Cisco Certified Support Technician (CCST) Cybersecurity 100-160
Learn cybersecurity fundamentals, incident response, and troubleshooting through our CCST 100-106 training course.
(100-160.AB1) / ISBN : 978-1-64459-561-9About This Course
Our Cisco Certified Support Technician (CCST) Cybersecurity course is your launchpad. This course discusses the core concepts of network security, incident response, and troubleshooting. We’ll also explore topics like TCP/IP protocols, VLANs, packet analysis, firewall rules, and more, all in a way that’s both informative and engaging.
Skills You’ll Get
- Learn the cybersecurity fundamentals and common cyber threats
- Master access management techniques, such as AAA (Authentication, Authorization, Accounting) and RADIUS
- Be proficient in cryptography, including symmetric and asymmetric cryptography, ciphers, certificates, PKI, and hashing
- Understand networking, addressing, and TCP/IP protocols, including the TCP/IP stack, common protocols, and network addressing
- Know network infrastructure, including network security architecture, screened subnets, virtualization, cloud, proxy servers, honeypots, and IDS/IPS
- Manage access across the network using VPNs, firewalls, ACLs, and NAC
- Set up endpoint policies and standards, including asset management, program deployment, backups, BYOD, and regulatory compliance
- Navigate operating systems and learn to use tools like Window Defender, Event Viewer dig, nslookup, netstat, and Wireshark
- Analyze and remediate network and endpoint malware
- Implement disaster recovery and business continuity plans
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
17+ Interactive Lessons | 204+ Exercises | 164+ Quizzes | 319+ Flashcards | 319+ Glossary of terms
Gamified TestPrep
45+ Pre Assessment Questions | 1+ Full Length Tests | 50+ Post Assessment Questions | 50+ Practice Test Questions
Hands-On Labs
37+ LiveLab | 37+ Video tutorials | 01:26+ Hours
Introduction
- Goals and Methods
- Who Should Read This Course?
- Strategies for Exam Preparation
- How This Course Is Organized
- Certification Exam Topics and This Course
- Taking the CCST Cybersecurity Certification Exam
- Tracking Your Status
- How to Prepare for an Exam
- Assessing Exam Readiness
- Cisco Cybersecurity Certifications in the Real World
- Exam Registration
- Exam Retake Policy
- Course Content Updates
Security Principles
- The CIA Triad
- Common Security Terms
- Types of Attackers and Their Reasons for Attacks
- Code of Ethics
- Summary
- Review All Key Topics
Common Threats, Attacks, and Vulnerabilities
- Malware Variants
- IoT Vulnerabilities
- Distributed Denial of Service
- On-Path Attacks
- Insider Threats
- Social Engineering Tactics
- Physical Attacks
- Advanced Persistent Threats (APTs)
- Summary
- Review All Key Topics
Access Management
- Introduction to AAA
- Authentication
- Authorization
- Accounting
- RADIUS
- Summary
- Review All Key Topics
Cryptography
- Cryptography Overview
- Symmetric Cryptography
- Asymmetric Cryptography
- Using Symmetric and Asymmetric Cryptography
- Types of Ciphers
- Certificates and PKI
- Hashing
- Cryptography in the Real World
- Cisco Next-Generation Cryptography
- Summary
- Review All Key Topics
Introduction to Networking, Addressing, and TCP/IP Protocols
- The TCP/IP Stack
- Common TCP/IP Protocols and Their Vulnerabilities
- Network Addressing and Its Impact on Security
- Summary
- Review All Key Topics
Network Infrastructure
- The Network Security Architecture
- Screened Subnets, Virtualization, and the Cloud
- Proxy Servers
- Honeypots
- Intrusion Detection/Prevention Systems
- Summary
- Review All Key Topics
Controlling Network Access
- Virtual Private Networks
- Firewalls
- Access Control Lists
- Network Access Control
- Summary
- Review All Key Topics
Wireless SOHO Security
- Hardening Wireless Routers and Access Points
- Wireless Encryption Standards
- Wireless Authentication
- Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
- Common Wireless Network Threats and Attacks
- Summary
- Review All Key Topics
Operating Systems and Tools
- Host Security Features
- Windows
- Linux
- macOS
- Tools
- Summary
- Review All Key Topics
Endpoint Policies and Standards
- Asset Management
- Program Deployment
- Backups
- Bring Your Own Device (BYOD)
- Regulatory Compliance
- Summary
- Review All Key Topics
Network and Endpoint Malware Detection and Remediation
- Monitoring and Detection
- Malware Remediation Best Practices
- Summary
- Review All Key Topics
Risk and Vulnerability Management
- The Vocabulary of Risk
- Vulnerabilities
- Risk
- Summary
- Review All Key Topics
Threat Intelligence
- Threat Intelligence
- Vulnerabilities Databases and Feeds
- Additional Sources of Threat Intelligence
- How and Why to Proactively Share Threat Intelligence
- Summary
- Review All Key Topics
Disaster Recovery and Business Continuity
- Disaster Recovery Plans
- Business Impact Analyses (BIAs)
- Business Continuity Plans
- Disaster Recovery Versus Business Continuity
- Summary
- Review All Key Topics
Incident Handling
- Events and Incidents
- Incident Response
- Attack Frameworks and Concepts
- Evidence and Artifacts
- Compliance Frameworks
- Summary
- Review All Key Topics
Final Preparation
- Tools and Resources
- Study Tips
- Summary
Common Threats, Attacks, and Vulnerabilities
- Analyzing Malware
- Performing a Phishing Attack
Cryptography
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Examining PKI Certificates
- Observing an SHA256-Generated Hash Value
- Observing an MD5-Generated Hash Value
Introduction to Networking, Addressing, and TCP/IP Protocols
- Using TCP/IP Protocols in Linux
- Configuring an FTP Server
- Viewing the MAC Address on Different Interfaces
- Configuring a Class A IP Address
- Configuring NAT on the ISA Gateway (Windows Server)
Network Infrastructure
- Setting up a Demilitarized Zone
- Installing the Proxy Server Feature
- Setting Up a Honeypot
- Enabling Intrusion Detection and Prevention
Controlling Network Access
- Configuring a VPN
- Using Windows Firewall
- Configuring a Standard ACL
- Enabling an Access Control List
Wireless SOHO Security
- Configuring SOHO-Grade Access Points
- Configuring a Wireless AP
- Configuring WPA2 Enterprise Security
- Using a Wireless AP for MAC Address Filtering
Operating Systems and Tools
- Configuring the Windows Defender Settings
- Using Windows Event Viewer
- Managing NTFS Permissions
- Using the dig Command in Linux
- Using the nslookup Command
- Using the netstat Command in Linux
- Capturing a Packet Using Wireshark
- Using the netstat Command in Windows
Endpoint Policies and Standards
- Creating a Backup
Risk and Vulnerability Management
- Performing Nmap SYN Scan
- Conducting Vulnerability Scanning Using Nessus
Threat Intelligence
- Studying CVSS Exercises with the CVSS Calculator
- Consulting a Vulnerability Database
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowThis CISCO CCST 100-160 exam is designed for individuals who are beginning their journey in cybersecurity. It is suitable for entry-level IT professionals, students, and anyone interested in gaining foundational knowledge in cybersecurity.
The exam covers topics such as essential security principles, network security concepts, endpoint security concepts, vulnerability assessment and risk management, and incident handling.
There are no formal prerequisites for the CCST Cybersecurity 100-160 exam. However, a basic understanding of networking and security concepts can be helpful.
To prepare for the Cisco 100-160 exam, you can enroll in our CCST training course to reinforce your concepts and upskill your skills.
The CCST 100-160 exam is 50 minutes long.
The Cisco CCST Cybersecurity certification is an entry-level certification that focuses on foundational cybersecurity skills. It serves as a stepping stone to more advanced certifications like the Cisco CyberOps Associate. Unlike other Cisco certifications that may focus on networking or specific technologies, the CCST Cybersecurity certification provides an overview of cybersecurity principles.
The cost of the Cisco CCST 100-160 exam is approximately $125.