Certified Cybersecurity Technician

by ISOEH Claim Listing

Companies and industries are growing increasingly dependent on technology as digital transformation becomes ubiquitous in today’s business environment. Consequently, cybersecurity is now relevant for every system, device, and byte of data that organizations rely on to operate.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ISOEH Logo

img Duration

40 Hours

Course Details

Companies and industries are growing increasingly dependent on technology as digital transformation becomes ubiquitous in today’s business environment. Consequently, cybersecurity is now relevant for every system, device, and byte of data that organizations rely on to operate.

 

What You Will Learn In This Course:

  • Key issues plaguing the cybersecurity industry (information security and network security)
  • Information security threats, vulnerabilities, and attacks
  • Different types of malware
  • Network security fundamentals
  • Identification, authentication, and authorization concepts
  • Network security controls
    • Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
    • Physical controls (physical security controls, workplace security, and environmental controls)
    • Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
  • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
  • Application security design and testing techniques
  • Fundamentals of virtualization, cloud computing, and cloud security
  • Wireless network fundamentals, wireless encryption, and security measures
  • Fundamentals of mobile, IoT, and OT devices and their security measures
  • Cryptography and public key infrastructure concepts
  • Data security controls, data backup and retention methods, and data loss prevention techniques
  • Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
  • Incident handling and response process
  • Computer forensics fundaments, digital evidence, and forensic investigation phases
  • Kolkata Branch

    SDF Building, Module - 335, 2nd Floor Sector - V, Kolkata
  • Bhubaneshwar Branch

    Plot Number 23, 2nd Floor, Lane Number 2, District Cente, Bhubaneshwar
  • Siliguri Branch

    Baghajatin Park Main Road, Sub-Registry Office Building, 1st Floor, Siliguri

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy