

Gain Skills, Build Your Career
CyberFox Train is an accredited training center of EC-Council
(EC-Council has trained cybersecurity professionals since 2003 and created the Certified Ethical Hacker certification program).
CyberFox Train is proud to be associated with EC-Council’s $3.5 million scholarship program to close the cybersecurity workforce gap and prepare professionals to detect, combat, and protect organizations from cyberattacks. As a training center, we are committed to building the careers of aspiring cybersecurity professionals with the world’s only entry-level course that builds multi-domain technical skills, hands-on.
Who Should Apply for this Scholarship?
High School Students
Get an early start on your cybersecurity career and master security fundamentals online.
College/University Students
Prepare for a cybersecurity career, and improve your IT education.
Working Professionals
Transition into a cybersecurity career, even if you aren’t sure where to begin your educational journey.
IT Professionals
Switch your career easily from IT to cybersecurity.

Official Curricula e-Courseware Covering 22 Immersive Modules

200 Hours of Video Based Learning from the C|CT course

85 Hands- On Labs (to practice everything you’re learning)

Capture the Flag Exercises

Certification Exam Voucher for the Performance-Based Exam

2400 Pages of Content (includes 900 pages of lab guides)
About the Certified Cybersecurity Technician C|CT Program
Strong Foundational Coverage:
Unique Benefits You Get from the Certified Cybersecurity Technician C|CT Program
Attain Multi-domain Skills
Ethical Hacking | Governance & Compliance |
Network Security | BC & DR |
Digital Forensics | Application Security |
SOC | Configuration & Asset Management |
Threat Intelligence & Hunting | OT Security |
Incident Handling | Network Troubleshooting |
Risk Management | Network Log Monitoring & Analysis |
Gain & Validate Hands-on Technical Skills
The C|CT offers individuals who are starting their IT and cybersecurity careers a training and certification program to gain, build, and validate their hands-on technical skills across a wide range of topics in the various domains mentioned above.
Hands-on Labs
The C|CT includes 85 hands-on labs (three times more than any entry level certification), ensuring hands-on skill development in the course.
Performance Based Exam
Measuring more than the knowledge transferred, C|CT exams are delivered on a live cyber range to validate the skills candidates need to thrive in a cybersecurity role and prove themselves to potential employers. Attaining this certification proves your skills.Capture the Flag
The C|CT certification offers capture the flag (CTF) style critical thinking challenges to accompany each lab exercise, putting knowledge into practice and providing a proven record of skill demonstration.Live Range Experience
The C|CT program is delivered on a live cyber range, utilizing live targets and real attack systems for a truly immersive, realistic practice and assessment platform.To apply for this scholarship, please complete the form below or contact us here

Course Module
- Module 01: Information Security Threats and Vulnerabilities
- Module 02: Information Security Attacks
- Module 03: Network Security Fundamentals
- Module 04: Identification, Authentication, and Authorization
- Module 05: Network Security Controls – Administrative Controls
- Module 06: Network Security Controls – Physical Controls
- Module 07: Network Security Controls – Technical Controls
- Module 08: Network Security Assessment Techniques and Tools
- Module 09: Application Security
- Module 10: Virtualization and Cloud Computing
- Module 11: Wireless Network Security
- Module 12: Mobile Device Security
- Module 13: IoT and OT Security
- Module 14: Cryptography
- Module 15: Data Security
- Module 16: Network Troubleshooting
- Module 17: Network Traffic Monitoring
- Module 18: Network Logs Monitoring and Analysis
- Module 19 Incident Response
- Module 20: Computer Forensics
- Module 21: Business Continuity and Disaster Recovery
- Module 22: Risk Management
What You Will Learn
Information security fundamentals.
- Key issues plaguing the cybersecurity industry (information security and network security)
- Information security threats, vulnerabilities, and attacks
- Different types of malware
- Network security fundamentals
- Identification, authentication, and authorization concepts
- Network security controls
- Administrative controls (frameworks, laws, acts, governance and compliance program, and security policies)
- Physical controls (physical security controls, workplace security, and environmental controls)
- Technical controls (network security protocols, network segmentation, firewall, IDS/IPS, honeypot, proxy server, VPN, UBA, NAC, UTM, SIEM, SOAR, load balancer, and anti-malware tools)
- Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, and configuration and asset management)
- Application security design and testing techniques
- Fundamentals of virtualization, cloud computing, and cloud security
- Wireless network fundamentals, wireless encryption, and security measures
- Fundamentals of mobile, IoT, and OT devices and their security measures
- Cryptography and public key infrastructure concepts
- Data security controls, data backup and retention methods, and data loss prevention techniques
- Network troubleshooting, traffic monitoring, log monitoring, and analysis for suspicious traffic
- Incident handling and response process
- Computer forensics fundaments, digital evidence, and forensic investigation phases
Exam Details
- Exam Title: Certified Cybersecurity Technician
- Exam Code: 212-82
- Number of Questions: 60
- Duration: 3 hours
- Exam Availability Locations: ECC Exam Portal
- Languages: English
- Test Format: Multiple Choice and Real Life Hands-On Practical Exam
- Passing Score: 70%
- Exam Mode: Remote Proctoring Services
Frequently Asked Questions
1 I don’t have any experience—can I really start a career in cybersecurity?
Yes, you can start a career in cybersecurity even if you don't have any prior experience. In fact, according to a study by (ISC)², 57% of cybersecurity professionals in the U.S. entered the field without prior experience in the industry. As Vasu Jakkal (Corporate Vice President of Security, Compliance, and Identity at Microsoft) has rightly said, “Cybersecurity needs you.” With the right training and education, you can gain the skills and knowledge needed to succeed in this field.
2 Being a Non-IT professional, can I find a job in cybersecurity?
Yes, non-IT professionals can find a job in cybersecurity. According to recent industry reports, there will be 3.5 million unfilled cybersecurity jobs globally by 2025. Many organizations are looking for individuals with diverse backgrounds, including those with non-IT experience, to fill these roles.
3 Do I need to know coding to become a cybersecurity professional?
No, you do not need to know coding to become a cybersecurity professional. According to a recent study by (ISC)², only 20% of cybersecurity professionals listed coding as a necessary skill in their job. However, it is beneficial to have some knowledge of programming languages, as it can enhance your ability to understand and analyze malicious code.
4 How quickly can I transition from IT professional to cybersecurity?
The transition from IT to cybersecurity can vary depending on your current skills and experience as well as the specific role into which you are looking to transition. It is important to note that cybersecurity roles often require specialized knowledge and certifications, such as a C|EH or C|CT. Therefore, start by researching and gaining knowledge in the specific areas of cybersecurity you are interested in, and then pursue relevant certifications. Additionally, gaining hands-on experience through internships or entry-level cybersecurity positions can help speed up the transition process.
5 Do cybersecurity professionals get paid more than IT professionals?
Without a doubt, cybersecurity professionals typically earn higher salaries than IT professionals. A recent Burning Glass report states a 300% increase in demand for cybersecurity job postings compared to the overall IT job market. According to IBM, cybersecurity jobs also pay 16% — or about $13,000 — more than the average for all IT jobs. The average advertised salary for a cybersecurity job is now $93,540.
6 What are the primary skills I need to learn to pursue a cybersecurity career?
To join a cybersecurity job, the primary skills one should focus on learning include the following:
• network security and administration
• risk management and compliance
• cybersecurity policies and procedures
• cyber crime investigation and forensic analysis
• information security management
• communication and presentation skills
• problem-solving and critical thinking abilities
7 What will I learn from EC-Council's C|CT program?
The EC-Council certified Cybersecurity Technician (C|CT) program provides an entry-level certification that validates foundational technical, hands-on, and multi-domain skills across network defense, ethical hacking, digital forensics, and security operations. Upon completing the program, you will be well-prepared to take on a role as a cybersecurity technician and handle a wide range of complex issues related to securing software, networks, and IT systems against common cyberthreats and attacks.
8 Do I get access to practical labs?
Yes, the C|CT certification program is the world’s-only entry-level program to provide total foundational cybersecurity domain coverage with 85 hands-on labs (three times more than any other entry-level certification), ensuring realistic, practical skill development.
9 What do I get if I am awarded the C|CT Global Scholarship?
Successful scholarship awardees will need to pay a small fee ($199) to cover the exam proctoring and technology fee. for the certification exam and will receive the following:
• official curriculum e-courseware covering 22 immersive modules
• 200 hours of video based learning of the C|CT course
• 85 hands-on labs
• capture-the-flag exercises
• a certification exam voucher for the performance-based exam
• 2400 pages of content (includes 900 pages of lab guides)
• official EC-Council certification
10 Do I get to learn ethical hacking with the C|CT Global Scholarship?
Yes, EC-Council's Certified Cybersecurity Technician (C|CT) program includes a module on ethical handling and compliance in cybersecurity. The topics covered include data privacy, legal and regulatory compliance, and responsible use of cybersecurity tools and techniques.
11 Can I get employed with Top 500 Fortune companies?
Yes, pursuing this certification from EC-Council will positively increase your chances of getting hired by a Fortune 500 company. EC-Council is recognized globally as a pioneer and inventor of the ethical hacking training and certification (C|EH) program and other niche cybersecurity programs endorsed and valued by governments, and public and private sector organizations, including 7 Fortune 10 companies, 47 Fortune 100 companies, the U.S. Department of Defense, global intelligence communities, and NATO.
12 How do I approach my company to sponsor my scholarship?
To approach your company to sponsor the EC-Council’s Certified Cybersecurity Technician C|CT scholarship, you can share a letter (a sample draft letter can be accessed on this link) detailing the following:• benefits of pursuing the C|CT program for both the company and your career
• statistics and data on the rising cyberthreats and costs of data breaches to companies
• the importance of investing in cybersecurity to protect the company's assets and reputation
• a proposal of how the scholarship will provide financial assistance and the EC-Council legacy of being a globally recognized and trusted certifying organization in the cybersecurity industry
Follow up with the company after a few days to check on the status of your request.
13 What happens if I do not accept the grant within 14 days?
To approach your company to sponsor the EC-Council’s Certified Cybersecurity Technician C|CT scholarship, you can share a letter (a sample draft letter can be accessed on this link) detailing the following:• benefits of pursuing the C|CT program for both the company and your career
• statistics and data on the rising cyberthreats and costs of data breaches to companies
• the importance of investing in cybersecurity to protect the company's assets and reputation
• a proposal of how the scholarship will provide financial assistance and the EC-Council legacy of being a globally recognized and trusted certifying organization in the cybersecurity industry
Follow up with the company after a few days to check on the status of your request.
Accreditations, Recognitions And Endorsements

















