Companies Home Search Profile

Cisco Certified Support Technician (CCST) Cybersecurity Online Training

Focused View

James Conrad

20:49:47

625 View
  • 1.Introduction1C30C.mp4
    01:35
  • 2.Vulnerabilities1C30C.mp4
    12:04
  • 3.1C30C.mp4
    12:38
  • 4.Types of Vulnerabilities1C30C.mp4
    10:54
  • 5.Exploits Risks and Threats1C30C.mp4
    08:52
  • 6.Attack Vectors and Defense-in-Depth1C30C.mp4
    08:22
  • 7.Types of Attackers and Code of Ethics1C30C.mp4
    04:17
  • 8.Reasons for Attacks1C30C.mp4
    03:24
  • 1.Types of Malware1C30C.mp4
    20:30
  • 2.Symptoms of Malware1C30C.mp4
    10:53
  • 3.Common Attacks Part 11C30C.mp4
    13:04
  • 4.1C30C.mp4
    05:45
  • 5.Common Attacks Part 21C30C.mp4
    05:54
  • 6.1C30C.mp4
    08:04
  • 7.Password Attacks1C30C.mp4
    03:37
  • 1.Authentication1C30C.mp4
    10:14
  • 2.Authorization and Accounting1C30C.mp4
    11:37
  • 3.Password Management1C30C.mp4
    18:20
  • 4.National Institute of Standards and Technology (NIST) Recommendations1C30C.mp4
    07:11
  • 5.RADIUS1C30C.mp4
    06:19
  • 6.Validation1C30C.mp4
    05:19
  • saved url-Passphrase.txt
  • 1.What is Encryption 1C30C.mp4
    08:01
  • 2.Encryption of Data at Rest1C30C.mp4
    15:12
  • 3.Encryption of Data in Transit1C30C.mp4
    10:14
  • 4.Data in Use1C30C.mp4
    09:11
  • 5.Validation1C30C.mp4
    03:43
  • saved url-Chilling RAM.txt
  • saved url-KeePass Vulnerability.txt
  • saved url-RAM Scraping.txt
  • saved url-Windows 11.txt
  • 1.Symmetric Encryption1C30C.mp4
    18:34
  • 2.Asymmetric Encryption1C30C.mp4
    09:39
  • 3.Summary of Algorithms1C30C.mp4
    09:24
  • 4.Hashing Data1C30C.mp4
    13:44
  • 5.Validation1C30C.mp4
    03:54
  • saved url-Explaining Secure Key Exchange.txt
  • saved url-Hash Converter (Limited).txt
  • saved url-Hash site that allows large files.txt
  • saved url-The Rubiks Cube from Hell.txt
  • saved url-View various SSL methods in use.txt
  • 1.The TCP Protocol1C30C.mp4
    12:11
  • 2.The IP Protocol1C30C.mp4
    12:01
  • 3.Protocol Vulnerabilities1C30C.mp4
    18:05
  • 4.UDP and Additional Protocols1C30C.mp4
    12:26
  • 1.1C30C.mp4
    00:43
  • 2.Introduction1C30C.mp4
    08:22
  • 3.Understanding Binary and Decimal Notation1C30C.mp4
    09:12
  • 4.Calculate a Subnet Mask Result1C30C.mp4
    08:56
  • 5.Understanding Switch and Router Functions1C30C.mp4
    08:54
  • 6.Public vs Private Addresses1C30C.mp4
    05:15
  • 7.Network Address Translation1C30C.mp4
    06:27
  • 8.IPv6 Addressing1C30C.mp4
    03:09
  • saved url-Layer 2 Switching.txt
  • saved url-Sizing up IPv6.txt
  • 1.1C30C.mp4
    00:36
  • 2.Network Architecture Requirements1C30C.mp4
    08:13
  • 3.Network Architecture Fault Tolerance1C30C.mp4
    04:33
  • 4.Network Architecture Scalability1C30C.mp4
    13:07
  • 5.1C30C.mp4
    08:14
  • 6.Network Architecture QoS Security1C30C.mp4
    03:21
  • 7.DMZ and Proxy1C30C.mp4
    10:13
  • 8.Honeypot1C30C.mp4
    08:14
  • 9.Virtualization Overview1C30C.mp4
    07:17
  • 10.Virtualization Demo1C30C.mp4
    15:32
  • 11.Your Invisible Friend The Cloud1C30C.mp4
    03:50
  • saved url-Tour Microsoft Datacenters.txt
  • saved url-VMWare Workstation Player.txt
  • saved url-Virtualbox.txt
  • saved url-Windows 365 Cloud PC.txt
  • 1.1C30C.mp4
    02:27
  • 2.SoHo Introduction 1C30C.mp4
    07:48
  • 3.Device Requirements1C30C.mp4
    06:46
  • 4.Purpose and Availability Requirements1C30C.mp4
    12:28
  • 5.1C30C.mp4
    06:53
  • 6.Wireless Bands and Channels1C30C.mp4
    10:03
  • 7.Wireless Protocols1C30C.mp4
    21:42
  • saved url-Default Passwords for Internet Routers.txt
  • 1.1C30C.mp4
    00:30
  • 2.Introduction1C30C.mp4
    05:03
  • 3.Access Control List Overview1C30C.mp4
    04:44
  • 4.ACL Implementations1C30C.mp4
    10:03
  • 5.ACL Demonstration1C30C.mp4
    05:22
  • 6.Firewall Essentials1C30C.mp4
    07:09
  • 7.Other Firewall Types1C30C.mp4
    18:26
  • 8.Network Access Control (NAC)1C30C.mp4
    06:39
  • saved url-Apply and Verify Cisco Access Control Lists (Keith Barker).txt
  • 1.Windows Installed Base and Support1C30C.mp4
    09:14
  • 2.The Windows User Interface1C30C.mp4
    13:59
  • 3.The Windows File System1C30C.mp4
    10:49
  • 4.1C30C.mp4
    17:43
  • 5.1C30C.mp4
    06:08
  • saved url-Installed Operating Systems.txt
  • saved url-Windows 11.txt
  • saved url-Windows Lifecycle.txt
  • 1.Microsoft Defender Overview1C30C.mp4
    05:31
  • 2.1C30C.mp4
    14:42
  • 3.Microsoft Defender Demonstration1C30C.mp4
    15:04
  • 4.1C30C.mp4
    06:26
  • saved url-Implement Secure Access Technologies.txt
  • saved url-Windows Defender Technology.txt
  • saved url-Windows Firewall Configuration.txt
  • saved url-Windows Firewall Rules.txt
  • 1.1C30C.mp4
    14:57
  • 2.Introduction to PowerShell1C30C.mp4
    07:56
  • 3.1C30C.mp4
    03:45
  • 4.PowerShell Examples1C30C.mp4
    04:42
  • 5.1C30C.mp4
    16:00
  • 6.Introduction to Linux1C30C.mp4
    11:25
  • 7.1C30C.mp4
    05:24
  • 8.Linux Terminal Overview1C30C.mp4
    02:00
  • saved url-Common Linux Commands Cheat-Sheet.txt
  • saved url-Linux Essentials.txt
  • saved url-Linux Essentials Course.txt
  • 1.Windows File and Directory Permissions1C30C.mp4
    13:05
  • 2.Linux and macOS File and Directory Permissions1C30C.mp4
    10:26
  • 3.1C30C.mp4
    08:59
  • 4.Configure macOS Firewall1C30C.mp4
    08:47
  • 5.Configure Linux Firewall1C30C.mp4
    02:39
  • 6.Validation1C30C.mp4
    01:45
  • saved url-Configuring the pf.conf file .txt
  • saved url-Detailed configuration of the firewall.txt
  • saved url-Linux Mint.txt
  • saved url-Official Ubuntu firewall documentation.txt
  • saved url-Windows Server.txt
  • 1.1C30C.mp4
    12:25
  • 2.Hardware Inventory 1C30C.mp4
    04:07
  • 3.Using Intune to Track Assets1C30C.mp4
    07:37
  • 4.Manage Software1C30C.mp4
    09:22
  • 5.Manage an Android Device1C30C.mp4
    08:31
  • 6.Configuration Management1C30C.mp4
    04:12
  • 7.Configuration Management with Configuration Profile1C30C.mp4
    02:46
  • saved url-More info about the ins and outs of asset tagging.txt
  • 1.Introduction1C30C.mp4
    01:13
  • 2.Regulatory Compliance GDPR1C30C.mp4
    05:18
  • 3.Regulatory Compliance - PCI DSS1C30C.mp4
    03:06
  • 4.Regulatory Compliance HIPPA1C30C.mp4
    08:36
  • 5.Backup Purpose1C30C.mp4
    11:59
  • 6.Backup Media Types and Frequency1C30C.mp4
    10:15
  • 7.1C30C.mp4
    08:47
  • 8.Backup Products1C30C.mp4
    05:55
  • saved url-Tape Backups.txt
  • saved url-Windows Server 2022.txt
  • 1.Types of Windows Updates1C30C.mp4
    13:54
  • 2.Client-Side Windows Update Settings1C30C.mp4
    12:44
  • 3.Windows Server Update Services (WSUS)1C30C.mp4
    07:02
  • 4.Updates via Intune1C30C.mp4
    09:11
  • 5.Software Driver and Firmware Updates1C30C.mp4
    12:19
  • 6.Validation1C30C.mp4
    01:43
  • saved url-Types of Windows Updates.txt
  • 1.Event Viewer Overview1C30C.mp4
    11:39
  • 2.1C30C.mp4
    11:21
  • 3.Manage Event Viewer1C30C.mp4
    05:35
  • 4.Event Viewer Examples1C30C.mp4
    04:52
  • 5.Event Viewer Tools1C30C.mp4
    04:55
  • 6.Syslog1C30C.mp4
    03:50
  • saved url-Eventlog Analyzer.txt
  • saved url-Free Event Log Monitoring.txt
  • saved url-Jeff Kish Syslog Training.txt
  • saved url-Splunk.txt
  • saved url-Windows 11.txt
  • 1.Does Linux Need Antimalware 1C30C.mp4
    08:32
  • 2.Linux Targets1C30C.mp4
    07:50
  • 3.Linux Attacks Ransomware and Cryptojacking1C30C.mp4
    04:14
  • 4.Linux Attacks State-Sponsored File-less and IoT1C30C.mp4
    06:54
  • 5.macOS and Security1C30C.mp4
    09:06
  • 6.XProtect in Action1C30C.mp4
    03:35
  • 7.Scan Logs and Malware Remediation1C30C.mp4
    08:32
  • 8.Validation1C30C.mp4
    05:39
  • saved url-Windows 11.txt
  • 1.Intro1C30C.mp4
    00:45
  • 2.OS and Network Vulnerabilities1C30C.mp4
    03:58
  • 3.Common Vulnerabilities and Exposure (CVEs)1C30C.mp4
    10:07
  • 4.Scanning Networks Using Nmap and Zenmap1C30C.mp4
    12:35
  • 5.Managing Ubuntu Firewall Ports1C30C.mp4
    10:36
  • 6.Configuring SSH1C30C.mp4
    05:08
  • 7.Skill Validation1C30C.mp4
    02:37
  • saved url-Kali Linux.txt
  • saved url-Nmap.txt
  • 1.Introducing Compliance Frameworks1C30C.mp4
    00:36
  • 2.Complying With PCI DSS1C30C.mp4
    09:30
  • 3.Complying With HIPAA1C30C.mp4
    03:30
  • 4.Complying With FERPA1C30C.mp4
    04:22
  • 5.Complying With GDPR1C30C.mp4
    06:07
  • 6.Working With ISO 27001 and NIST Templates1C30C.mp4
    13:24
  • 7.Compliance Laws and Standards1C30C.mp4
    00:55
  • 8.Skill Validation1C30C.mp4
    02:25
  • saved url-NIST Framework.txt
  • saved url-PCI v4.0.txt
  • saved url-US Department of Education FERPA.txt
  • 1.Intro1C30C.mp4
    00:36
  • 2.Vulnerability vs Risk1C30C.mp4
    07:41
  • 3.Determine Risk Rankings1C30C.mp4
    09:31
  • 4.Exploring Insider Risks Policies1C30C.mp4
    15:59
  • 5.Complete Policy Review1C30C.mp4
    03:13
  • 6.Skill Validation1C30C.mp4
    01:21
  • 7.Review1C30C.mp4
    04:38
  • 1.Intro1C30C.mp4
    00:56
  • 2.SIEM vs SOAR1C30C.mp4
    06:32
  • 3.NIST SP 800-611C30C.mp4
    06:15
  • 4.Exploring Azure Sentinel1C30C.mp4
    11:33
  • 5.Tactics and Techniques1C30C.mp4
    14:02
  • 6.Skill Validation1C30C.mp4
    01:49
  • 7.Validation Questions1C30C.mp4
    04:41
  • saved url-Creating a Free Azure Account.txt
  • saved url-MITRE ATT&CK.txt
  • saved url-NIST SP 800-61.txt
  • More details


    This entry-level Cisco Certified Support Technician (CCST) Cybersecurity training prepares entry-level cybersecurity professionals to operate, maintain, troubleshoot, and configure the Cisco devices and software that keep devices and networks secure.

    The CCST series of certifications from Cisco was specially designed to serve two purposes. First, it introduces people who are brand new to IT to the subject matter and job expectations they can expect from the career field. Second, it familiarizes newcomers to the world of IT certifications and what's necessary to advance your IT career.

    Earning the CCST Cybersecurity puts your feet under you and prepares you for a career troubleshooting and monitoring devices and networks. This course makes sure you understand the concepts and vocabulary you'll hear and need to use on your first day on the job.

    For anyone who leads a technology team, this Cisco training can be used to onboard new entry-level cybersecurity professionals, curated into individual or team training plans, or as a Cisco reference resource.

    CCST Cybersecurity: What You Need to Know

    For any entry-level cybersecurity professional looking to improve their proficiency with cybersecurity, this Cisco course covers topics such as:

    • Essential security principles like threats, exploits, and vulnerabilities
    • Fundamentals of network operations
    • Endpoint system security concepts related to OS and software
    • Vulnerability assessment and risk management basics
    • Responsibilities and expectations around incident handling

    Who Should Take CCST Cybersecurity Training?

    This CCST training was designed for entry-level cybersecurity professionals. This entry-level cybersecurity concepts and topics skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced entry-level cybersecurity professionals looking to validate their Cisco skills.

    New or aspiring entry-level cybersecurity professionals. If you've never held a job in the IT world, or you're very early in your IT career, the CCST certifications will ensure you understand everything about the job, from the technology to the terminology and even to the job responsibilities and expectations. Set yourself up for success with this course that will prepare you for one of your first industry credentials.

    Experienced entry-level cybersecurity professionals. If you've got a few years of experience in cybersecurity already, this course and the CCST Cybersecurity will probably be easy, but it's still worth it to take. If you've never taken the time to learn the official, by-the-book terminology and technological concepts that Cisco expects of its entry-level technicians, it's worth setting the foundation early with this course and earning a cert that will solidify your career.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    James Conrad
    James Conrad
    Instructor's Courses

    I really enjoy teaching someone a topic that was difficult for me to learn so they don’t have to go through the same pain that I did while learning that topic.

    James brings more than 30 years of IT experience to his training. He got his start in IT volunteering for a nonprofit and becoming their defacto IT pro — while using an MS-DOS portable computer. Before joining CBT Nuggets, James did freelance IT work, and wrote and reviewed technical books. His hobbies include photography, hiking, and traveling, especially to Eastern Europe and Russia.

    Certifications: Microsoft Certified Professional, Microsoft Certified Solutions Associate, Microsoft Certified Solutions Expert, Microsoft Certified Technician, Certified Ethical Hacker, and CompTIA A+

    Areas of expertise: Microsoft (Group Policy) and CompTIA

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 156
    • duration 20:49:47
    • Release Date 2024/06/25

    Courses related to Cisco CCNA

    Courses related to Cisco

    Courses related to Computer Network

    Courses related to Network Engineering

    Courses related to Cisco CCNP