Coconote
AI notes
AI voice & video notes
Try for free
Cisco Certified Support Technician Cyber Security (CCST) Course
Jun 21, 2024
Cisco Certified Support Technician Cyber Security (CCST) Course
Essential Security Principles
1.1 Define Essential Security Principles
Vulnerabilities, Threats, Exploits, and Risks
: Definitions and differences
Vulnerability
: A gap or weakness in a system
Threat
: Something that can damage your asset
Risk
: Probability and impact of a threat exploiting a vulnerability
Exploit
: A program created to take advantage of a vulnerability
Attack Vectors
: The different points where attackers could get into a system
Examples of Attack Vectors
: Ransomware, compromised passwords, misconfigurations, DDoS, poor security solutions
Hardening
: Increasing system resistance to hacking by reconfiguration
Defense in Depth
: Designing IT security with multiple independent layers
CIA Triad
: Confidentiality, Integrity, Availability
Types of Attackers
: White hat, Black hat, Gray hat, Script kiddies, hacktivists, organized crime, state-sponsored, insiders
Reasons for Attacks
: Financial gain, political motives, revenge, challenge, espionage
Code of Ethics
: Integrity, confidentiality, legality, respect, competence
1.2 Explain Common Threats and Vulnerabilities
Malware Types
: Adware, spyware, viruses, worms, Trojans, ransomware
DoS Attacks
: Overwhelming a web property with traffic
Botnets
: Group of computers controlled by a malicious actor
Social Engineering Attacks
: Tailgating, spear phishing, phishing, vishing, smishing
Physical Attacks
: Security breaches that impact operations
Man-in-the-Middle
: Intercepting data between user and system
IoT Vulnerabilities
: Entry points to other devices on networks
Insider Threats
: From within the organization
Advanced Persistent Threat (APT)
: Prolonged, targeted cyberattack
1.3 Explain Access Management Principles
AAA (Authentication, Authorization, and Accounting)
Radius
: Networking protocol that authorizes and authenticates users
Multifactor Authentication (MFA)
: Something you know, are, have
Password Policies
: Requirements for passwords
1.4 Explain Encryption Methods and Applications
Types of Encryption
: Hashing, certificates, PKI
Strong vs Weak Encryption
: Based on industry standards
States of Data
: In transit, at rest, in use
Protocols that Use Encryption
: Triple DES, AES, RSA, Blowfish, Twofish
Basic Network Security Concepts
2.1 Describe TCP/IP Protocol Vulnerabilities
TCP
: Vulnerable to SYN flooding, session hijacking
UDP
: Vulnerable to UDP flooding, amplification attacks
ARP
: ARP spoofing attacks
ICMP/Ping
: Used for bandwidth flooding attacks
DHCP
: Starvation and flood attacks
DNS
: Spoofing and flood attacks
2.2 Explain Network Address Impact on Security
IPv4 vs IPv6
: Address spoofing in IPv4 vs. security in IPv6
MAC Addresses
: Identification and spoofing prevention
Network Segmentation
: Enhancing security
CIDR Notation
: Address allocation and traffic filtering
NAT
: Privacy by hiding device IP addresses
Public vs Private Networks
2.3 Describe Network Infrastructure and Technologies
Network Security Architecture
: Elements of network and security
Virtualization
: Virtual representations of servers and networks
Cloud
: On-demand availability of computing resources
Honeypot
: Decoy systems to lure attackers
Proxy Server
: Gateway between users and the internet
IDS/IPS
: Intrusion Detection/Prevention Systems
Wireless 802.11 Protocols
2.4 Set Up a Secure Wireless SOHO Network
MAC Address Filtering, Encryption Standards
: AES, Triple DES, RSA, Blowfish
SSID
: Service Set Identifier for Wi-Fi
2.5 Implement Secure Access Technologies
ACLs
: File system and networking ACLs
Firewalls, VPN, NAC
Endpoint Security Concepts
3.1 Describe Operating System Security Concepts
Windows, macOS, Linux Security Features
: Windows Defender, host-based firewalls
CLI and PowerShell
File and Directory Permissions
Privilege Escalation
3.2 Demonstrate Familiarity with Endpoint Tools
Netstat, nslookup, TCPdump
: Tools for network assessment
3.3 Verify Endpoint Systems Meet Security Standards
Hardware Inventory, Software Inventory
: Asset management
Program Deployment, Data Backups, Regulatory Compliance
: PCI DSS, HIPAA, GDPR
3.4 Implement Software and Hardware Updates
Windows Update, Application Updates, Device Drivers, Firmware
3.5 Interpret System Logs
Event Viewer, Audit Logs, System/Application Logs
Syslog, Identification of Anomalies
3.6 Demonstrate Familiarity with Malware Removal
Scanning Systems, Reviewing Scan Logs, Malware Remediation
Vulnerability Assessment and Risk Management
4.1 Explain Vulnerability Management
Identification, Management, Mitigation
Passive vs Active Reconnaissance
: Scanning and testing
Port Scanning, Automation
4.2 Use Threat Intelligence Techniques
Vulnerability Databases, Industry Standard Tools
: CVS, cybersecurity reports
Ad Hoc and Automated Threat Intelligence
4.3 Explain Risk Management
Vulnerability vs Risk, Risk Ranking
Risk Mitigation Strategies, Levels of Risk
: Low, medium, high, extremely high
Risk Management Approaches
: Risk avoidance, acceptance, transfer, mitigation
4.4 Disaster Recovery and Business Continuity Planning
Plan Components, Recovery Processes
Regular Backups
Incident Handling
5.1 Monitor Security Events and Escalation Requirements
Role of SIEM and SOAR
Network Data Monitoring, Packet Captures, Log Analysis
5.2 Explain Digital Forensics and Attack Attribution
Cyber Kill Chain, MITRE ATT&CK Matrix, Diamond Model
TTP (Tactics, Techniques, Procedures)
Sources and Handling of Evidence, Chain of Custody
5.3 Explain Impact of Compliance Frameworks
GDPR, HIPAA, PCI DSS, FISMA
Reporting and Notification Requirements
5.4 Describe Elements of Cybersecurity Incident Response
Policy, Plan, Procedure Elements
NIST Special Publication 800-61
Incident Response Lifecycle
: Preparation, Detection, Analysis, Containment, Eradication, Recovery
📄
Full transcript