Home > Computing and Information Technology > Computer certification > Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)
16%
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Cybersecurity 100-160 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology experts Shane Sexton and Raymond Lacoste share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports An online Flash Cards application to help you drill on Key Terms by chapter A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This Cert Guide includes coverage of all the topics on the Cisco Certified Support Technician CCST Cybersecurity exam from the original exam blueprint. Visit ciscopress.com/newcerts for information on any digital updates for this book that align with Cisco exam blueprint version changes The Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide walks you through all the exam topics found in the Cisco CCST exam. Topics covered include Essential Security Principles Basic Network Security Concepts Endpoint Security Concepts Vulnerability Assessment and Risk Management Incident Handling Companion Website The companion website contains more than 200 unique practice exam questions. Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running on Android v8.0 and above and iOS v13 and above, smartphones with a minimum screen size of 4.7. Internet access required. Pearson Test Prep offline system requirements: Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Also available from Cisco Press for CCST study is the Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Premium Edition and Practice Test. This digital-only certification preparation product combines an eBook with an enhanced Pearson Test Prep Practice Test. This integrated learning package Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most

Table of Contents:
Introduction xxv Part I Introduction to Cybersecurity Chapter 1 Security Principles 2 “Do I Know This Already?” Quiz 2 Foundation Topics 4 The CIA Triad 4 Common Security Terms 5 Types of Attackers and Their Reasons for Attacks 7 Code of Ethics 9 Summary 10 Exam Preparation Tasks 11 Review All Key Topics 12 Define Key Terms 12 Complete Tables and Lists from Memory 12 Review Questions 12 Chapter 2 Common Threats, Attacks, and Vulnerabilities 14 “Do I Know This Already?” Quiz 15 Foundation Topics 16 Malware Variants 16 IoT Vulnerabilities 19 Distributed Denial of Service 19 On-Path Attacks 21 Insider Threats 23 Social Engineering Tactics 25 Phishing 26 Spear Phishing 26 Whaling 26 Vishing 26 Smishing 27 Piggybacking/Tailgating 27 Malvertising 27 Physical Attacks 27 Advanced Persistent Threats (APTs) 28 Summary 29 Exam Preparation Tasks 31 Review All Key Topics 31 Define Key Terms 31 Complete Tables and Lists from Memory 32 Review Questions 32 Chapter 3 Access Management 34 “Do I Know This Already?” Quiz 34 Foundation Topics 36 Introduction to AAA 36 Authentication 36 Multifactor Authentication (MFA) 37 Passwords and Password Policies 39 Authorization 41 Accounting 41 RADIUS 42 Summary 44 Exam Preparation Tasks 45 Review All Key Topics 45 Define Key Terms 45 Complete Tables and Lists from Memory 46 Review Questions 46 Chapter 4 Cryptography 48 “Do I Know This Already?” Quiz 49 Foundation Topics 51 Cryptography Overview 51 Encryption and Decryption 51 States of Data 52 Symmetric Cryptography 52 Asymmetric Cryptography 53 Confidentiality with Asymmetric Cryptography 53 Authentication with Asymmetric Cryptography 54 Combining Confidentiality and Authentication with Asymmetric Cryptography 54 Using Symmetric and Asymmetric Cryptography 55 Types of Ciphers 56 Symmetric Ciphers 56 Types of Asymmetric Algorithms 57 Certificates and PKI 58 SCEP 62 Digital Certificates 62 Lifetime of a Digital Certificate 63 PKI Infrastructure 65 Hashing 66 Shared Secret Keys and Salting with Hashing 68 Cryptography in the Real World 69 Web Browsing 69 VPNs 70 Remote Management 70 Cisco Next-Generation Cryptography 70 Summary 71 Exam Preparation Tasks 72 Review All Key Topics 72 Complete Tables and Lists from Memory 73 Define Key Terms 73 Review Questions 73 Part II Network Security Chapter 5 Introduction to Networking, Addressing, and TCP/IP Protocols 76 “Do I Know This Already?” Quiz 76 Foundation Topics 78 The TCP/IP Stack 78 Common TCP/IP Protocols and Their Vulnerabilities 81 Transmission Control Protocol (TCP) 81 User Datagram Protocol (UDP) 81 Internet Protocol Version 4 (IPv4) 82 Internet Protocol Version 6 (IPv6) 83 Media Access Control (MAC) 83 Address Resolution Protocol (ARP) 84 Hypertext Transfer Protocol (HTTP) 84 Internet Control Message Protocol (ICMP) 85 Dynamic Host Configuration Protocol (DHCP) 85 Domain Name System (DNS) 86 File Transfer Protocol (FTP) 86 Telnet 87 Secure Shell (SSH) 87 Network Addressing and Its Impact on Security 88 IPv4 and IPv6 88 CIDR Notation 89 Network Segmentation 89 Public Versus Private Networks 90 NAT 92 MAC Addressing 94 Summary 94 Exam Preparation Tasks 97 Review All Key Topics 97 Complete Tables and Lists from Memory 98 Define Key Terms 98 Review Questions 98 Chapter 6 Network Infrastructure 100 “Do I Know This Already?” Quiz 101 Foundation Topics 102 The Network Security Architecture 102 Screened Subnets, Virtualization, and the Cloud 103 Screened Subnet (DMZ) 103 Virtualization 105 Cloud 106 Proxy Servers 107 Forward Proxy 108 Reverse Proxy 109 Cisco WSA 111 Honeypots 112 Intrusion Detection/Prevention Systems 113 Intrusion Detection Systems (IDSs) 113 Intrusion Prevention Systems (IPSs) 113 Network-Based and Host-Based IDSs/IPSs 113 Signature-Based and Behavioral-Based Detection 113 Summary 114 Exam Preparation Tasks 115 Review All Key Topics 115 Complete Tables and Lists from Memory 116 Define Key Terms 116 Review Questions 116 Chapter 7 Controlling Network Access 118 “Do I Know This Already?” Quiz 118 Foundation Topics 120 Virtual Private Networks 120 Site-to-Site 121 Remote-Access 122 IPsec 124 Firewalls 125 NGFW 127 Cisco Firepower Next-Generation Firewall (NGFW) 128 Access Control Lists 129 Key Aspects and Uses of Access Control Lists 129 ACL Entries 130 Standard and Extended ACLs 132 Standard ACL 132 Extended ACL 133 ACL Evaluation 133 Network Access Control 134 Summary 137 Exam Preparation Tasks 138 Review All Key Topics 138 Complete Tables and Lists from Memory 139 Define Key Terms 139 Review Questions 139 Chapter 8 Wireless SOHO Security 142 “Do I Know This Already?” Quiz 143 Foundation Topics 144 Hardening Wireless Routers and Access Points 144 Administrative Interface 144 Updates 145 Wireless Encryption Standards 146 WEP 146 WPA 146 WPA2 146 WPA3 147 Wireless Authentication 148 Personal Mode 148 Enterprise Mode 149 WPA3 Enhanced Open 150 Wi-Fi Protected Setup, SSIDs, and MAC Address Filtering 150 Wi-Fi Protected Setup 151 SSID 151 MAC Address Filtering 152 Common Wireless Network Threats and Attacks 152 Rogue Access Points and Evil Twins 152 War Driving 154 Wireless Password Cracking 154 Protecting Yourself from Wireless Attacks 155 Summary 155 Exam Preparation Tasks 157 Review All Key Topics 157 Complete Tables and Lists from Memory 158 Define Key Terms 158 Review Questions 158 Part III Endpoint Security Chapter 9 Operating Systems and Tools 160 “Do I Know This Already?” Quiz 160 Foundation Topics 163 Host Security Features 163 Windows 164 Microsoft Defender 165 Virus & Threat Protection 165 Firewall & Network Protection 166 App & Browser Control 167 CMD and PowerShell 169 NTFS Permissions 170 BitLocker 172 Windows Updates 173 Event Viewer and Audit Logs 173 Linux 175 firewalld and UFW 175 Bash 176 Linux Permissions 178 SELinux and AppArmor 179 SELinux 179 AppArmor 180 dm-crypt and LUKS 180 Updates: yum, dnf, and apt 180 Linux Logs 181 macOS 183 Firewall 183 Zsh 184 APFS Permissions 184 FileVault 185 Updates 185 macOS Logs: Console 186 Tools 186 netstat and ss 186 nslookup and dig 187 nslookup 187 dig 188 tcpdump and Wireshark 188 tcpdump 188 Wireshark 189 syslog 190 Summary 191 Exam Preparation Tasks 192 Review All Key Topics 192 Complete Tables and Lists from Memory 192 Define Key Terms 193 Review Questions 193 Chapter 10 Endpoint Policies and Standards 196 “Do I Know This Already?” Quiz 196 Foundation Topics 198 Asset Management 198 Program Deployment 199 Backups 199 Local and Remote Backups 200 Full, Differential, and Incremental Backups 200 Bring Your Own Device (BYOD) 201 Pros and Cons of BYOD 202 Device and Configuration Management 202 Data Encryption 204 App Distribution 205 Regulatory Compliance 205 PCI-DSS 205 HIPAA 206 GDPR 206 Summary 207 Exam Preparation Tasks 207 Review All Key Topics 207 Complete Tables and Lists from Memory 208 Define Key Terms 208 Review Questions 208 Chapter 11 Network and Endpoint Malware Detection and Remediation 210 “Do I Know This Already?” Quiz 210 Foundation Topics 211 Monitoring and Detection 211 Signature Types 212 Scanning Systems 214 Cisco AMP 215 Reviewing Logs 216 Malware Remediation Best Practices 218 Summary 218 Exam Preparation Tasks 220 Review All Key Topics 220 Complete Tables and Lists from Memory 220 Define Key Terms 220 Review Questions 221 Chapter 12 Risk and Vulnerability Management 222 “Do I Know This Already?” Quiz 222 Foundation Topics 223 The Vocabulary of Risk 223 Vulnerabilities 224 The Vulnerability Management Lifecycle 225 Active and Passive Scanning 228 Port Scanning 229 Risk 229 Risk Prioritization 230 Risk Ranks and Levels 230 Data Types and Classification 231 Security Assessments 233 Risk Management 234 Risk Management Strategies 234 Summary 237 Exam Preparation Tasks 238 Review All Key Topics 238 Complete Tables and Lists from Memory 238 Define Key Terms 238 Review Questions 238 Chapter 13 Threat Intelligence 240 “Do I Know This Already?” Quiz 240 Foundation Topics 242 Threat Intelligence 242 Vulnerabilities Databases and Feeds 242 Pros and Cons of Vulnerability Databases 243 CVE and CVSS 244 Vulnerability Scanning and Assessment Tools 245 Additional Sources of Threat Intelligence 245 Reports and News 245 Reports 246 News 247 Collective, Ad Hoc, and Automated Intelligence 247 STIX and TAXII 248 STIX 248 TAXII 250 How and Why to Proactively Share Threat Intelligence 250 Summary 251 Exam Preparation Tasks 252 Review All Key Topics 252 Complete Tables and Lists from Memory 252 Define Key Terms 252 Review Questions 253 Chapter 14 Disaster Recovery and Business Continuity 254 “Do I Know This Already?” Quiz 254 Foundation Topics 256 Disaster Recovery Plans 256 Disasters 256 Disaster Recovery Controls 258 Backups 259 Business Impact Analyses (BIAs) 261 Recovery Time Objectives 262 Recovery Point Objectives 262 Business Continuity Plans 262 Disaster Recovery Versus Business Continuity 263 Summary 264 Exam Preparation Tasks 265 Review All Key Topics 265 Complete Tables and Lists from Memory 266 Define Key Terms 266 Review Questions 266 Chapter 15 Incident Handling 268 “Do I Know This Already?” Quiz 268 Foundation Topics 270 Events and Incidents 270 Incident Response 270 Preparation 270 Team 271 Tools 271 Training and SOPs 272 Reporting and Notification Requirements 272 Detection and Analysis 273 Containment, Eradication, and Recovery 274 Post-Incident Activities 274 Digital Forensics and Incident Response 275 Attack Frameworks and Concepts 275 Lockheed Martin Cyber Kill Chain 275 MITRE ATT&CK 276 Diamond Model of Intrusion Analysis 276 Tactics, Techniques, and Procedures 277 Evidence and Artifacts 278 Sources and Volatility 278 Preservation and Chain of Custody 279 Compliance Frameworks 280 GDPR 280 HIPAA 280 PCI-DSS 280 FERPA 280 FISMA 281 Comparing Regulatory Frameworks 281 Summary 281 Exam Preparation Tasks 282 Review All Key Topics 282 Complete Tables and Lists from Memory 283 Define Key Terms 283 Review Questions 283 Part IV CCST Cybersecurity Preparation Chapter 16 Final Preparation 286 Tools and Resources 286 Study Tips 287 Summary 287 Chapter 17 Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide Exam Updates 288 The Purpose of This Chapter 288 About Possible Exam Updates 289 Impact on You and Your Study Plan 289 News About the Next Exam Release 290 Updated Technical Content 290 Appendix A Answers to the “Do I Know This Already?” Quizzes and Review Questions 292 Glossary 307 Online Elements Appendix B Memory Tables Appendix C Memory Tables Answer Key Appendix D Study Planner Glossary 9780138203924 TOC 1/19/2024


Best Sellers


Product Details
  • ISBN-13: 9780138203924
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 232 mm
  • No of Pages: 384
  • Series Title: Official Cert Guide
  • Weight: 655 gr
  • ISBN-10: 013820392X
  • Publisher Date: 10 Sep 2024
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 20 mm
  • Width: 188 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)
Pearson Education (US) -
Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide: (Official Cert Guide)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA