- Ethical Hacking
- Network Security DigitalForensics
- SOC
- Incident Handling
- Risk Management
- Governance &Compliance
- BC & DR
- Application Security
- Configuration & Asset Management
- OT Security
- Network Troubleshooting
- Network log Monitoring & Analysis
- Threat Intelligence & hunting
Lab Exercises Included In CCT:
- Create a Trojan to Gain Access to the Target System
- User System Monitoring and Surveillance using Spytech SpyAgent
- Perform Application SandboxingUsing Sandboxie
- File Recovery using EaseUSData Recovery Wizard
- Create a Virus Infect the Terget System
- Manage Access Controls in Linux Machine
- Detect Web Application Vulnerabilties using OWASP ZAP
- Access Remote Machine using PuTTy
- Create a Worm using the Internet Worm Maker Thing
- Implement Network-Based Firewall Functionality
- Calculate One-way Hashes using HashCalc
- Acquire Volatile Information from a Live Windows System