Cisco Certified Support Technician (CCST) Cyber Security Training And Certification Program

Unlock cybersecurity excellence with the Cisco Certified Support Technician (CCST) Cybersecurity program, featuring expert training, hands-on learning, and a globally recognized CISCO certification.

  • Transform your learning with a program that goes beyond traditional cybersecurity training.
  • Earn CISCO certification and a prestigious Online Badge to showcase your cybersecurity expertise.
  • Empower students, job seekers, professionals, and entrepreneurs.
  • Immerse yourself in 30 hours of dynamic, hands-on online training, and acquire real-world skills that will set you on the path to success
Course Fee : ₹12000.00/-

Course Curriculum

Topic

Modules

Essential Security Principles
  • Define essential security principles
    • Vulnerabilities, threats, exploits, and risks; attack vectors; hardening; defense-in-depth; confidentiality, integrity, and availability (CIA); types of attackers; reasons for attacks; code of ethics
  • Explain common threats and vulnerabilities
    • Malware, ransomware, denial of service, botnets, social engineering attacks (tailgating, spear  phishing, phishing, vishing, smishing, etc.), physical attacks, man in the middle, loT vulnerabilities, insider threats, Advanced Persistent Threat (APT)
  • Explain access management principles
    • Authentication, authorization, and accounting (AAA); RADIUS; multifactor authentication (MFA); password policies
  • Explain encryption methods and applications
    • Types of encryptions, hashing,  certificates, public key infrastructure (PKI); strong Vs weak encryption algorithms; states of data and appropriate encryption (data in transit, data at rest, data in use); protocols that use encryption
Basic Network Security Concepts
  • Describe TCP/IP protocol vulnerabilities:
    • TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Explain how network addresses impact network security:
    • IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public Vs. private networks)
  • Describe network infrastructure and technologies:
    • Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
  • Set up a secure wireless SoHo network
    • MAC address filtering, encryption standards and protocols, SSID
  • Implement secure access technologies
    • ACL, firewall, VPN, NAC
Endpoint Security Concepts
  • Describe operating system security concepts
    • Windows, macOS, and Linux; security features, including Windows Defender and host-based firewalls;  CLI and PowerShell; file and directory permissions; privilege escalation
  • Demonstrate familiarity with appropriate endpoint tools that gather security assessment information
    • netstat, nslookup, tcpdump
  • Verify that endpoint systems meet security policies and standards  
    • Hardware inventory (asset management), software inventory, program deployment, data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app  distribution, configuration management)
  • Implement software and hardware updates
    • Windows Update, application updates, device drivers, firmware, patching
  • Interpret system logs
    • Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
  • Demonstrate familiarity with malware removal
    • Scanning systems, reviewing scan logs, malware remediation
Vulnerability Assessment and Risk Management
  • Explain vulnerability management
    • Vulnerability identification, management, and mitigation; active and passive reconnaissance; testing  (port scanning, automation)
  • Use threat intelligence techniques to identify potential network vulnerabilities
    • Uses and limitations of vulnerability databases; industry-standard tools used to assess vulnerabilities and make recommendations, policies, and reports; Common Vulnerabilities and Exposures (CVEs), cybersecurity reports, cybersecurity news, subscription services, and collective intelligence; ad hoc  and automated threat intelligence; the importance of updating documentation and other forms of communication proactively before, during, and after cybersecurity incidents; how to secure, share and update documentation.
  • Explain risk management
    • Vulnerability vs. risk, ranking risks, approaches to risk management, risk mitigation strategies, levels of risk (low, medium, high, extremely high), risks associated with specific types of data and data classifications, security assessments of IT systems (information security, change management, computer operations, information assurance)
  • Explain the importance of disaster recovery and business continuity planning
    • Natural and human-caused disasters, features of disaster recovery plans (DRP) and business continuity plans (BCP), backup, disaster recovery controls (detective, preventive, and corrective)
Incident Handling
  • Monitor security events and know when escalation is required
    • Role of SIEM and SOAR, monitoring network data to identify security incidents (packet captures, various log file entries, etc.), identifying suspicious events as they occur
  • Explain digital forensics and attack attribution processes
    • Cyber Kill Chain, MITRE ATT&CK Matrix, and Diamond Model; Tactics, Techniques, and Procedures (UP); sources of evidence (artifacts); evidence handling (preserving digital evidence, chain of custody)
  • Explain the impact of compliance frameworks on incident handling
    • Compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA), reporting and notification requirements
  • Describe the elements of cybersecurity incident response
    • Policy, plan, and procedure elements; incident response lifecycle stages (NIST Special Publication 800-61 sections 2.3, 3.1-3.4)

About the course

Experience a transformative learning journey with the course offered by Manorama Horizon in collaboration with Active Edu. This isn't just your ordinary cybersecurity training; it's your gateway to the prestigious Cisco Certified Support Technician (CCST) Cybersecurity certification, globally renowned for its excellence in cybersecurity proficiency. Our program not only enriches your cybersecurity skills but also unveils a world of boundless opportunities. What sets us apart is the opportunity to learn directly from certified cybersecurity experts, who provide hands-on training in a dynamic online environment. Here, you'll acquire not only theoretical knowledge but also practical skills, giving your career a competitive advantage. Upon completing the program and securing your CCST Cybersecurity certification, you'll have the chance to flaunt your expertise with a prestigious Online Badge. Whether you're a student seeking knowledge and career prospects, a job seeker aiming to enter or excel in the cybersecurity industry, a professional looking to upgrade your skills, or an entrepreneur safeguarding your business and earning client trust – this program offers invaluable benefits. Join this course today and embark on a transformational journey towards a prosperous future in cybersecurity. Seize this opportunity – enroll now and take your first step towards cybersecurity excellence!

Eligibility

Candidates joining Cisco Certified Support Technician (CCST) Cybersecurity training and certification program needs Computer Proficiency for hassle-free learning.

Requirements

  • Seamlessly connect to our world of knowledge with a stable Internet connection.
  • Empower your learning journey by having a laptop or PC ready for classes, project work, and remote exams – your gateway to success in cybersecurity

Class Timings

Date : 16th October 2023 - 30th October 2023

Time : 9:00 PM to 11:00 PM IST

Knowledge Partner