You are on page 1of 5

Certified Cybersecurity Technician Exam 212-82

Exam Blueprint

Certified Cybersecurity Technician


Exam Blueprint

Domain
S. No. Domain Sub Domains Topics
%
Threats Sources
Information Security Threat Actors/Agents
Threats and Malware and its Types
Vulnerabilities Vulnerabilities
Types of Vulnerabilities
Information Security Attacks
Information
Hacking Methodologies and
Security
1 Frameworks 26
Threats and
Attacks Network-level Attacks
Information Security Application-level and OS-level
Attacks Attacks
Social Engineering Attacks
Wireless Network-specific Attacks
IoT, OT, and Cloud Attacks
Cryptographic Attacks
Network Security Information Security Fundamentals
Network Fundamentals Network Security Fundamentals
Security Access Control Principles,
2 2
Fundamenta Identification, Terminologies, and Models
ls Authentication, and
Authorization Identity and Access Management
(IAM)

Page | 1 Certified Cybersecurity Technician Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Cybersecurity Technician Exam 212-82
Exam Blueprint

Regulatory Frameworks, Laws, and


Acts
Network Security Information Security Governance
Controls - and Compliance Program
Administrative
Controls Design and Develop Security Policies
Type of Security and Awareness
Training
Physical Security
Network Security Physical Security Controls
Controls - Physical
Controls Workplace Security
Environmental Controls
Network Security Protocols
Network Segmentation
Types of Firewalls and their Role
Network
3 Security Types of IDS/IPS and their Role 28
Controls Network Security Types of Honeypots
Controls - Technical
Controls Types of Proxy Servers
Fundamentals of VPN
Other Network Security Controls
Load Balancing
Antivirus/Anti-malware Software
Threat Hunting
Threat Intelligence Feeds and
Sources
Network Security Vulnerability Assessment
Assessment
Techniques and Tools Ethical Hacking
Penetration Testing
Configuration Management and
Asset Management
Secure Application Design and
Application Architecture
Security and Software Security Standards,
4 Application Security 4
Cloud Models, and Frameworks
Computing Secure Application, Development,
Deployment, and Automation

Page | 2 Certified Cybersecurity Technician Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Cybersecurity Technician Exam 212-82
Exam Blueprint

Application Security Testing


Techniques and Tools
Virtualization Essential Concepts and
Virtualization and OS Virtualization Security
Cloud Computing Cloud Computing Fundamentals
Cloud Security and Best Practices
Wireless Network Fundamentals
Wireless Network Encryption
Wireless Network Mechanisms
Security Wireless Network Authentication
Methods
Wireless Network Security Measures
Mobile Device Connection Methods
Mobile Device Management
Concepts
Common Mobile Usage Policies in
Enterprises
Wireless Mobile Device Security Risks and Guidelines
5 Device Security Associated with Enterprises Mobile 11
Security Usage Policies
Enterprise-level Mobile Security
Management Solutions
General Security Guidelines and Best
Practices on Mobile Platforms
IoT Devices, Application Areas, and
Communication Models
Security in IoT-enabled
IoT and OT Security Environments
OT Concepts, Devices, and Protocols
Security in OT-enabled
Environments
Cryptographic Security Techniques
Cryptographic Algorithms
Data Hash Functions and Cryptography
6 Cryptography 10
Security Tools
PKI and Certificate Management
Concepts

Page | 3 Certified Cybersecurity Technician Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Cybersecurity Technician Exam 212-82
Exam Blueprint

Other Applications of Cryptography


Data Security
Data Security Controls
Data Security Data Backup, Retention, and
Destruction
Data Loss Prevention
Network Troubleshooting
Network
Troubleshooting Troubleshooting Basic Network
Issues using Utilities and Tools
Network Traffic Monitoring
Baseline Traffic Signatures for
Network Traffic Normal and Suspicious Network
Network Monitoring Traffic
7 Monitoring Network Monitoring for Suspicious 11
and Analysis Traffic
Logging Concepts
Log Monitoring and Analysis on
Network Logs Windows Systems
Monitoring and
Analysis Log Monitoring and Analysis on
Linux
Log Management Tools
Incident Response
Role of First Responder in Incident
Incident Response Response
Incident Handling and Response
Process
Computer Forensics
Incident and Digital Evidence
Risk
8 Roles and Responsibilities of a 8
Managemen
Forensic Investigator
t
Forensic Investigation Process
Computer Forensics
Forensic Investigation Phases
Digital Evidence Sources to Support
Forensic Investigation
Collecting the Evidence
Securing the Evidence

Page | 4 Certified Cybersecurity Technician Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Cybersecurity Technician Exam 212-82
Exam Blueprint

Data Acquisition
Evidence Analysis
Business Continuity (BC) and
Disaster Recovery (DR)
Business Continuity
BC/DR Activities
and Disaster Recovery
Business Continuity Plan (BCP) and
Disaster Recovery Plan (DRP)
Risk Management
Risk Management Risk Management Phases
Risk Management Frameworks

Page | 5 Certified Cybersecurity Technician Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like