FileMood

Download [ WebToolTip.com ] Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep

WebToolTip com Cisco Certified Support Technician CCST Cybersecurity 100 160 Cert Prep

Name

[ WebToolTip.com ] Cisco Certified Support Technician (CCST) Cybersecurity (100-160) Cert Prep

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

859.9 MB

Total Files

160

Last Seen

2025-07-18 00:22

Hash

59312404B6F09BD7BAD22CE73D8E8C081DB7B3F3

/

Get Bonus Downloads Here.url

0.2 KB

/01 - Introduction/

01 - Welcome to the course.mp4

8.2 MB

01 - Welcome to the course.srt

6.4 KB

02 - Meet your instructor.mp4

2.6 MB

02 - Meet your instructor.srt

1.5 KB

/.../02 - 1. Cybersecurity Essentials and Core Concepts/

01 - Module 1 Cybersecurity essentials and core concepts.mp4

1.7 MB

01 - Module 1 Cybersecurity essentials and core concepts.srt

1.0 KB

02 - Cybersecurity defined.mp4

12.3 MB

02 - Cybersecurity defined.srt

6.6 KB

03 - CIA triad.mp4

9.1 MB

03 - CIA triad.srt

7.2 KB

04 - Vulnerabilities, threats, exploits, and risks.mp4

5.1 MB

04 - Vulnerabilities, threats, exploits, and risks.srt

4.3 KB

05 - Attack vectors.mp4

17.2 MB

05 - Attack vectors.srt

14.6 KB

/.../03 - 2. Threat Landscape and Attack Motives/

01 - Module 2 Threat landscape and attack motives.mp4

1.5 MB

01 - Module 2 Threat landscape and attack motives.srt

0.8 KB

02 - Categories of attackers.mp4

4.5 MB

02 - Categories of attackers.srt

4.8 KB

03 - Motivation for attacks.mp4

3.5 MB

03 - Motivation for attacks.srt

3.6 KB

04 - Malware.mp4

8.9 MB

04 - Malware.srt

7.7 KB

05 - Social engineering attacks.mp4

19.2 MB

05 - Social engineering attacks.srt

14.5 KB

06 - Physical attacks.mp4

6.7 MB

06 - Physical attacks.srt

5.7 KB

07 - Denial of service (DoS) attacks.mp4

11.8 MB

07 - Denial of service (DoS) attacks.srt

9.7 KB

08 - Man-in-the-middle attacks.mp4

21.3 MB

08 - Man-in-the-middle attacks.srt

17.2 KB

09 - Internet of things (IoT) weaknesses.mp4

8.6 MB

09 - Internet of things (IoT) weaknesses.srt

6.3 KB

10 - Bring your own device (BYOD) considerations.mp4

8.9 MB

10 - Bring your own device (BYOD) considerations.srt

8.5 KB

11 - Advanced persistent threat (APT).mp4

5.6 MB

11 - Advanced persistent threat (APT).srt

5.0 KB

/.../04 - 3. Strengthening Your Security Posture/

01 - Module 3 Strengthening your security posture.mp4

1.4 MB

01 - Module 3 Strengthening your security posture.srt

0.8 KB

02 - Defense in depth.mp4

18.8 MB

02 - Defense in depth.srt

16.6 KB

03 - System hardening.mp4

10.0 MB

03 - System hardening.srt

6.4 KB

04 - Multi-factor authentication (MFA).mp4

3.9 MB

04 - Multi-factor authentication (MFA).srt

3.8 KB

05 - Password policies and alternatives.mp4

8.8 MB

05 - Password policies and alternatives.srt

6.9 KB

06 - Authentication, authorization, and accounting (AAA).mp4

7.2 MB

06 - Authentication, authorization, and accounting (AAA).srt

6.9 KB

07 - Encryption.mp4

21.1 MB

07 - Encryption.srt

16.0 KB

08 - Protocols supporting encryption.mp4

10.8 MB

08 - Protocols supporting encryption.srt

8.0 KB

09 - Code of ethics.mp4

6.9 MB

09 - Code of ethics.srt

5.8 KB

/.../05 - 4. Network Foundations and Security Fundamentals/

01 - Module 4 Network foundations and security fundamentals.mp4

1.7 MB

01 - Module 4 Network foundations and security fundamentals.srt

1.0 KB

02 - TCPIP protocol weaknesses.mp4

27.4 MB

02 - TCPIP protocol weaknesses.srt

18.4 KB

03 - MAC address security considerations.mp4

8.8 MB

03 - MAC address security considerations.srt

7.7 KB

04 - IPv4 and IPv6 address security considerations.mp4

24.0 MB

04 - IPv4 and IPv6 address security considerations.srt

17.8 KB

05 - Security appliances.mp4

14.4 MB

05 - Security appliances.srt

13.2 KB

06 - Cloud security considerations.mp4

11.0 MB

06 - Cloud security considerations.srt

7.7 KB

07 - Proxy servers.mp4

7.0 MB

07 - Proxy servers.srt

5.7 KB

08 - Honeypots and honeynets.mp4

2.6 MB

08 - Honeypots and honeynets.srt

2.1 KB

/.../06 - 5. Controlling Access and Protecting the Network Edge/

01 - Module 5 Controlling access and protecting the network edge.mp4

1.7 MB

01 - Module 5 Controlling access and protecting the network edge.srt

1.1 KB

02 - Access control list (ACL) overview.mp4

8.8 MB

02 - Access control list (ACL) overview.srt

7.8 KB

03 - Numbered standard ACLs.mp4

16.4 MB

03 - Numbered standard ACLs.srt

12.4 KB

04 - Numbered extended ACLs.mp4

22.9 MB

04 - Numbered extended ACLs.srt

16.4 KB

05 - Named ACLs.mp4

31.0 MB

05 - Named ACLs.srt

21.4 KB

06 - ACL considerations.mp4

20.7 MB

06 - ACL considerations.srt

15.0 KB

07 - Virtual private networks (VPNs).mp4

19.2 MB

07 - Virtual private networks (VPNs).srt

17.1 KB

08 - Network access control (NAC).mp4

16.7 MB

08 - Network access control (NAC).srt

13.5 KB

09 - Securing a small officehome office (SOHO) wireless LAN.mp4

25.2 MB

09 - Securing a small officehome office (SOHO) wireless LAN.srt

19.3 KB

/.../07 - 6. Operating System Security and Network Tools/

01 - Module 6 Operating system security and network tools.mp4

6.6 MB

01 - Module 6 Operating system security and network tools.srt

2.9 KB

02 - Microsoft Windows security considerations.mp4

20.1 MB

02 - Microsoft Windows security considerations.srt

13.0 KB

03 - macOS security considerations.mp4

21.3 MB

03 - macOS security considerations.srt

16.8 KB

04 - Linux security considerations.mp4

18.7 MB

04 - Linux security considerations.srt

15.0 KB

05 - netstat utility.mp4

12.9 MB

05 - netstat utility.srt

7.5 KB

06 - nslookup utility.mp4

6.3 MB

06 - nslookup utility.srt

4.7 KB

07 - tcpdump utility.mp4

17.0 MB

07 - tcpdump utility.srt

9.4 KB

/.../08 - 7. System Maintenance, Updates, and Logging/

01 - Module 7 System maintenance, updates, and logging.mp4

1.7 MB

01 - Module 7 System maintenance, updates, and logging.srt

0.9 KB

02 - Hardware and software inventory.mp4

7.4 MB

02 - Hardware and software inventory.srt

5.6 KB

03 - Software and hardware updates.mp4

9.0 MB

03 - Software and hardware updates.srt

6.8 KB

04 - System log interpretation.mp4

14.7 MB

04 - System log interpretation.srt

10.9 KB

/.../09 - 8. Security Assessment and Risk Analysis/

01 - Module 8 Security assessment and risk analysis.mp4

5.2 MB

01 - Module 8 Security assessment and risk analysis.srt

2.8 KB

02 - Vulnerability management.mp4

7.7 MB

02 - Vulnerability management.srt

5.9 KB

03 - Active vs. passive reconnaissance.mp4

8.0 MB

03 - Active vs. passive reconnaissance.srt

6.3 KB

04 - Port scanning.mp4

8.4 MB

04 - Port scanning.srt

6.0 KB

05 - Threat intelligence.mp4

11.6 MB

05 - Threat intelligence.srt

6.9 KB

06 - Vulnerability response.mp4

4.5 MB

06 - Vulnerability response.srt

4.0 KB

07 - Risk management.mp4

11.5 MB

07 - Risk management.srt

10.7 KB

08 - Security assessments.mp4

13.1 MB

08 - Security assessments.srt

10.1 KB

09 - Disaster recovery.mp4

19.2 MB

09 - Disaster recovery.srt

14.9 KB

10 - Types of backups.mp4

20.8 MB

10 - Types of backups.srt

17.2 KB

/.../10 - 9. Security Incident Response/

01 - Module 9 Security incident response.mp4

4.0 MB

01 - Module 9 Security incident response.srt

2.5 KB

02 - Stages of incident response.mp4

7.4 MB

02 - Stages of incident response.srt

5.7 KB

03 - Contrasting SIEM and SOAR.mp4

11.8 MB

03 - Contrasting SIEM and SOAR.srt

9.5 KB

04 - Cyber kill chain.mp4

8.6 MB

04 - Cyber kill chain.srt

6.8 KB

05 - MITRE ATT&CK matrix.mp4

5.3 MB

05 - MITRE ATT&CK matrix.srt

4.6 KB

06 - Diamond model.mp4

6.8 MB

06 - Diamond model.srt

5.5 KB

07 - Tactics, techniques, and procedures (TTP).mp4

14.3 MB

07 - Tactics, techniques, and procedures (TTP).srt

11.0 KB

08 - Evidence.mp4

7.2 MB

08 - Evidence.srt

6.0 KB

09 - Compliance regulations.mp4

8.1 MB

09 - Compliance regulations.srt

6.3 KB

/.../11 - 10. Exam Preparation/

01 - Module 10 Exam preparation.mp4

1.6 MB

01 - Module 10 Exam preparation.srt

1.4 KB

02 - Registering for the exam.mp4

7.1 MB

02 - Registering for the exam.srt

5.0 KB

03 - Study strategies.mp4

14.7 MB

03 - Study strategies.srt

8.5 KB

04 - What to do on exam day.mp4

5.9 MB

04 - What to do on exam day.srt

6.2 KB

/.../12 - 11. Congratulations and Next Steps/

01 - Module 11 Congratulations and next steps.mp4

5.6 MB

01 - Module 11 Congratulations and next steps.srt

3.2 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.1 KB

 

Total files 160


Copyright © 2025 FileMood.com