Cisco Certified Support Technician (CCST) Cybersecurity 100-160
This course includes
Lessons
TestPrep
Lab
Lessons
22+ Lessons | 209+ Exercises | 166+ Quizzes | 417+ Flashcards | 417+ Glossary of terms
TestPrep
4+ Full Length Tests | 150+ Practice Test Questions
Need guidance and support? Click here to check our Instructor Led Course.
Here's what you will learn
Download Course OutlineLessons 1: Introduction
- Goals and Methods
- Who Should Read This Course?
- Strategies for Exam Preparation
- How This Course Is Organized
- Certification Exam Topics and This Course
- Taking the CCST Cybersecurity Certification Exam
- Tracking Your Status
- How to Prepare for an Exam
- Assessing Exam Readiness
- Cisco Cybersecurity Certifications in the Real World
- Exam Registration
- Course Content Updates
Lessons 2: Security Principles
- The CIA Triad
- Common Security Terms
- Types of Attackers and Their Reasons for Attacks
- Code of Ethics
- Summary
- Review All Key Topics
Lessons 3: Common Threats, Attacks, and Vulnerabilities
- Malware Variants
- IoT Vulnerabilities
- Distributed Denial of Service
- On-Path Attacks
- Insider Threats
- Social Engineering Tactics
- Physical Attacks
- Advanced Persistent Threats (APTs)
- Summary
- Review All Key Topics
Lessons 4: Access Management
- Introduction to AAA
- Authentication
- Authorization
- Accounting
- RADIUS
- Summary
- Review All Key Topics
Lessons 5: Cryptography
- Cryptography Overview
- Symmetric Cryptography
- Asymmetric Cryptography
- Using Symmetric and Asymmetric Cryptography
- Types of Ciphers
- Certificates and PKI
- Hashing
- Cryptography in the Real World
- Cisco Next-Generation Cryptography
- Summary
- Review All Key Topics
Lessons 6: Introduction to Networking, Addressing, and TCP/IP Protocols
- The TCP/IP Stack
- Common TCP/IP Protocols and Their Vulnerabilities
- Network Addressing and Its Impact on Security
- Summary
- Review All Key Topics
Lessons 7: Network Infrastructure
- The Network Security Architecture
- Screened Subnets, Virtualization, and the Cloud
- Proxy Servers
- Honeypots
- Intrusion Detection/Prevention Systems
- Summary
- Review All Key Topics
Lessons 8: Controlling Network Access
- Virtual Private Networks
- Firewalls
- Access Control Lists
- Network Access Control
- Summary
- Review All Key Topics
Lessons 9: Wireless SOHO Security
- Hardening Wireless Routers and Access Points
- Wireless Encryption Standards
- Wireless Authentication
- Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
- Common Wireless Network Threats and Attacks
- Summary
- Review All Key Topics
Lessons 10: Operating Systems and Tools
- Host Security Features
- Windows
- Linux
- macOS
- Tools
- Summary
- Review All Key Topics
Lessons 11: Endpoint Policies and Standards
- Asset Management
- Program Deployment
- Backups
- Bring Your Own Device (BYOD)
- Regulatory Compliance
- Summary
- Review All Key Topics
Lessons 12: Network and Endpoint Malware Detection and Remediation
- Monitoring and Detection
- Malware Remediation Best Practices
- Summary
- Review All Key Topics
Lessons 13: Risk and Vulnerability Management
- The Vocabulary of Risk
- Vulnerabilities
- Risk
- Summary
- Review All Key Topics
Lessons 14: Threat Intelligence
- Threat Intelligence
- Vulnerabilities Databases and Feeds
- Additional Sources of Threat Intelligence
- How and Why to Proactively Share Threat Intelligence
- Summary
- Review All Key Topics
Lessons 15: Disaster Recovery and Business Continuity
- Disaster Recovery Plans
- Business Impact Analyses (BIAs)
- Business Continuity Plans
- Disaster Recovery Versus Business Continuity
- Summary
- Review All Key Topics
Lessons 16: Incident Handling
- Events and Incidents
- Incident Response
- Attack Frameworks and Concepts
- Evidence and Artifacts
- Compliance Frameworks
- Summary
- Review All Key Topics
Lessons 17: glossary
Lessons 18: Final Preparation
- Tools and Resources
- Study Tips
- Summary
Lessons 19: Practice Set A
- question
Lessons 20: Practice Set B
- question
Lessons 21: Practice Set C
- questions
Lessons 22: Practice Set D
- questions