Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CCST Cybersecurity
Course Overview
Course Description
Video Overview (3:48)
Welcome to the Course!
Meet Your Instructor (0:55)
Cybersecurity Essentials and Core Concepts
Cybersecurity Essentials and Core Concepts (0:43)
Cybersecurity Defined (3:50)
CIA Triad (4:11)
Vulnerabilities, Threats, Exploits, and Risks (2:23)
Attack Vectors (8:10)
Module 1 Quiz
Threat Landscape and Attack Motives
Threat Landscape and Attack Motives (0:35)
Motivation for Attacks (2:06)
Categories of Attackers (2:35)
Malware (4:22)
Social Engineering Attacks (7:43)
Physical Attacks (3:06)
Denial of Service (DoS) Attacks (5:43)
Man-in-the-Middle Attacks (9:40)
Internet of Things (IoT) Weaknesses (3:37)
Bring Your Own Device (BYOD) Considerations (4:37)
Advanced Persistent Threat (APT) (2:52)
Module 2 Quiz
Strengthening Your Security Posture
Defense-in-Depth (8:44)
Strenthening Your Security Posture (0:34)
System Hardening (3:39)
Multi-Factor Authentication (MFA) (2:11)
Password Policies and Alternatives (3:58)
Authentication, Authorization, and Accounting (AAA) (3:55)
Encryption (9:38)
Protocols Supporting Encryption (5:01)
Code of Ethics (3:09)
Module 3 Quiz
Network Foundations and Security Fundamentals
TCP/IP Protocol Weaknesses (10:32)
Network Foundations and Security Fundamentals (0:39)
MAC Address Security Considerations (4:17)
IPv4 and IPv6 Addresses Security Considerations (11:16)
Security Appliances (7:41)
Cloud Security Considerations (4:39)
Proxy Servers (3:18)
Honeypots and Honeynets (1:18)
Module 4 Quiz
Controlling Access and Protecting the Network Edge
Controlling Access and Protecting the Network Edge (0:43)
Access Control List (ACL) Overview (4:31)
Numbered Standard ACLs (7:50)
Numbered Extended ACLs (10:19)
Named ACLs (14:17)
ACL Considerations (9:31)
Virtual Private Networks (VPNs) (10:08)
Network Access Control (NAC) (7:39)
Securing a Small Office/Home Office (SOHO) Wireless LAN (11:40)
LAB - Standard Numbered ACL (Optional)
LAB - Extended Numbered ACL (Optional)
LAB - Extended Named ACL (Optional)
Module 5 Quiz
Operating System Security and Network Tools
Operating System Security and Network Tools (1:42)
Microsoft Windows Security Considerations (7:13)
macOS Security Considerations (9:58)
Linux Security Considerations (9:08)
netstat Utility (4:35)
nslookup Utility (3:14)
tcpdump Utility (5:56)
LAB - Installing Kali Linux (Optional)
LAB - NETSTAT (Optional)
LAB - Installing Wireshark (Optional)
Module 6 Quiz
System Maintenance, Updates, and Logging
System Maintenance, Updates, and Logging (0:34)
Hardware and Software Inventory (3:05)
Software and Hardware Updates (3:54)
System Log Interpretation (6:25)
Module 7 Quiz
Security Assessment and Risk Analysis
Security Assessment and Risk Analysis (1:45)
Vulnerability Management (3:23)
Active vs. Passive Reconnaissance (3:43)
Port Scanning (3:39)
Threat Intelligence (4:21)
Vulnerability Response (2:21)
Risk Management (6:07)
Security Assessments (5:42)
Disaster Recovery (8:53)
Types of Backups (10:09)
LAB - NMAP (Optional)
Module 8 Quiz
Security Incident Response
Stages of Incident Response (3:35)
Security Incident Response (1:35)
Contrasting SIEM and SOAR (5:28)
Cyber Kill Chain (4:07)
MITRE ATT&CK Matrix (2:45)
Diamond Model (3:16)
Tactics, Techniques, and Procedures (TTP) (6:27)
Evidence (3:42)
Compliance Regulations (3:49)
Module 9 Quiz
Exam Preparation
Exam Preparation (0:49)
Registering for the Exam (3:18)
Study Strategies (3:06)
What to do on Exam Day (3:24)
Congratulations and Next Steps
Congratulations and Next Steps (2:06)
Course Downloads
Course Slides Download - CCST Cybersecurity
Module Quiz Download - CCST Cybersecurity
Practice Exams Download - CCST Cybersecurity
Labs Download - CCST Cybersecurity
Audio Version of Training
Audio Download
Congratulations and Next Steps
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock