Cisco Certified Support Technician (CCST) Cybersecurity 100-160

This course includes
Lessons
TestPrep
Lab

Lessons

22+ Lessons | 209+ Exercises | 166+ Quizzes | 418+ Flashcards | 418+ Glossary of terms

TestPrep

4+ Full Length Tests | 150+ Practice Test Questions

Here's what you will learn

Download Course Outline

Lessons 1: Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
  • Certification Exam Topics and This Course
  • Taking the CCST Cybersecurity Certification Exam
  • Tracking Your Status
  • How to Prepare for an Exam
  • Assessing Exam Readiness
  • Cisco Cybersecurity Certifications in the Real World
  • Exam Registration
  • Course Content Updates

Lessons 2: Security Principles

  • The CIA Triad
  • Common Security Terms
  • Types of Attackers and Their Reasons for Attacks
  • Code of Ethics
  • Summary
  • Review All Key Topics

Lessons 3: Common Threats, Attacks, and Vulnerabilities

  • Malware Variants
  • IoT Vulnerabilities
  • Distributed Denial of Service
  • On-Path Attacks
  • Insider Threats
  • Social Engineering Tactics
  • Physical Attacks
  • Advanced Persistent Threats (APTs)
  • Summary
  • Review All Key Topics

Lessons 4: Access Management

  • Introduction to AAA
  • Authentication
  • Authorization
  • Accounting
  • RADIUS
  • Summary
  • Review All Key Topics

Lessons 5: Cryptography

  • Cryptography Overview
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Using Symmetric and Asymmetric Cryptography
  • Types of Ciphers
  • Certificates and PKI
  • Hashing
  • Cryptography in the Real World
  • Cisco Next-Generation Cryptography
  • Summary
  • Review All Key Topics

Lessons 6: Introduction to Networking, Addressing, and TCP/IP Protocols

  • The TCP/IP Stack
  • Common TCP/IP Protocols and Their Vulnerabilities
  • Network Addressing and Its Impact on Security
  • Summary
  • Review All Key Topics

Lessons 7: Network Infrastructure

  • The Network Security Architecture
  • Screened Subnets, Virtualization, and the Cloud
  • Proxy Servers
  • Honeypots
  • Intrusion Detection/Prevention Systems
  • Summary
  • Review All Key Topics

Lessons 8: Controlling Network Access

  • Virtual Private Networks
  • Firewalls
  • Access Control Lists
  • Network Access Control
  • Summary
  • Review All Key Topics

Lessons 9: Wireless SOHO Security

  • Hardening Wireless Routers and Access Points
  • Wireless Encryption Standards
  • Wireless Authentication
  • Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
  • Common Wireless Network Threats and Attacks
  • Summary
  • Review All Key Topics

Lessons 10: Operating Systems and Tools

  • Host Security Features
  • Windows
  • Linux
  • macOS
  • Tools
  • Summary
  • Review All Key Topics

Lessons 11: Endpoint Policies and Standards

  • Asset Management
  • Program Deployment
  • Backups
  • Bring Your Own Device (BYOD)
  • Regulatory Compliance
  • Summary
  • Review All Key Topics

Lessons 12: Network and Endpoint Malware Detection and Remediation

  • Monitoring and Detection
  • Malware Remediation Best Practices
  • Summary
  • Review All Key Topics

Lessons 13: Risk and Vulnerability Management

  • The Vocabulary of Risk
  • Vulnerabilities
  • Risk
  • Summary
  • Review All Key Topics

Lessons 14: Threat Intelligence

  • Threat Intelligence
  • Vulnerabilities Databases and Feeds
  • Additional Sources of Threat Intelligence
  • How and Why to Proactively Share Threat Intelligence
  • Summary
  • Review All Key Topics

Lessons 15: Disaster Recovery and Business Continuity

  • Disaster Recovery Plans
  • Business Impact Analyses (BIAs)
  • Business Continuity Plans
  • Disaster Recovery Versus Business Continuity
  • Summary
  • Review All Key Topics

Lessons 16: Incident Handling

  • Events and Incidents
  • Incident Response
  • Attack Frameworks and Concepts
  • Evidence and Artifacts
  • Compliance Frameworks
  • Summary
  • Review All Key Topics

Lessons 17: glossary

Lessons 18: Final Preparation

  • Tools and Resources
  • Study Tips
  • Summary

Lessons 19: Practice Set A

  • question

Lessons 20: Practice Set B

  • question

Lessons 21: Practice Set C

  • questions

Lessons 22: Practice Set D

  • questions

Hands-on LAB Activities (Performance Labs)