Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Course

(100-160.AB1.E0T)
Lessons
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
  • Certification Exam Topics and This Course
  • Taking the CCST Cybersecurity Certification Exam
  • Tracking Your Status
  • How to Prepare for an Exam
  • Assessing Exam Readiness
  • Cisco Cybersecurity Certifications in the Real World
  • Exam Registration
  • Exam Retake Policy
  • Course Content Updates
2

Security Principles

  • The CIA Triad
  • Common Security Terms
  • Types of Attackers and Their Reasons for Attacks
  • Code of Ethics
  • Summary
  • Review All Key Topics
3

Common Threats, Attacks, and Vulnerabilities

  • Malware Variants
  • IoT Vulnerabilities
  • Distributed Denial of Service
  • On-Path Attacks
  • Insider Threats
  • Social Engineering Tactics
  • Physical Attacks
  • Advanced Persistent Threats (APTs)
  • Summary
  • Review All Key Topics
4

Access Management

  • Introduction to AAA
  • Authentication
  • Authorization
  • Accounting
  • RADIUS
  • Summary
  • Review All Key Topics
5

Cryptography

  • Cryptography Overview
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Using Symmetric and Asymmetric Cryptography
  • Types of Ciphers
  • Certificates and PKI
  • Hashing
  • Cryptography in the Real World
  • Cisco Next-Generation Cryptography
  • Summary
  • Review All Key Topics
6

Introduction to Networking, Addressing, and TCP/IP Protocols

  • The TCP/IP Stack
  • Common TCP/IP Protocols and Their Vulnerabilities
  • Network Addressing and Its Impact on Security
  • Summary
  • Review All Key Topics
7

Network Infrastructure

  • The Network Security Architecture
  • Screened Subnets, Virtualization, and the Cloud
  • Proxy Servers
  • Honeypots
  • Intrusion Detection/Prevention Systems
  • Summary
  • Review All Key Topics
8

Controlling Network Access

  • Virtual Private Networks
  • Firewalls
  • Access Control Lists
  • Network Access Control
  • Summary
  • Review All Key Topics
9

Wireless SOHO Security

  • Hardening Wireless Routers and Access Points
  • Wireless Encryption Standards
  • Wireless Authentication
  • Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
  • Common Wireless Network Threats and Attacks
  • Summary
  • Review All Key Topics
10

Operating Systems and Tools

  • Host Security Features
  • Windows
  • Linux
  • macOS
  • Tools
  • Summary
  • Review All Key Topics
11

Endpoint Policies and Standards

  • Asset Management
  • Program Deployment
  • Backups
  • Bring Your Own Device (BYOD)
  • Regulatory Compliance
  • Summary
  • Review All Key Topics
12

Network and Endpoint Malware Detection and Remediation

  • Monitoring and Detection
  • Malware Remediation Best Practices
  • Summary
  • Review All Key Topics
13

Risk and Vulnerability Management

  • The Vocabulary of Risk
  • Vulnerabilities
  • Risk
  • Summary
  • Review All Key Topics
14

Threat Intelligence

  • Threat Intelligence
  • Vulnerabilities Databases and Feeds
  • Additional Sources of Threat Intelligence
  • How and Why to Proactively Share Threat Intelligence
  • Summary
  • Review All Key Topics
15

Disaster Recovery and Business Continuity

  • Disaster Recovery Plans
  • Business Impact Analyses (BIAs)
  • Business Continuity Plans
  • Disaster Recovery Versus Business Continuity
  • Summary
  • Review All Key Topics
16

Incident Handling

  • Events and Incidents
  • Incident Response
  • Attack Frameworks and Concepts
  • Evidence and Artifacts
  • Compliance Frameworks
  • Summary
  • Review All Key Topics
17

Final Preparation

  • Tools and Resources
  • Study Tips
  • Summary

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Course

$279.99

Buy Now

Related Courses

All Course
scroll to top