Course
Cisco Certified Support Technician (CCST) - Cybersecurity
Overview
Course Description 📄
Welcome to the Cisco Certified Support Technician (CCST) – Cybersecurity course by Pennant Education!
The “Cisco Certified Support Technician (CCST) – Cybersecurity” course provides foundational knowledge and skills in cybersecurity, covering key topics such as threat analysis, security principles, and network protection. This course is designed to help learners understand critical cybersecurity concepts and prepare them for the CCST Cybersecurity Certification Exam. It is ideal for individuals looking to enter or advance in the field of cybersecurity.
Learning Formats 🎓
Develop a comprehensive understanding of cybersecurity concepts, including the identification of threats and implementation of security measures.
Gain hands-on experience in techniques for protecting networks and safeguarding data against common cyber threats and vulnerabilities.
Prepare for the CCST Cybersecurity Certification Exam and build a foundational knowledge base for pursuing advanced cybersecurity roles.
Learn to anticipate cyber threats and creatively implement robust security strategies to enhance system and data protection.
Key Features
Course Highlights ✨
Conceptual Clarity
Understand the nature of cybersecurity threats and the fundamental security principles necessary to protect networks and information systems.
Skill Enhancement
Apply practical skills in network protection and threat mitigation to prevent, detect, and respond to cyber incidents.
Innovative Application
Utilize current cybersecurity tools and techniques to improve security measures and practices within an organization.
Problem-Solving Proficiency
Develop the ability to analyze and respond to cybersecurity challenges with effective solutions that ensure the safety and integrity of data and systems.
Program
Roadmap
- Common Threats and Deception
- Cyber Attacks,
- Wireless and Mobile Device Attacks
- Application Attacks
- Current State of Affairs
- Who is Attacking Our Network
- IP PDU Details and IP Vulnerabilities
- TCP and UDP Vulnerabilities
- IP and Enterprise Services
- Mitigating Common Network Attacks
- Wireless Communications
- WLAN Threats and Secure WLANs
Security Devices and Services
- Windows History and Security
- Windows Architecture and Operations
- Windows Configuration and Monitoring
- Introduction
- Linux Basics
- Working in the Linux Shell
- Linux Servers and Clients
- Basic Server Administration
- The Linux File System
- Working with the Linux GUI
- Working on a Linux host
- Defending Systems and Devices
- Antimalware Protection
- Host-Based Intrusion Prevention
- Application Security
- The Three Dimensions
- States of Data
- Cybersecurity Countermeasures
- Defense-in-Depth
- Cybersecurity Operations Management
- Security Policies, Regulations, and Standards
- Physical and Application Security
- Network Hardening
- Hardening Wireless and Mobile Devices
- Cybersecurity Resilience
- Embedded and Specialized Systems
- Access Controls
- Account Management
- AAA usage and operation
- Introduction to Access Control Lists
- WildCard Masking
- Configure ACLs
- Named Standard IPv4 ACL
- Implement ACLs
- Mitigate Attacks with ACLs
- IPv6 ACLs
- Secure Networks with Firewalls
- Firewalls in Network Design
- ZPF Overview
- ZPF Operation
- Configure a ZPF
- Virtualization and Cloud Computing
- The Domains of Cloud Security
- Cloud Infrastructure Security
- Cloud Application Security
- Cloud Data Security
- Confidentiality
- Obscuring Data
- Integrity and Authenticity
- Using Hashes
- Public Key Cryptography
- Authorities and the PKI Trust System
- Applications and Impacts of Cryptography
- Monitoring Common Protocols
- Security Technologies
- Types of Security Data
- End Device Logs
- Network Logs
- Sources of Alerts
- Overview of Alerts
- Governance
- The Ethics of Cybersecurity
- IT Security Management Framework
- Security Assessments
- Network Security Testing Techniques
- Network Security Testing Tools
- Penetration Testing
- Information Sources
- Threat Intelligence Services
- Network and Server Profiling
- Common Vulnerability Scoring System (CVSS)
- Secure Device Management
- Risk Management
- Security Controls
- Evidence Handling and Attack Attribution
- The Cyber Kill Chain
- The Diamond Model of Intrusion Analysis
- Incident Response
- Disaster Recovery
Interested in Courses? Get in Touch!
Department Contact
- NYC
- (+62)21-2002-2012
- hello@yourdomain.tld
- Mon - Fri : 09.00-17.00