Cisco Certified Support Technician (CCST) Cybersecurity 100-160

Learn cybersecurity fundamentals, incident response, and troubleshooting through our CCST 100-106 training course.

(100-160.AB1) / ISBN : 978-1-64459-561-9
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Our Cisco Certified Support Technician (CCST) Cybersecurity course is your launchpad. This course discusses the core concepts of network security, incident response, and troubleshooting. We’ll also explore topics like TCP/IP protocols, VLANs, packet analysis, firewall rules, and more, all in a way that’s both informative and engaging. 

Skills You’ll Get

  • Learn the cybersecurity fundamentals and common cyber threats 
  • Master access management techniques, such as AAA (Authentication, Authorization, Accounting) and RADIUS
  • Be proficient in cryptography, including symmetric and asymmetric cryptography, ciphers, certificates, PKI, and hashing 
  • Understand networking, addressing, and TCP/IP protocols, including the TCP/IP stack, common protocols, and network addressing 
  • Know network infrastructure, including network security architecture, screened subnets, virtualization, cloud, proxy servers, honeypots, and IDS/IPS 
  • Manage access across the network using VPNs, firewalls, ACLs, and NAC 
  • Set up endpoint policies and standards, including asset management, program deployment, backups, BYOD, and regulatory compliance 
  • Navigate operating systems and learn to use tools like Window Defender, Event Viewer dig, nslookup, netstat, and Wireshark 
  • Analyze and remediate network and endpoint malware 
  • Implement disaster recovery and business continuity plans

 

1

Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • Strategies for Exam Preparation
  • How This Course Is Organized
  • Certification Exam Topics and This Course
  • Taking the CCST Cybersecurity Certification Exam
  • Tracking Your Status
  • How to Prepare for an Exam
  • Assessing Exam Readiness
  • Cisco Cybersecurity Certifications in the Real World
  • Exam Registration
  • Exam Retake Policy
  • Course Content Updates
2

Security Principles

  • The CIA Triad
  • Common Security Terms
  • Types of Attackers and Their Reasons for Attacks
  • Code of Ethics
  • Summary
  • Review All Key Topics
3

Common Threats, Attacks, and Vulnerabilities

  • Malware Variants
  • IoT Vulnerabilities
  • Distributed Denial of Service
  • On-Path Attacks
  • Insider Threats
  • Social Engineering Tactics
  • Physical Attacks
  • Advanced Persistent Threats (APTs)
  • Summary
  • Review All Key Topics
4

Access Management

  • Introduction to AAA
  • Authentication
  • Authorization
  • Accounting
  • RADIUS
  • Summary
  • Review All Key Topics
5

Cryptography

  • Cryptography Overview
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Using Symmetric and Asymmetric Cryptography
  • Types of Ciphers
  • Certificates and PKI
  • Hashing
  • Cryptography in the Real World
  • Cisco Next-Generation Cryptography
  • Summary
  • Review All Key Topics
6

Introduction to Networking, Addressing, and TCP/IP Protocols

  • The TCP/IP Stack
  • Common TCP/IP Protocols and Their Vulnerabilities
  • Network Addressing and Its Impact on Security
  • Summary
  • Review All Key Topics
7

Network Infrastructure

  • The Network Security Architecture
  • Screened Subnets, Virtualization, and the Cloud
  • Proxy Servers
  • Honeypots
  • Intrusion Detection/Prevention Systems
  • Summary
  • Review All Key Topics
8

Controlling Network Access

  • Virtual Private Networks
  • Firewalls
  • Access Control Lists
  • Network Access Control
  • Summary
  • Review All Key Topics
9

Wireless SOHO Security

  • Hardening Wireless Routers and Access Points
  • Wireless Encryption Standards
  • Wireless Authentication
  • Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering
  • Common Wireless Network Threats and Attacks
  • Summary
  • Review All Key Topics
10

Operating Systems and Tools

  • Host Security Features
  • Windows
  • Linux
  • macOS
  • Tools
  • Summary
  • Review All Key Topics
11

Endpoint Policies and Standards

  • Asset Management
  • Program Deployment
  • Backups
  • Bring Your Own Device (BYOD)
  • Regulatory Compliance
  • Summary
  • Review All Key Topics
12

Network and Endpoint Malware Detection and Remediation

  • Monitoring and Detection
  • Malware Remediation Best Practices
  • Summary
  • Review All Key Topics
13

Risk and Vulnerability Management

  • The Vocabulary of Risk
  • Vulnerabilities
  • Risk
  • Summary
  • Review All Key Topics
14

Threat Intelligence

  • Threat Intelligence
  • Vulnerabilities Databases and Feeds
  • Additional Sources of Threat Intelligence
  • How and Why to Proactively Share Threat Intelligence
  • Summary
  • Review All Key Topics
15

Disaster Recovery and Business Continuity

  • Disaster Recovery Plans
  • Business Impact Analyses (BIAs)
  • Business Continuity Plans
  • Disaster Recovery Versus Business Continuity
  • Summary
  • Review All Key Topics
16

Incident Handling

  • Events and Incidents
  • Incident Response
  • Attack Frameworks and Concepts
  • Evidence and Artifacts
  • Compliance Frameworks
  • Summary
  • Review All Key Topics
17

Final Preparation

  • Tools and Resources
  • Study Tips
  • Summary

1

Common Threats, Attacks, and Vulnerabilities

  • Analyzing Malware
  • Performing a Phishing Attack
2

Cryptography

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Examining PKI Certificates
  • Observing an SHA256-Generated Hash Value
  • Observing an MD5-Generated Hash Value
3

Introduction to Networking, Addressing, and TCP/IP Protocols

  • Using TCP/IP Protocols in Linux
  • Configuring an FTP Server
  • Viewing the MAC Address on Different Interfaces
  • Configuring a Class A IP Address
  • Configuring NAT on the ISA Gateway (Windows Server)
4

Network Infrastructure

  • Setting up a Demilitarized Zone
  • Installing the Proxy Server Feature
  • Setting Up a Honeypot
  • Enabling Intrusion Detection and Prevention
5

Controlling Network Access

  • Configuring a VPN
  • Using Windows Firewall
  • Configuring a Standard ACL
  • Enabling an Access Control List
6

Wireless SOHO Security

  • Configuring SOHO-Grade Access Points
  • Configuring a Wireless AP
  • Configuring WPA2 Enterprise Security
  • Using a Wireless AP for MAC Address Filtering
7

Operating Systems and Tools

  • Configuring the Windows Defender Settings
  • Using Windows Event Viewer
  • Managing NTFS Permissions
  • Using the dig Command in Linux
  • Using the nslookup Command
  • Using the netstat Command in Linux
  • Capturing a Packet Using Wireshark
  • Using the netstat Command in Windows
8

Endpoint Policies and Standards

  • Creating a Backup
9

Risk and Vulnerability Management

  • Performing Nmap SYN Scan
  • Conducting Vulnerability Scanning Using Nessus
10

Threat Intelligence

  • Studying CVSS Exercises with the CVSS Calculator
  • Consulting a Vulnerability Database

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

This CISCO CCST 100-160 exam is designed for individuals who are beginning their journey in cybersecurity. It is suitable for entry-level IT professionals, students, and anyone interested in gaining foundational knowledge in cybersecurity.

The exam covers topics such as essential security principles, network security concepts, endpoint security concepts, vulnerability assessment and risk management, and incident handling.

There are no formal prerequisites for the CCST Cybersecurity 100-160 exam. However, a basic understanding of networking and security concepts can be helpful.

To prepare for the Cisco 100-160 exam, you can enroll in our CCST training course to reinforce your concepts and upskill your skills.

The CCST 100-160 exam is 50 minutes long.

The Cisco CCST Cybersecurity certification is an entry-level certification that focuses on foundational cybersecurity skills. It serves as a stepping stone to more advanced certifications like the Cisco CyberOps Associate. Unlike other Cisco certifications that may focus on networking or specific technologies, the CCST Cybersecurity certification provides an overview of cybersecurity principles.

The cost of the Cisco CCST 100-160 exam is approximately $125.

Become a CCST Certified Cybersecurity Technician

  With our CCST cybersecurity study guide, you’ll be well-prepared to tackle the challenges of the digital landscape. 

$ 431.83

Buy Now
scroll to top