CISCO CCST Cybersecurity

This class was created by Brainscape user Aaron Bholanauth.

By:

Decks in this class (5)

Essential Security Principles
In cybersecurity what term descri...,
What term refers to a potential d...,
What is the specific piece of cod...
75  cards
Basic Network Security Concepts
2.1. Describe TCP/IP protocol vulnerabilities • TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS 2.2. Explain how network addresses impact network security • IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks 2.3. Describe network infrastructure and technologies • Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS 2.4. Set up a secure wireless SoHo network • MAC address filtering, encryption standards
75  cards
Endpoint Security Concepts
3.1. Describe operating system security concepts • Windows, macOS, and Linux; security features, including Windows Defender and host-based firewalls; CLI and PowerShell; file and directory permissions; privilege escalation 3.2. Demonstrate familiarity with appropriate endpoint tools that gather security assessment information • netstat, nslookup, tcpdump 3.3. Verify that endpoint systems meet security policies and standards • Hardware inventory (asset management), software inventory, progr
75  cards
Vulnerability Assessment and Risk Management
4.1. Explain vulnerability management • Vulnerability identification, management, and mitigation; active and passive reconnaissance; testing (port scanning, automation) 4.2. Use threat intelligence techniques to identify potential network vulnerabilities • Uses and limitations of vulnerability databases; industry-standard tools used to assess vulnerabilities and make recommendations, policies, and reports; Common Vulnerabilities and Exposures (CVEs), cybersecurity reports, cybersecurity news
65  cards
Incident Handling
5.1. Monitor security events and know when escalation is required • Role of SIEM and SOAR, monitoring network data to identify security incidents (packet captures, various log file entries, etc.), identifying suspicious events as they occur 5.2. Explain digital forensics and attack attribution processes • Cyber Kill Chain, MITRE ATT&CK Matrix, and Diamond Model; Tactics, Techniques, and Procedures (TTP); sources of evidence (artifacts); evidence handling (preserving digital evidence, chain o
100  cards

More about
CISCO CCST Cybersecurity

  • Company name Unspecified
  • Training purpose Unspecified
  • Industry Unspecified
  • Number of employees who could use this Unspecified

The creator of this class did not yet add a description for what is included in this class.

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....