Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   Cisco Training & Certifications   /   CCT Cybersecurity

Cisco Certified Technician

Prove you have the skills to diagnose, restore, repair, and replace critical Cisco networking and system devices at customer sites. Get certified with a Cisco Certified Technician (CCT) concentration in collaboration, data center, or routing and switching.



Cisco Certified Technician

Prove you have the skills to diagnose, restore, repair, and replace critical Cisco networking and system devices at customer sites. Get certified with a Cisco Certified Technician (CCT) concentration in collaboration, data center, or routing and switching.



Support customers and sharpen your resolution skills


As a Cisco Certified Technician (CCT), you work closely with the Cisco Technical Assistance Center (TAC) to quickly and efficiently resolve support incidents.


You can complete Cisco authorized training online and in multiple short sessions, enabling you to stay productive in the field. The CCT certification provides an opportunity for you to expand your area of expertise in multiple technology tracks.

Cisco Certified Technician Certifications


How it works

No formal prerequisites


There are no formal prerequisites to earn these certifications, but you should have an understanding of the exam topics before taking any of the exams.

Example learner profiles

  • Individuals looking to move into the IT field
  • IT professionals looking to stand out in the job market
  • IT professionals looking to enrich their current roles with additional networking skills


Cisco Certified Support Technician – Cybersecurity


This exam focuses on the skills required for onsite support and maintenance of Cisco Cybersecurity endpoints and operating environments. Be ready to identify Cisco Cybersecurity models, accessories. You must understand the Cisco Cybersecurity software and identify commonly found software. Finally, use the Cisco Command Line Interface (CLI) to connect and service products.

1. Define Essential Security Principles

  • Vulnerabilities, threats, exploits, and risks; attack vectors
  • Hardening
  • Defense-in-depth
  • Confidentiality, integrity, and availability (CIA)
  • Types of attackers
  • Reasons for attacks
  • Code of ethics

  • Malware
  • Ransomware
  • Denial of Service
  • Botnets
  • Social Engineering Attacks (Tailgating, Spear Phishing, Phishing, Vishing, Smishing, etc.)
  • Physical Attacks
  • Man in the middle
  • IoT vulnerabilities
  • Insider Threats
  • Advanced Persistent Threat (APT)

  • Authentication
  • Authorization, and accounting (AAA)
  • RADIUS
  • Multifactor Authentication (MFA)
  • Password Policies

  • Types of encryptions, hashing, certificates, public key infrastructure (PKI)
  • Strong vs. weak encryption algorithms
  • States of data and appropriate encryption (data in transit, data at rest, data in use)
  • Protocols that use Encryption

  • TCP
  • UDP
  • HTTP
  • ARP
  • ICMP
  • DHCP
  • DNS

  • IPv4 and IPv6 addresses
  • MAC addresses
  • Network segmentation
  • CIDR notation
  • NAT
  • Public vs. Private Networks

  • Network security architecture
  • DMZ
  • Virtualization
  • Cloud
  • Honeypot
  • Proxy server
  • IDS
  • IPS

  • MAC address filtering
  • Encryption standards and protocols
  • SSID

  • Windows, macOS, and Linux
  • Security Features, including Windows Defender and host-based firewalls
  • CLI and PowerShell
  • File and Directory Permissions
  • Privilege Escalation

  • Hardware inventory (asset management)
  • Software Inventory
  • Program Deployment
  • Data Backups
  • Regulatory compliance (PCI DSS, HIPAA, GDPR)
  • BYOD (Device Management, Data Encryption, App Distribution, Configuration Management)

  • Windows Update
  • Application Updates
  • Device Drivers
  • Firmware
  • Patching

  • Event Viewer
  • Audit logs
  • System and Application Logs
  • Syslog
  • Identification of Anomalies

  • Scanning systems
  • Reviewing scan logs
  • Malware Remediation

  • Vulnerability Identification
  • Management, and mitigation
  • Active and Passive reconnaissance
  • Testing (Port scanning, Automation)

  • Uses and limitations of vulnerability databases
  • Industry-standard tools used to assess vulnerabilities and make recommendations, policies, and reports
  • Common Vulnerabilities and Exposures (CVEs), cybersecurity reports, cybersecurity news, subscription services, and collective intelligence
  • Ad Hoc and automated threat intelligence

  • Vulnerability vs. risk
  • Ranking risks
  • Approaches to risk management
  • Risk mitigation strategies
  • Levels of risk (low, medium, high, extremely high)
  • Risks associated with specific types of data and data classifications
  • Security assessments of IT systems (Information Security, Change Management, Computer Operations, Information Assurance)
  • Explain the importance of disaster recovery and business continuity planning Natural and human-caused disasters
  • Features of disaster recovery plans (DRP) and business continuity plans (BCP)
  • Backup and disaster recovery controls (detective, preventive, and corrective)

  • Vulnerability vs. risk
  • Ranking risks
  • Approaches to risk management
  • Risk mitigation strategies
  • Levels of risk (low, medium, high, extremely high)
  • Risks associated with specific types of data and data classifications
  • Security assessments of IT systems (Information Security, Change Management, Computer Operations, Information Assurance)
  • Explain the importance of disaster recovery and business continuity planning Natural and human-caused disasters
  • Features of disaster recovery plans (DRP) and business continuity plans (BCP)
  • Backup and disaster recovery controls (detective, preventive, and corrective)

  • Role of SIEM and SOAR
  • Monitoring Network data to identify security incidents (packet captures, various log file entries, etc.)
  • Identifying suspicious events as they occur
  • Cyber Kill Chain
  • MITRE ATT&CK Matrix, and Diamond Model
  • Tactics, Techniques, and Procedures (TTP)
  • Sources of evidence (artifacts)
  • Evidence Handling (preserving digital evidence, chain of custody)
  • Compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA)
  • Policy, plan, and procedure elements
  • Incident Response Lifecycle Stages


Fees Structure : 15500 INR / 185 USD
Total No of Class : 109 Video Class
Class Duration : 53:30 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 22500 INR / 270 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online