module 5 - Network Security Controls - Administrative Controls

 Understanding Various Regulatory Frameworks, Laws, and Acts


 Overview of Information Security Governance and Compliance Program
 Learn to Design and Develop Security Policies
 Learn to Conduct Different Type of Security and Awareness Training

6. Module 6 - Network Security Controls - Physical Controls

 Understanding the Importance of Physical Security


 Understanding Various Physical Security Controls
 Overview of Workplace Security
 Understanding Various Environmental Controls

7. Module 7 - Network Security Controls - Technical Controls

 Overview of Essential Network Security Protocols


 Understanding Security Benefits of Network Segmentation
 Understanding Different Types of Firewalls and their Role
 Understanding Different Types of IDS/IPS and their Role
 Understanding Different Types of Honeypots
 Understanding Different Types of Proxy Servers and their Benefits
 Overview of VPN and its importance in Network Security
 Overview of Other Network Security Controls
 Understanding Importance of Load Balancing in Network Security
 Understanding Various Antivirus/Anti-malware Software

8. Module 8 - Network Security Assessment Techniques and Tools

 Overview of Threat Hunting


 Understanding Various Threat Intelligence Feeds and Sources
 Overview of Vulnerability Assessment
 Overview of Ethical Hacking Concepts
 Understanding Fundamentals of Penetration Testing and its Benefits
 Understanding the Fundamentals of Configuration Management and Asset
Management

9. Module 9 - Application Security

 Understanding Secure Application Design and Architecture


 Understanding Software Security Standards, Models, and Frameworks
 Understanding Secure Application, Development, Deployment, and Automation
 Overview of Application Security Testing Techniques and Tools

10. Module 10 - Virtualization and Cloud Computing

 Overview of Virtualization Essential Concepts and OS Virtualization Security


 Overview of Cloud Computing Fundamentals
 Understanding the Insights of Cloud Security and Best Practices

11. Module 11 - Wireless Network Security

 Overview of Wireless Network Fundamentals


 Overview of Wireless Network Encryption Mechanisms
 Understanding Different Types of Wireless Network Authentication Methods
 Understanding and Implementing Wireless Network Security Measures

12. Module 12 - Mobile Device Security

 Understanding Various Mobile Device Connection Methods


 Understanding Various Mobile Device Management Concepts
 Overview of Common Mobile Usage Policies in Enterprises
 Overview of Security Risks and Guidelines Associated with Enterprises Mobile
Usage Policies
 Understanding and Implementing Various Enterprise-level Mobile Security
Management Solutions
 Understanding and Implementing General Security Guidelines and Best Practices on
Mobile Platforms

13. Module 13 - IoT and OT Security

 Understanding IoT Devices, Application Areas, and Communication Models


 Overview of Security in IoT-enabled Environments
 Understanding OT Concepts, Devices, and Protocols
 Overview of Security in OT-enabled Environments

14. Module 14 - Cryptography

 Overview of Cryptographic Security Techniques


 Understanding Various Cryptographic Algorithms
 Understanding Various Hash Functions and Cryptography Tools
 Overview of PKI and Certificate Management Concepts
 Understanding Other Applications of Cryptography

15. Module 15 - Data Security

 Understanding Data Security and its Importance


 Understanding Various Data Security Controls
 Overview of Data Backup, Retention, and Destruction
 Overview of Data Loss Prevention Concepts

16. Module 16 - Network Troubleshooting

 Overview of Network Troubleshooting


 Learn Troubleshooting Basic Network Issues using Utilities and Tools

17. Module 17 - Network Traffic Monitoring

 Understanding the Need and Advantages of Network Traffic Monitoring


 Understanding Baseline Traffic Signatures for Normal and Suspicious Network
Traffic
 Perform Network Monitoring for Suspicious Traffic

18. Module 18 - Network Logs Monitoring and Analysis

 Overview of Logging Concepts


 Understanding Log Monitoring and Analysis on Windows Systems
 Understanding Log Monitoring and Analysis on Linux
 Understanding Various Log Management Tools

19. Module 19 - Incident Response

 Overview of Incident Response Concepts


 Understanding the Role of First Responder in Incident Response​
 Overview of Incident Handling and Response Process

20. Module 20 - Computer Forensics

 Understanding the Fundamentals of Computer Forensics


 Understanding Digital Evidence
 Identify the Roles and Responsibilities of a Forensic Investigator
 Understanding the Forensic Investigation Process and its Importance
 Understanding Various Forensic Investigation Phases
 Understanding Digital Evidence Sources to Support Forensic Investigation
 Collecting the Evidence
 Securing the Evidence
 Overview of Data Acquisition
 Performing Evidence Analysis

21. Module 21 - Business Continuity and Disaster Recovery

 Understanding Business Continuity (BC) and Disaster Recovery (DR) Concepts


 Overview of BC/DR Activities
 Understanding Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)

22. Module 22 - Risk Management

 Understanding Risk Management Concepts


 Understanding Various Risk Management Phases
 Understanding Various Risk Management Frameworks

You might also like