EC-Council • CCT
Validates foundational and practical cybersecurity skills through a performance-based exam, covering network security, ethical hacking, digital forensics, incident response, risk management, threat intelligence, application security, cryptography, and IoT and cloud security.
Questions
630
Duration
185 minutes
Passing Score
70%
Difficulty
FoundationalLast Updated
Feb 2026
The EC-Council Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity certification designed to validate both foundational knowledge and applied technical skills across the core disciplines of the field. Exam code 212-82, the credential covers 20 domains including network security, ethical hacking, digital forensics, incident response, risk management, threat intelligence, application security, cryptography, IoT/OT security, and cloud computing. It is accredited by the ANAB (ANSI National Accreditation Board) under the ISO/IEC 17024 standard, giving it formal recognition comparable to other globally respected IT certifications.
What distinguishes the C|CT from other entry-level credentials is its hybrid performance-based exam format, which combines traditional multiple-choice questions with hands-on practical challenges in a CTF-style cyber range environment. The curriculum is reinforced by 85 labs spanning all core domains, ensuring candidates develop real-world skills rather than purely theoretical knowledge. According to EC-Council, 67% of C|CT earners successfully transitioned into cybersecurity roles after obtaining the certification, and 1 in 2 individuals chose it as their first cybersecurity credential.
The C|CT is aimed at individuals entering the cybersecurity field for the first time, including recent graduates from IT or computer science programs, military veterans transitioning to civilian tech roles, IT help desk and support technicians seeking to move into security, and professionals in adjacent roles such as network administration or systems administration who want to formalize their security skills. It is also well-suited for career changers from non-technical backgrounds who have completed a cybersecurity bootcamp or self-study program.
Specific job roles this certification prepares candidates for include SOC Analyst (Tier 1), IT Support Specialist, Network Security Technician, Cybersecurity Analyst, and Junior Penetration Tester. It serves as a stepping stone toward more advanced EC-Council credentials such as the Certified Ethical Hacker (CEH) or Certified Security Analyst (ECSA).
There are no formal prerequisites required to enroll in the C|CT course or register for the 212-82 exam. EC-Council positions this as a truly entry-level credential accessible to anyone with a desire to enter cybersecurity. That said, candidates will benefit significantly from a basic understanding of computer networking concepts (IP addressing, TCP/IP, OSI model), familiarity with operating system fundamentals on both Windows and Linux, and general comfort navigating command-line interfaces.
Candidates without prior IT experience are encouraged to complete foundational IT coursework first — such as CompTIA IT Fundamentals+ or A+ equivalent knowledge — before attempting the C|CT. The official EC-Council training course for the C|CT spans the full 20 domains and is available in instructor-led, online self-paced, and in-person formats, making it accessible regardless of a candidate's background or schedule.
The C|CT exam (code 212-82) consists of 60 questions delivered over 185 minutes. The exam uses a hybrid format combining multiple-choice questions that test conceptual and theoretical knowledge with hands-on practical questions administered in a live cyber range environment, similar to a CTF (Capture the Flag) challenge. This performance-based component directly validates applied technical skills in addition to knowledge recall.
The exam is administered at authorized ECC Exam Centers and is closed-book. Passing scores vary by exam form — cut scores range from 60% to 85% depending on the specific version of the exam, as each form undergoes independent psychometric analysis by subject matter experts to ensure equivalency. The exam is priced at $499 USD, and exam vouchers are valid for one year from the date of receipt. Maintaining the certification requires an $80 annual continuing education fee.
The C|CT positions holders for entry-level cybersecurity roles at a time when the global shortage of cybersecurity professionals exceeds 3.5 million unfilled positions. Typical roles for C|CT earners include SOC Analyst (Tier 1), Cybersecurity Technician, Network Security Associate, IT Security Support Specialist, and Junior Penetration Tester. Entry-level SOC analyst roles in the United States typically carry salaries ranging from $55,000 to $80,000 annually, with significant variation by location and industry sector.
Compared to alternatives like CompTIA Security+, the C|CT distinguishes itself through a stronger emphasis on hands-on, performance-based validation and a broader scope that includes digital forensics and ethical hacking fundamentals. Its ISO/IEC 17024 accreditation makes it recognized by government agencies and defense contractors, including eligibility consideration under the U.S. DoD 8570/8140 framework in certain baseline categories. For candidates planning to pursue advanced EC-Council credentials (CEH, CPENT, CHFI), the C|CT provides structured foundational coverage of all prerequisite knowledge areas.
1. A network security team investigates malware that operates entirely in memory using PowerShell and Windows Management Instrumentation without writing files to disk. Which malware category is this? (Select one!)
2. A forensic investigator arrives at a scene where a compromised server is still running with active network connections. According to the order of volatility, which evidence source should be collected first? (Select one!)
3. A security researcher analyzes malware that completely rewrites its own code with each infection without using any decryption routine. The malware's binary signature changes entirely between infections, making signature-based detection ineffective. What type of malware is this? (Select one!)
4. A healthcare organization conducts a business impact analysis for disaster recovery planning. Critical patient record systems are valued at 800,000 dollars with an exposure factor of 40 percent if the database server fails. Historical data shows the server experiences critical failures approximately every 5 years. What is the Annualized Loss Expectancy for this asset? (Select one!)
5. A web application uses the following code to query a database: query = "SELECT * FROM users WHERE username = '" + userInput + "'". What vulnerability does this code introduce? (Select one!)
All exams included • Cancel anytime