Course Brief

The "Security Fundamentals" module is mapped to the EC-Council Certified Cybersecurity Technician (C|CT) program. It is a comprehensive entry-level certification designed to equip individuals with foundational skills across multiple cybersecurity domains. Developed by the creators of the renowned Certified Ethical Hacker (C|EH) certification, the C|CT addresses the global demand for skilled cybersecurity technicians. The curriculum encompasses essential areas such as network defense, ethical hacking, digital forensics, and security operations, ensuring a holistic understanding of the cybersecurity landscape.​

One of the program"s standout features is its emphasis on practical, hands-on learning. With over 85 labs and a Capture-The-Flag (CTF) style cyber range, participants gain real-world experience in identifying vulnerabilities, mitigating threats, and responding to security incidents. This experiential approach ensures that learners are not only versed in theoretical concepts but are also adept at applying their knowledge in real-world scenarios.​ 

The C|CT is tailored for individuals embarking on a cybersecurity career, including aspiring cybersecurity specialists, consultants, network engineers, and IT administrators. By completing this certification, participants validate their technician-level IT and cybersecurity skills, positioning themselves favorably in a competitive job market. Furthermore, the program lays a solid foundation for advanced cybersecurity certifications and specialized roles in the industry.​

In essence, the C|CT serves as a gateway to the cybersecurity profession, providing learners with the requisite knowledge, skills, and abilities to navigate and excel in the ever-evolving digital security domain. 

Course Knowledge, Skills & Ability Summary

At the end of the course, you will be able to acquire the following:

Knowledge

  • Explain the fundamental principles of cybersecurity, including its importance, key terminologies, and the evolving threat landscape.
  • Describe network architectures, protocols, and common vulnerabilities that cyber attackers exploit.
  • Identify the different phases of ethical hacking, penetration testing methodologies, and tools used in vulnerability assessments. 
  • Explain the core concepts of digital forensics, including evidence collection, analysis techniques, and legal considerations.
  • Understand security monitoring techniques, incident response frameworks, and the role of a Security Operations Center (SOC).
  • Describe the principles of cryptography, encryption algorithms, and how data integrity, confidentiality, and authentication are maintained.
  • Explain the importance of business continuity planning, disaster recovery strategies, and risk management in cybersecurity.

Skills

  • Identify and assess cybersecurity threats using industry-standard threat intelligence frameworks.
  • Configure firewalls, intrusion detection/prevention systems (IDS/IPS), and implement secure network configurations.
  • Conduct basic vulnerability scanning and penetration testing using ethical hacking tools like Nmap and Metasploit.
  • Perform forensic data collection, analyze logs, and recover deleted files from compromised systems.
  • Monitor network traffic, analyze security logs, and respond to simulated cyber incidents.
  • Implement encryption techniques to secure files, emails, and communication channels.
  • Develop and test a cybersecurity incident response plan to mitigate the impact of security breaches

Ability

By the end of this module, learners will possess the foundational knowledge and practical skills necessary to identify, assess, and mitigate cybersecurity threats. They will be adept at implementing security measures, conducting forensic investigations, and ensuring the continuity of business operations in the face of cyber incidents. This proficiency will enable them to embark on a career in cybersecurity, equipped to handle real-world challenges effectively.

Blended Learning Journey

(60.5 Hours)

Placeholder Image

E-Learning

14 Hours

Placeholder Image

Flipped Class

18 Hours

Placeholder Image

Mentoring Support (Sync) (Assignment)

18 Hours

Placeholder Image

Mentoring Support (Async)

10 Hours

Placeholder Image

Summative Assessment

0.5 Hours

Module Summary

WSQ Security Fundamentals (SF)

Module Brief

The "Security Fundamentals" module is mapped to the EC-Council Certified Cybersecurity Technician (C|CT) program. It is a comprehensive entry-level certification designed to equip individuals with foundational skills across multiple cybersecurity domains. Developed by the creators of the renowned Certified Ethical Hacker (C|EH) certification, the C|CT addresses the global demand for skilled cybersecurity technicians. The curriculum encompasses essential areas such as network defense, ethical hacking, digital forensics, and security operations, ensuring a holistic understanding of the cybersecurity landscape.​

One of the program"s standout features is its emphasis on practical, hands-on learning. With over 85 labs and a Capture-The-Flag (CTF) style cyber range, participants gain real-world experience in identifying vulnerabilities, mitigating threats, and responding to security incidents. This experiential approach ensures that learners are not only versed in theoretical concepts but are also adept at applying their knowledge in real-world scenarios.​

The C|CT is tailored for individuals embarking on a cybersecurity career, including aspiring cybersecurity specialists, consultants, network engineers, and IT administrators. By completing this certification, participants validate their technician-level IT and cybersecurity skills, positioning themselves favorably in a competitive job market. Furthermore, the program lays a solid foundation for advanced cybersecurity certifications and specialized roles in the industry.​

In essence, the C|CT serves as a gateway to the cybersecurity profession, providing learners with the requisite knowledge, skills, and abilities to navigate and excel in the ever-evolving digital security domain.

Other Information
  • SSG Module Reference No: TGS-2023020569
  • Module Validity Date: 2027-01-31

Target Audience & Prerequisite

Target Audience

Prerequisite

  • Minimum Age: Minimum 21 years.
  • English Proficiency: Minimum IELTS 5.5 or its equivalent.
  • Academic Qualification:
    • Minimum of one O-Level credit (or its equivalent) and completion of any one of the following courses:
    • Advanced Certificate in System Support
    • Advanced Certificate in Infrastructure Support
    • Professional Diploma in Cloud Administration
    • Advanced Certificate in Cloud Administration
  • Experience: At least one year of relevant work experience in cloud administration in the absence of the above-mentioned course completion

Graduation Requirements

Certificates

Academic Qualification

  • No Academic Qualification for this course

Statement of Attainment

  • WSQ Security Fundamentals (SF)

    ICT-OUS-4012-1.1: Security Administration

Industry Skills Certificate

  • WSQ Security Fundamentals (SF)

    EC-Council : EC-Council Certified Cybersecurity Technician

*Taking this certification is not mandatory. However, if the learner wishes to pursue it, they need to register for the examination directly with the vendor after paying the necessary fees.

Other Information

Course Reference

  • SSG Course Reference No: TGS-2023020569

  • Course Validity Date: 2027-01-31

  • Course Developer : Lithan Academy

Pricing & Funding