Companies Home Search Profile

Cisco Certified Support Technician (CCST): Cybersecurity

Focused View

Marious Kuriata

5:10:42

43 View
  • 001 Welcome!.mp4
    05:06
  • 001 Basic terms.mp4
    06:15
  • 002 Attackers, code of ethics, and security principles.mp4
    05:55
  • 003 Malware.mp4
    04:46
  • 004 Social engineering.mp4
    01:22
  • 005 Physical security (+ a data center tour!).mp4
    08:34
  • 006 Overview of some basic Cisco commands.mp4
    02:29
  • 007 Confidentiality integrity availability (CIA).mp4
    06:33
  • 008 Denial of service.mp4
    03:37
  • 009 Denial of service - lab.mp4
    03:36
  • 010 Man-in-the-middle.mp4
    01:14
  • 011 Authentication, authorization, and accounting (AAA).mp4
    05:41
  • 012 RADIUS.mp4
    06:15
  • 013 Multifactor authentication (MFA).mp4
    03:54
  • 014 Secure passwords.mp4
    09:29
  • 015 Secure passwords - part 2.mp4
    04:37
  • 016 Attacking a password of a Cisco device using Kali Linux.mp4
    02:27
  • 017 Encryption.mp4
    08:38
  • 018 Hashing.mp4
    07:07
  • 019 Certificates.mp4
    08:42
  • 020 Protect your data.mp4
    03:23
  • 001 Describe TCPIP protocol vulnerabilities.mp4
    07:27
  • 002 MAC and ARP.mp4
    04:30
  • 003 Capturing messages with Wireshark.mp4
    02:37
  • 004 MAC Flood attack - a lab.mp4
    03:26
  • 005 Network segmentation.mp4
    03:23
  • 006 IP addresses and NAT.mp4
    06:05
  • 007 Network infrastructure and technologies.mp4
    04:18
  • 008 IPS and IDS.mp4
    06:44
  • 009 Set up a secure wireless SoHo network.mp4
    03:49
  • 010 Will we achieve 1Gbps using a wireless access point - lab.mp4
    08:32
  • 011 Implement secure access technologies.mp4
    02:58
  • 012 VPN - lab.mp4
    05:20
  • 013 What is the cloud.mp4
    05:51
  • 001 Windows Firewall.mp4
    07:28
  • 002 PowerShell and basic commands.mp4
    03:09
  • 003 NTFS and share permissions.mp4
    14:44
  • 004 Netstat, nslookup, tcpdump.mp4
    07:19
  • 005 Verify that endpoint systems meet security policies and standards.mp4
    07:54
  • 006 Compliance (PCI DSS, HIPAA, GDPR).mp4
    03:55
  • 007 Patches and updates.mp4
    09:07
  • 008 Logs in Windows (Event Viewer).mp4
    02:26
  • 009 Logging.mp4
    04:30
  • 010 Antivirus - lab.mp4
    05:39
  • 001 Vulnerabilities.mp4
    06:01
  • 002 Pen testing - scanning a network.mp4
    04:50
  • 003 Use threat intelligence techniques to identify potential network vulnerabilities.mp4
    06:19
  • 004 Common Vulnerabilities and Exposures (CVEs).mp4
    03:32
  • 005 Risk assessment - part 1.mp4
    04:34
  • 006 Risk assessment - part 2.mp4
    04:03
  • 007 Disaster recovery and business continuity planning.mp4
    04:28
  • 001 SIEM vs SOAR.mp4
    02:48
  • 002 Cyber Kill Chain, MITRE ATT&CK Matrix, and Diamond Model.mp4
    07:00
  • 003 NIST Special Publication 800-61.mp4
    03:44
  • 004 Compliance.mp4
    02:42
  • 001 Powershell examples.mp4
    03:36
  • 002 Installing a Cisco Access Point.mp4
    06:19
  • 003 Virtualization - installing Kali Linux using Virtual Box.mp4
    06:51
  • 004 A man-in-the-middle attack - lab (advanced!).mp4
    03:04
  • Description


    An entry point into the Cisco Certified program

    What You'll Learn?


    • Master the principles of cybersecurity, including vulnerabilities and ethical considerations
    • Acquire skills in tools and commands to test your network (Wireshark, CLI, cmd)
    • Learn about operating system security, malware removal, and software updates.
    • Gain hands-on experience with Cisco, Microsoft, and Linux systems.
    • Develop skills in incident handling, digital forensics, and compliance frameworks

    Who is this for?


  • Entry-level cybersecurity technicians
  • IT students and interns
  • IT professionals seeking to expand into cybersecurity
  • Individuals aiming for Cisco's CyberOps certification
  • What You Need to Know?


  • Basic IT knowledge (ipconfig, MAC addresses)
  • More details


    Description

    Are you looking to kickstart your career in cybersecurity? Our Cisco Certified Support Technician: Cybersecurity (CCST) course is specifically designed for entry-level technicians, students, interns, and IT professionals seeking to delve into the world of network and security. Hands-on experience with Cisco routers, switches, and access points will equip you with the real-world skills needed to protect digital assets. This course is an entry point into the Cisco Certified program. We will explore essential security principles, threats, vulnerabilities, access management principles, encryption methods, basic network security concepts, endpoint security, vulnerability assessment, risk management, incident handling, and more

    This course covers:

    • Essential Security Principles: Grasp the foundations of cybersecurity, including the understanding of vulnerabilities, threats, and ethical considerations.

    • Basic Network Security Concepts: Learn about TCP/IP vulnerabilities, network addresses, and the ins and outs of network security architecture.

    • Endpoint Security Concepts: Explore operating system security, endpoint tools, system logs interpretation, and malware removal techniques.

    • Vulnerability Assessment and Risk Management: Discover how to identify and manage vulnerabilities, assess risks, and plan for disaster recovery.

    • Incident Handling: Develop skills in monitoring security events, understanding digital forensics, compliance frameworks, and cybersecurity incident response.

    By the end of this course, participants will be ready to take the Cisco Certified Support Technician: Cybersecurity exam and will be qualified work-ready cybersecurity technicians.


    Join now!

    Who this course is for:

    • Entry-level cybersecurity technicians
    • IT students and interns
    • IT professionals seeking to expand into cybersecurity
    • Individuals aiming for Cisco's CyberOps certification

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Marious Kuriata
    Marious Kuriata
    Instructor's Courses
    Hi, my name is Marious. I have been working in IT for 20 years (web design, networking, security, tutoring, management). My courses/certifications: MCSE, MCSA, MCTS, MCP, Cisco CCNA, CCNP, CCNA Security, CCSP, Zyxel Security Professional, Postgraduate studies in networking & security. A Master's Degree in Human Resources.  20 years of experience in IT. This has included designing, troubleshooting and installing networks, Cisco routers, switches, access points and firewalls (ASA Firewalls, Aironet, VLANs, routing protocols RIP, OSPF, EIGRP, BGP, spanning tree, VPNs, Cyberoam, IPS/IDS, Riverbed), Previous experience includes Microsoft systems, IT Manager,  Technical Trainer (Cisco, Comptia, Microsoft) and Private Tutor.    CCNA Cisco Certified Network Associate (2009)    CCNP Cisco Certified Network Professional (2010)    CCNA_SEC Cisco Certified Network Associate Security (2012)    CCNA_ASA Cisco ASA Firewalls Specialist: Security and VPNs (2013)    CCSP (CCNP Sec) – Cisco Certified Security Specialist (2013)    ZCNP ZyXEL Certified Network Professional (2012)    MCSE Microsoft Certified Systems Engineer (2011)    MCP Microsoft Certified Professional (Windows Server) (2009)    MCTS Microsoft Certified Technology Specialist (Vista) (2009)    MCSA Microsoft Certified Systems Administrator (2010)                Training in ERP management, Cisco Networking Academy CCNA (distinction)                Microsoft Courses (Windows Server 2003, SQL, XP, ISA Server, Exchange Server) Thanks and good luck with your studies!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 59
    • duration 5:10:42
    • English subtitles has
    • Release Date 2023/11/14