Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size820.1 MB
  • Uploaded Byfreecoursewb
  • Downloads61
  • Last checkedMay. 30th '25
  • Date uploadedMay. 29th '25
  • Seeders 6
  • Leechers14

Infohash : 59312404B6F09BD7BAD22CE73D8E8C081DB7B3F3

Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep

https://WebToolTip.com

Released 05/2025
With Kevin Wallace
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 6h 26m 18s | Size: 820 MB

Discover the core concepts and technical skills required to tackle the Cisco Certified Support Technician (CCST) Cybersecurity (100-160) certification exam.

Course details
Getting certified as a Cisco Certified Support Technician (CCST) can be a great fit if you’re just starting out in a cybersecurity career. This course prepares you for Cisco’s CCST Cybersecurity certification exam while covering practical knowledge and skills needed to succeed in today's cybersecurity landscape. Instructor Kevin Wallace offers a thorough foundation in cybersecurity fundamentals, from basic security principles to incident response techniques. Through structured modules, you'll learn essential security concepts, network protection strategies, and practical incident response skills that are crucial for today's cybersecurity professionals.

Files:

[ WebToolTip.com ] Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 01 - Welcome to the course.mp4 (7.8 MB)
    • 01 - Welcome to the course.srt (6.3 KB)
    • 02 - Meet your instructor.mp4 (2.5 MB)
    • 02 - Meet your instructor.srt (1.5 KB)
    02 - 1. Cybersecurity Essentials and Core Concepts
    • 01 - Module 1 Cybersecurity essentials and core concepts.mp4 (1.6 MB)
    • 01 - Module 1 Cybersecurity essentials and core concepts.srt (1.0 KB)
    • 02 - Cybersecurity defined.mp4 (11.8 MB)
    • 02 - Cybersecurity defined.srt (6.5 KB)
    • 03 - CIA triad.mp4 (8.7 MB)
    • 03 - CIA triad.srt (7.0 KB)
    • 04 - Vulnerabilities, threats, exploits, and risks.mp4 (4.9 MB)
    • 04 - Vulnerabilities, threats, exploits, and risks.srt (4.2 KB)
    • 05 - Attack vectors.mp4 (16.4 MB)
    • 05 - Attack vectors.srt (14.3 KB)
    03 - 2. Threat Landscape and Attack Motives
    • 01 - Module 2 Threat landscape and attack motives.mp4 (1.5 MB)
    • 01 - Module 2 Threat landscape and attack motives.srt (0.8 KB)
    • 02 - Categories of attackers.mp4 (4.3 MB)
    • 02 - Categories of attackers.srt (4.7 KB)
    • 03 - Motivation for attacks.mp4 (3.3 MB)
    • 03 - Motivation for attacks.srt (3.5 KB)
    • 04 - Malware.mp4 (8.4 MB)
    • 04 - Malware.srt (7.5 KB)
    • 05 - Social engineering attacks.mp4 (18.3 MB)
    • 05 - Social engineering attacks.srt (14.1 KB)
    • 06 - Physical attacks.mp4 (6.4 MB)
    • 06 - Physical attacks.srt (5.5 KB)
    • 07 - Denial of service (DoS) attacks.mp4 (11.2 MB)
    • 07 - Denial of service (DoS) attacks.srt (9.5 KB)
    • 08 - Man-in-the-middle attacks.mp4 (20.3 MB)
    • 08 - Man-in-the-middle attacks.srt (16.8 KB)
    • 09 - Internet of things (IoT) weaknesses.mp4 (8.2 MB)
    • 09 - Internet of things (IoT) weaknesses.srt (6.2 KB)
    • 10 - Bring your own device (BYOD) considerations.mp4 (8.5 MB)
    • 10 - Bring your own device (BYOD) considerations.srt (8.3 KB)
    • 11 - Advanced persistent threat (APT).mp4 (5.3 MB)
    • 11 - Advanced persistent threat (APT).srt (4.9 KB)
    04 - 3. Strengthening Your Security Posture
    • 01 - Module 3 Strengthening your security posture.mp4 (1.4 MB)
    • 01 - Module 3 Strengthening your security posture.srt (0.8 KB)
    • 02 - Defense in depth.mp4 (17.9 MB)
    • 02 - Defense in depth.srt (16.2 KB)
    • 03 - System hardening.mp4 (9.5 MB)
    • 03 - System hardening.srt (6.3 KB)
    • 04 - Multi-factor authentication (MFA).mp4 (3.7 MB)
    • 04 - Multi-factor authentication (MFA).srt (3.7 KB)
    • 05 - Password policies and alternatives.mp4 (8.4 MB)
    • 05 - Password policies and alternatives.srt (6.7 KB)
    • 06 - Authentication, authorization, and accounting (AAA).mp4 (6.8 MB)
    • 06 - Authentication, authorization, and accounting (AAA).srt (6.7 KB)
    • 07 - Encryption.mp4 (20.1 MB)
    • 07 - Encryption.srt (15.6 KB)
    • 08 - Protocols supporting encryption.mp4 (10.3 MB)
    • 08 - Protocols supporting encryption.srt (7.8 KB)
    • 09 - Code of ethics.mp4 (6.5 MB)
    • 09 - Code of ethics.srt (5.6 KB)
    05 - 4. Network Foundations and Security Fundamentals
    • 01 - Module 4 Network foundations and security fundamentals.mp4 (1.6 MB)
    • 01 - Module 4 Network foundations and security fundamentals.srt (0.9 KB)
    • 02 - TCPIP protocol weaknesses.mp4 (26.1 MB)
    • 02 - TCPIP protocol weaknesses.srt (18.0 KB)
    • 03 - MAC address security considerations.mp4 (8.4 MB)
    • 03 - MAC address security considerations.srt (7.5 KB)
    • 04 - IPv4 and IPv6 address security considerations.mp4 (22.9 MB)
    • 04 - IPv4 and IPv6 address security considerations.srt (17.4 KB)
    • 05 - Security appliances.mp4 (13.7 MB)
    • 05 - Security appliances.srt (12.9 KB)
    • 06 - Cloud security considerations.mp4 (10.5 MB)
    • 06 - Cloud security considerations.srt (7.5 KB)
    • 07 - Proxy servers.mp4 (6.7 MB)
    • 07 - Proxy servers.srt (5.6 KB)
    • 08 - Honeypots and honeynets.mp4 (2.5 MB)
    • 08 - Honeypots and honeynets.srt (2.1 KB)
    06 - 5. Controlling Access and Protecting the Network Edge
    • 01 - Module 5 Controlling access and protecting the network edge.mp4 (1.7 MB)
    • 01 - Module 5 Controlling access and protecting the network edge.srt (1.0 KB)
    • 02 - Access control list (ACL) overview.mp4 (8.4 MB)
    • 02 - Access control list (ACL) overview.srt (7.7 KB)
    • 03 - Numbered standard ACLs.mp4 (15.7 MB)
    • 03 - Numbered standard ACLs.srt (12.1 KB)
    • 04 - Numbered extended ACLs.mp4 (21.8 MB)
    • 04 - Numbered extended ACLs.srt (16.1 KB)
    • 05 - Named ACLs.mp4 (29.5 MB)
    • 05 - Named ACLs.srt (20.9 KB)
    • 06 - ACL considerations.mp4 (19.7 MB)
    • 06 - ACL considerations.srt (14.6 KB)
    • 07 - Virtual private networks (VPNs).mp4 (18.3 MB)
    • 07 - Virtual private networks (VPNs).srt (16.7 KB)
    • 08 - Network access control (NAC).mp4 (15.9 MB)
    • 08 - Network access control (NAC).srt (13.2 KB)
    • 09 - Securing a small officehome office (SOHO) wireless LAN.mp4 (24.1 MB)
    • 09 - Securing a small officehome office (SOHO) wireless LAN.srt (18.9 KB)
    07 - 6. Operating System Security and Network Tools
    • 01 - Module 6 Operating system security and network tools.mp4 (6.3 MB)
    • 01 - Module 6 Operating system security and network tools.srt (2.9 KB)
    • 02 - Microsoft Windows security considerations.mp4 (19.1 MB)
    • 02 - Microsoft Windows security considerations.srt (12.7 KB)
    • 03 - macOS security considerations.mp4 (20.3 MB)
    • 03 - macOS security considerations.srt (16.4 KB)
    • 04 - Linux security considerations.mp4 (17.8 MB)
    • 04 - Linux security considerations.srt (14.6 KB)
    • 05 - netstat utility.mp4 (12.3 MB)
    • 05 - netstat utility.srt (7.3 KB)
    • 06 - nslookup utility.mp4 (6.0 MB)
    • 06 - nslookup

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce