EC-Council • CCT
Validates foundational and practical cybersecurity skills through a performance-based exam, covering network security, ethical hacking, digital forensics, incident response, risk management, threat intelligence, application security, cryptography, and IoT and cloud security.
Questions
630
Duration
185 minutes
Passing Score
70%
Difficulty
FoundationalLast Updated
Feb 2026
The EC-Council Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity certification designed to validate both foundational knowledge and applied technical skills across the core disciplines of the field. Exam code 212-82, the credential covers 20 domains including network security, ethical hacking, digital forensics, incident response, risk management, threat intelligence, application security, cryptography, IoT/OT security, and cloud computing. It is accredited by the ANAB (ANSI National Accreditation Board) under the ISO/IEC 17024 standard, giving it formal recognition comparable to other globally respected IT certifications.
What distinguishes the C|CT from other entry-level credentials is its hybrid performance-based exam format, which combines traditional multiple-choice questions with hands-on practical challenges in a CTF-style cyber range environment. The curriculum is reinforced by 85 labs spanning all core domains, ensuring candidates develop real-world skills rather than purely theoretical knowledge. According to EC-Council, 67% of C|CT earners successfully transitioned into cybersecurity roles after obtaining the certification, and 1 in 2 individuals chose it as their first cybersecurity credential.
The C|CT is aimed at individuals entering the cybersecurity field for the first time, including recent graduates from IT or computer science programs, military veterans transitioning to civilian tech roles, IT help desk and support technicians seeking to move into security, and professionals in adjacent roles such as network administration or systems administration who want to formalize their security skills. It is also well-suited for career changers from non-technical backgrounds who have completed a cybersecurity bootcamp or self-study program.
Specific job roles this certification prepares candidates for include SOC Analyst (Tier 1), IT Support Specialist, Network Security Technician, Cybersecurity Analyst, and Junior Penetration Tester. It serves as a stepping stone toward more advanced EC-Council credentials such as the Certified Ethical Hacker (CEH) or Certified Security Analyst (ECSA).
There are no formal prerequisites required to enroll in the C|CT course or register for the 212-82 exam. EC-Council positions this as a truly entry-level credential accessible to anyone with a desire to enter cybersecurity. That said, candidates will benefit significantly from a basic understanding of computer networking concepts (IP addressing, TCP/IP, OSI model), familiarity with operating system fundamentals on both Windows and Linux, and general comfort navigating command-line interfaces.
Candidates without prior IT experience are encouraged to complete foundational IT coursework first — such as CompTIA IT Fundamentals+ or A+ equivalent knowledge — before attempting the C|CT. The official EC-Council training course for the C|CT spans the full 20 domains and is available in instructor-led, online self-paced, and in-person formats, making it accessible regardless of a candidate's background or schedule.
The C|CT exam (code 212-82) consists of 60 questions delivered over 185 minutes. The exam uses a hybrid format combining multiple-choice questions that test conceptual and theoretical knowledge with hands-on practical questions administered in a live cyber range environment, similar to a CTF (Capture the Flag) challenge. This performance-based component directly validates applied technical skills in addition to knowledge recall.
The exam is administered at authorized ECC Exam Centers and is closed-book. Passing scores vary by exam form — cut scores range from 60% to 85% depending on the specific version of the exam, as each form undergoes independent psychometric analysis by subject matter experts to ensure equivalency. The exam is priced at $499 USD, and exam vouchers are valid for one year from the date of receipt. Maintaining the certification requires an $80 annual continuing education fee.
The C|CT positions holders for entry-level cybersecurity roles at a time when the global shortage of cybersecurity professionals exceeds 3.5 million unfilled positions. Typical roles for C|CT earners include SOC Analyst (Tier 1), Cybersecurity Technician, Network Security Associate, IT Security Support Specialist, and Junior Penetration Tester. Entry-level SOC analyst roles in the United States typically carry salaries ranging from $55,000 to $80,000 annually, with significant variation by location and industry sector.
Compared to alternatives like CompTIA Security+, the C|CT distinguishes itself through a stronger emphasis on hands-on, performance-based validation and a broader scope that includes digital forensics and ethical hacking fundamentals. Its ISO/IEC 17024 accreditation makes it recognized by government agencies and defense contractors, including eligibility consideration under the U.S. DoD 8570/8140 framework in certain baseline categories. For candidates planning to pursue advanced EC-Council credentials (CEH, CPENT, CHFI), the C|CT provides structured foundational coverage of all prerequisite knowledge areas.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 630 questions.
1. A security team analyzes a DDoS attack that exploits the NTP monlist command to amplify attack traffic. What amplification factor can NTP amplification attacks typically achieve? (Select one!)
Explanation
NTP amplification attacks using the monlist command typically achieve 50x to 70x amplification factor, meaning a small query generates responses 50-70 times larger. This makes NTP amplification highly effective for volumetric DDoS attacks. DNS amplification achieves similar ranges. 10x-20x and 5x-10x underestimate the threat. 100x-200x overestimates typical NTP amplification, though some scenarios may approach higher values.
2. A security analyst investigates an attack where the attacker sent fraudulent emails appearing to come from the company CEO to the finance department, requesting immediate wire transfers. The emails were personalized with details about ongoing projects obtained from the company's public filings. What type of social engineering attack is this? (Select one!)
Explanation
Whaling specifically targets high-value executives or decision-makers like CEOs, CFOs, and other C-suite personnel. The attack is highly targeted and personalized, often involving financial fraud or data theft. The distinguishing factor is targeting executives specifically. Phishing is generic, mass-distributed attacks without personalization. Spear phishing targets specific individuals but not necessarily executives. Pretexting involves creating fabricated scenarios to manipulate victims but does not specifically define executive targeting.
3. A security analyst evaluates a vulnerability with the following CVSS v4.0 metrics: Attack Vector Network, Attack Complexity Low, Privileges Required None, User Interaction None, and High impact to Confidentiality, Integrity, and Availability. The base score is 9.4. What severity rating applies? (Select one!)
Explanation
CVSS v4.0 defines Critical severity for scores ranging from 9.0 to 10.0. A score of 9.4 falls within this range. High severity covers 7.0 to 8.9. Medium severity covers 4.0 to 6.9. Severe is not a defined CVSS severity rating. The vulnerability characteristics of network-based attack requiring no privileges or user interaction with high CIA impact justifies the critical rating requiring immediate remediation.
4. A disaster recovery plan specifies that critical database servers must be restored within 2 hours of a failure, and the organization can tolerate losing no more than 15 minutes of transaction data. Which two metrics are being defined? (Select two!)
Multiple correct answersExplanation
Recovery Time Objective (RTO) defines the maximum acceptable downtime, which is 2 hours in this scenario. Recovery Point Objective (RPO) defines the maximum acceptable data loss measured in time, which is 15 minutes in this scenario. These metrics drive disaster recovery technology and process decisions. Mean Time Between Failures measures reliability by averaging time between system failures. Mean Time To Repair measures average time to restore a failed component. Maximum Tolerable Downtime is the absolute maximum time before business viability is threatened.
5. A mobile device management administrator must balance security and privacy for a BYOD program where employees use personal smartphones to access corporate email and documents. The solution must protect corporate data while respecting employee privacy. Which approach provides appropriate security with minimal privacy impact? (Select one!)
Explanation
Mobile Application Management controls only corporate applications and their data without managing the entire device, providing appropriate security for BYOD while respecting employee privacy. MAM enables selective wipe of corporate data leaving personal content intact. Mobile Device Management manages entire devices including personal data, suitable for corporate-owned devices but invasive for BYOD. Disabling personal applications defeats BYOD purpose and violates employee privacy expectations. Corporate-Owned Business Only eliminates privacy concerns but prevents BYOD cost savings and employee flexibility. MAM balances security requirements with BYOD privacy expectations.
One-time access to this exam