<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="29878" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/ec-cct" lastchanged="2025-12-19T15:33:40+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>EC-Council Certified Cybersecurity Technician</title><productcode>CCT</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-CCT</fullproductcode><version>1</version><objective>&lt;p&gt;What will you learn in this course:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Key concepts in cybersecurity, including information security and network security&lt;/li&gt;&lt;li&gt;Information security threats, vulnerabilities, and attacks&lt;/li&gt;&lt;li&gt;The different types of malware&lt;/li&gt;&lt;li&gt;Identification, authentication, and authorization&lt;/li&gt;&lt;li&gt;Network security controls&lt;/li&gt;&lt;li&gt;Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)&lt;/li&gt;&lt;li&gt;Application security design and testing techniques&lt;/li&gt;&lt;li&gt;Fundamentals of virtualization, cloud computing, and cloud security&lt;/li&gt;&lt;li&gt;Wireless network fundamentals, wireless encryption, and related security measures&lt;/li&gt;&lt;li&gt;Fundamentals of mobile, IoT, and OT devices and related security measures&lt;/li&gt;&lt;li&gt;Cryptography and public-key infrastructure&lt;/li&gt;&lt;li&gt;Data security controls, data backup and retention methods, and data loss prevention techniques&lt;/li&gt;&lt;li&gt;Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic&lt;/li&gt;&lt;li&gt;The incident handling and response process&lt;/li&gt;&lt;li&gt;Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation&lt;/li&gt;&lt;li&gt;Concepts in business continuity and disaster recovery&lt;/li&gt;&lt;li&gt;Risk management concepts, phases, and frameworks&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;No specific prerequisites are required for the C|CT certification, although previous knowledge and experience in IT and networking with a focus on cyber security can be an advantage. Candidates should have knowledge of computers and computer networks prior to entering the C|CT program, although core technologies are covered in the curriculum.&lt;/p&gt;</essentials><audience>&lt;p&gt;The C|CT is ideal for anyone looking to start their career in cyber security or add a strong foundational understanding of the cyber security concepts and techniques required to be effective on the job. The course is especially well suited to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Early-career IT professionals, IT managers, career changers, and career advancers&lt;/li&gt;&lt;li&gt;Students and recent graduates&lt;/li&gt;&lt;/ul&gt;</audience><outline>&lt;ul&gt;
&lt;li&gt;Information Security Threats and Vulnerabilities&lt;/li&gt;&lt;li&gt;Information Security Attacks&lt;/li&gt;&lt;li&gt;Network Security Fundamentals&lt;/li&gt;&lt;li&gt;Identification, Authentication, and Authorization&lt;/li&gt;&lt;li&gt;Network Security Controls: Administrative Controls&lt;/li&gt;&lt;li&gt;Network Security Controls: Physical Controls&lt;/li&gt;&lt;li&gt;Network Security Controls: Technical Controls&lt;/li&gt;&lt;li&gt;Network Security Assessment Techniques and Tools&lt;/li&gt;&lt;li&gt;Application Security&lt;/li&gt;&lt;li&gt;Virtualization and Cloud Computing&lt;/li&gt;&lt;li&gt;Wireless Network Security&lt;/li&gt;&lt;li&gt;Mobile Device Security&lt;/li&gt;&lt;li&gt;Internet of Things (IoT) and Operational Technology (OT) Security&lt;/li&gt;&lt;li&gt;Cryptography&lt;/li&gt;&lt;li&gt;Data Security&lt;/li&gt;&lt;li&gt;Network Troubleshooting&lt;/li&gt;&lt;li&gt;Network Traffic Monitoring&lt;/li&gt;&lt;li&gt;Network Log Monitoring and Analysis&lt;/li&gt;&lt;li&gt;Incident Response&lt;/li&gt;&lt;li&gt;Computer Forensics&lt;/li&gt;&lt;li&gt;Business Continuity and Disaster Recovery&lt;/li&gt;&lt;li&gt;Risk Management&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>What will you learn in this course:



- Key concepts in cybersecurity, including information security and network security
- Information security threats, vulnerabilities, and attacks
- The different types of malware
- Identification, authentication, and authorization
- Network security controls
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and related security measures
- Fundamentals of mobile, IoT, and OT devices and related security measures
- Cryptography and public-key infrastructure
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
- The incident handling and response process
- Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
- Concepts in business continuity and disaster recovery
- Risk management concepts, phases, and frameworks</objective_plain><essentials_plain>No specific prerequisites are required for the C|CT certification, although previous knowledge and experience in IT and networking with a focus on cyber security can be an advantage. Candidates should have knowledge of computers and computer networks prior to entering the C|CT program, although core technologies are covered in the curriculum.</essentials_plain><audience_plain>The C|CT is ideal for anyone looking to start their career in cyber security or add a strong foundational understanding of the cyber security concepts and techniques required to be effective on the job. The course is especially well suited to:


- Early-career IT professionals, IT managers, career changers, and career advancers
- Students and recent graduates</audience_plain><outline_plain>- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Network Security Assessment Techniques and Tools
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- Internet of Things (IoT) and Operational Technology (OT) Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
- Network Log Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="SI" currency="EUR">3950.00</price><price country="NL" currency="EUR">3950.00</price><price country="DE" currency="EUR">3950.00</price><price country="AT" currency="EUR">3950.00</price><price country="SE" currency="EUR">3950.00</price><price country="PL" currency="EUR">3950.00</price><price country="IL" currency="ILS">13700.00</price><price country="GR" currency="EUR">3950.00</price><price country="MK" currency="EUR">3950.00</price><price country="HU" currency="EUR">3950.00</price><price country="CH" currency="CHF">4200.00</price><price country="FR" currency="EUR">3000.00</price><price country="IT" currency="EUR">2500.00</price></pricelist><miles/></course>