Essential Skills in Cybersecurity Technician Careers: Network Defense, Ethical Hacking & Digital Forensics – EC-Council Blog Leave a comment

Essentials Series
Essential skills for tomorrow’s
cybersecurity technician careers
EC-Council’s very first MOOC(Free Resources) certification course series covering essentials skills in Network Defense, Ethical Hacking, and Digital Forensics.
Prepare to start your entry-level career in Cybersecurity today with the Essentials Series
Access the Essentials Series

Courses may be taken individually or in sequence
The Essentials Series and Certified Cybersecurity Technician (CCT) certifications will prepare and validate your skills for entry-level job roles of the future.
 
Local Area Network Specialist
Network Security Analyst
Network Technician
Network Administrator
Network Coordinator
Help Desk Technician
Technical Support Specialist
Systems Specialist
Computer Support Specialist
Cybersecurity Specialist
Cybersecurity Technician
Cyber Forensic Specialist
Cyber Operations Technician
Intelligence Operations Specialist
IT Security Specialist
 
Recent U.S. Department of Labor statistics and O*NET job role classifications have identified not only a need for Cybersecurity professionals, but a specific need at the Level 1 and Level 2 Cybersecurity Technician level. The Essentials Series was created to help share and grow tactical cyber security skills to better educate, retool, and reskill work-ready professionals.
Ideal Candidates
High School Students
College/University Students
Professionals
eBook
Instructor Slides & Syllabus
(Academia & ATC Partners Only)
Video lectures & lab lectures
Lab Range
Post Course Assessment & Certificate of Completion
Certification Exam
 
1. Network Security Fundamentals
2. Identification, Authentication and Authorization
3. Network Security Controls – Administrative Controls
4. Network Security Controls – Physical Controls
5. Network Security Controls – Technical Controls
6. Virtualization and Cloud Computing
7. Wireless Network Security
8. Mobile Device Security
9. IoT Device Security
10. Cryptography and PKI
11. Data Security
12. Network Traffic Monitoring
1. Information Security Fundamentals
2. Ethical Hacking Fundamentals
3. Information Security Threats and Vulnerabilities
4. Password Cracking Techniques and Countermeasures
5. Social Engineering Techniques and Countermeasures
6. Network Level Attacks and Countermeasures
7. Web Application Attacks and Countermeasures
8. Wireless Attacks and Countermeasures
9. Mobile Attacks and Countermeasures
10. IoT and OT Attacks and Countermeasures
11. Cloud Computing Threats and Countermeasures
12. Penetration Testing Fundamentals
1. Computer Forensics Fundamentals
2. Computer Forensics Investigation Process
3. Understanding Hard Disks and File Systems
4. Data Acquisition and Duplication
5. Defeating Anti-forensics Techniques
6. Windows Forensics
7. Linux and Mac Forensics
8. Network Forensics
9. Investigating Web Attacks
10. Dark Web Forensics
11. Investigating Email Crimes
12. Malware Forensics
"*" indicates required fields
Please confirm by checking the box below that you consent to EC-Council contacting you regarding the product interest you have indicated above. Your information will not be shared with any third party. Please see our full privacy policy here.
We care about your data privacy. We will only collect your data via this form if you agree to our terms of use. If you do not agree to the collection of your data, we will not be able to send you the information you have requested.
linkedin twitter facebook youtube blog contact
Please wait while you are redirected to the right page…
Please share your location to continue.
Check our help guide for more info.

source

Leave a Reply

Your email address will not be published. Required fields are marked *