Seminarinformationen
Seminar - Ziel
In diesem 5-tägigen Seminar „Certified Cybersecurity Technician (CCT)“ beschäftigen Sie sich mit einer Vielzahl komplexer Themen rund um die Absicherung von Software, Netzwerken und IT-Systemen. Dabei werden auch gängige Bedrohungen und Angriffsarten erläutert.
Die Zertifizierung zum Certified Cybersecurity Technician (C|CT) richtet sich an IT- und Cybersicherheitsexperten und bereitet Sie darauf vor, Ihre Fähigkeiten in den Bereichen Netzwerksicherheit, Ethical Hacking und Security Operations erfolgreich in Ihrem Unternehmen einzusetzen.
Das Seminar verfolgt einen vielseitigen Ansatz, der es den Teilnehmern ermöglicht, Kompetenzen in der Konfiguration, Analyse und Problemerkennung zu entwickeln, um so den Schutz ihrer Organisation effektiv zu gewährleisten. Während des Seminars werden zudem häufig auftretende Bedrohungen und Angriffe behandelt, um Sie umfassend vorzubereiten.
Teilnehmer - Zielgruppe
- IT Support Specialist
- IT Networking Specialist
- Cybersecurity Technicians
- Network Engineers
- SOC Analyst
- IT Managers
Kurs - Voraussetzungen
Für eine optimale Teilnahme am Kurs empfehlen wir folgende Vorkenntnisse:
- Kenntnisse und Erfahrungen im Bereich IT-Netzwerke mit einem starken Fokus auf Cybersicherheit sind von Vorteil
Seminardauer
- 5 Tage
- 09:00 Uhr bis 17:00 Uhr
Schulungsunterlagen
Seminar-Inhalt / Agenda
Information Security Threats and Vulnerabilities
- Define Threats Sources
- Define Threat Actors/Agents
- Define Malware and its Types
- Define Vulnerabilities
- Understand Different Types of Vulnerabilities
Information Security Attacks
- Understand Information Security Attacks
- Describe Hacking Methodologies and Frameworks
- Understand Network-level Attacks
- Understand Application-level and OS-level Attacks
- Understand Social Engineering Attacks
- Understand Wireless Network-specific Attacks
- Understand IoT, OT, and Cloud Attacks
- Understand Cryptographic Attacks
Network Security Fundamentals
- Discuss Information Security Fundamentals
- Discuss Network Security Fundamentals
Identification, Authentication, and Authorization
- Discuss Access Control Principles, Terminologies, and Models
- Discuss Identity and Access Management (IAM)
Network Security Controls - Administrative Controls
- Discuss Various Regulatory Frameworks, Laws, and Acts
- Understand Information Security Governance and Compliance Program
- Learn to Design and Develop Security Policies
- Learn to Conduct Different Type of Security and Awareness Training
Network Security Controls - Physical Controls
- Understand the Importance of Physical Security
- Discuss Various Physical Security Controls
- Describe Workplace Security
- Describe Various Environmental Controls
Network Security Controls - Technical Controls
- Discuss Essential Network Security Protocols
- Discuss Security Benefits of Network Segmentation
- Understand Different Types of Firewalls and their Role
- Understand Different Types of IDS/IPS and their Role
- Understand Different Types of Honeypots
- Understand Different Types of Proxy Servers and their Benefits
- Discuss Fundamentals of VPN and its importance in Network Security
- Discuss Other Network Security Controls
- Discuss Importance of Load Balancing in Network Security
- Understand Various Antivirus/Anti-malware Software
Network Security Assessment Techniques and Tools
- Discuss Threat Hunting
- Discuss Various Threat Intelligence Feeds and Sources
- Discuss Vulnerability Assessment
- Discuss Ethical Hacking Concepts
- Understand Fundamentals of Penetration Testing and its Benefits
- Understand the Fundamentals of Configuration Management and Asset Management
Application Security
- Understand Secure Application Design and Architecture
- Understand Software Security Standards, Models, and Frameworks
- Understand Secure Application, Development, Deployment, and Automation
- Application Security Testing Techniques and Tools
Virtualization and Cloud Computing
- Understand Virtualization Essential Concepts and OS Virtualization Security
- Understand Cloud Computing Fundamentals
- Discuss the Insights of Cloud Security and Best Practices
Wireless Network Security
- Understand Wireless Network Fundamentals
- Understand Wireless Network Encryption Mechanisms
- Discuss Different Types of Wireless Network Authentication Methods
- Discuss and Implement Wireless Network Security Measures
Mobile Device Security
- Understand Various Mobile Device Connection Methods
- Discuss Various Mobile Device Management Concepts
- Discuss Common Mobile Usage Policies in Enterprises
- Discuss Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
- Discuss and Implement Various Enterprise-level Mobile Security Management Solutions
- Discuss and Implement General Security Guidelines and Best Practices on Mobile Platforms
IoT and OT Security
- Understand IoT Devices, Application Areas, and Communication Models
- Discuss the Security in IoT-enabled Environments
- Understand OT Concepts, Devices, and Protocols
- Discuss the Security in OT-enabled Environments
Cryptography
- Discuss Cryptographic Security Techniques
- Discuss Various Cryptographic Algorithms
- Discuss Various Hash Functions and Cryptography Tools
- Discuss PKI and Certificate Management Concepts
- Discuss Other Applications of Cryptography
Data Security
- Understand Data Security and its Importance
- Discuss Various Data Security Control
- Discuss Data Backup, Retention, and Destruction
- Discuss Data Loss Prevention Concepts
Network Troubleshooting
- Discuss Network Troubleshooting
- Learn Troubleshooting Basic Network Issues using Utilities and Tools
Network Traffic Monitoring
- Understand the Need and Advantages of Network Traffic Monitoring
- Determine Baseline Traffic Signatures for Normal and Suspicious Network Traffic
- Perform Network Monitoring for Suspicious Traffic
Network Logs Monitoring and Analysis
- Understand Logging Concepts
- Discuss Log Monitoring and Analysis on Windows Systems
- Discuss Log Monitoring and Analysis on Linux
- Discuss Various Log Management Tools
Incident Response
- Understand Incident Response Concepts
- Understand the Role of First Responder in Incident Response
- Describe Incident Handling and Response Process
Computer Forensics
- Understand the Fundamentals of Computer Forensics
- Understand Digital Evidence
- Identify the Roles and Responsibilities of a Forensic Investigator
- Understand the Forensic Investigation Process and its Importance
- Discuss Various Forensic Investigation Phases
- Digital Evidence Sources to Support Forensic Investigation
- Collecting the Evidence
- Securing the Evidence
- Overview of Data Acquisition
- Performing Evidence Analysis
Business Continuity and Disaster Recovery
- Understanding Business Continuity (BC) and Disaster Recovery (DR) Concepts
- Discuss BC/DR Activities
- Understanding Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
Risk Management
- Understand Risk Management Concepts
- Discuss Various Risk Management Phases
- Understanding Various Risk Management Frameworks
Weitere Schulungen zu Thema EC-Council
- u.a. in Nürnberg, Berlin, Stuttgart, München, KölnIn diesem 3-tägigen Seminar „Certified Incident Handler (ECIH)“ erhalten Sie umfassendes Wissen zum Incident-Handling und zur Reaktion auf Sicherheitsvorfälle im Bereich der Informationssicherheit. Das Seminar vermittelt nicht nur theoretische Grundlagen, sondern legt ...
- u.a. in Nürnberg, Berlin, Stuttgart, München, KölnIn diesem 5-tägigen Seminar „Certified Network Defender (CND)“ erwerben Sie die wichtigen Fähigkeiten, um als Netzwerkadministrator gezielt auf potenzielle Bedrohungen zu reagieren. Angesichts der zunehmenden Cyberkriminalität ist es entscheidend, über das nötige ...
- u.a. in Bremen, Frankfurt am Main, Hamburg, Düsseldorf, KasselIn diesem 3-tägigen Seminar „Certified DevSecOps Engineer (ECDE)“ lernen Sie, wie sich Sicherheitsmaßnahmen und Security-Tools wirkungsvoll in alle acht Phasen des DevOps-Lebenszyklus integrieren lassen. Das praxisorientierte Programm legt dabei einen starken Fokus auf ...
- u.a. in Hamburg, Essen, Heidelberg, Jena, NordhausenIn diesem 2-tägigen Seminar „SOC Essentials (SCE)“ erhalten Sie eine fundierte Einführung in die Grundlagen der Cybersicherheit und modernen Bedrohungsabwehr. Sie lernen zentrale Konzepte rund um Computernetzwerke, Sicherheitsrisiken, Schwachstellen und gängige ...