CISCO Networking Academy

Cybersecurity Essentials

Cyber attacks are on the rise with every new digital connection. Gain the essential skills to protect and defend organizations from these threats and launch your career in cybersecurity. Start learning today and open the door to exciting job opportunities!

Achievements

Badges you can earn in this course.
 

Overview

Cyber threats are a global challenge, and the demand for cybersecurity professionals is growing rapidly. According to the World Economic Forum Global Risks Report (2021), cybersecurity failure ranks among the top 5 global risks. To combat these threats, we need skilled, tech-savvy professionals ready to defend against sophisticated digital adversaries. This Cybersecurity Essentials course equips you with the foundational knowledge needed to pursue the entry-level Cisco Certified Support Technician (CCST) Cybersecurity certification. It’s perfect for those aiming for entry-level cybersecurity positions, including Cybersecurity Technician, Junior Cybersecurity Analyst, or Tier 1 Help Desk Support roles. You’ll develop essential skills in areas like threat intelligence, network security, and risk management, preparing you to protect both yourself and organizations from cyber attacks. If you enjoy problem-solving, have a passion for technology, and thrive in collaborative environments, a career in cybersecurity could be your ideal path!

Course Curriculum

Module 1: Cybersecurity Threats, Vulnerabilities, and Attacks
  • Introduction
  • Common Threats
  • Deception
  • Cyber Attacks
  • Wireless and Mobile Device Attacks
  • Application Attacks
  • Cybersecurity Threats, Vulnerabilities, and Attacks Summary
Module 2: Securing Networks
  • Introduction
  • Current State of Affairs
  • Who is Attacking Our Network?
  • Securing Networks Summary
Module 3: Attacking the Foundation
  • Introduction
  • IP PDU Details
  • IP Vulnerabilities
  • TCP and UDP Vulnerabilities
  • Attacking the Foundation Summary
Module 4: Attacking What We Do
  • Introduction
  • 4.1. IP Services
  • Enterprise Services
  • Mitigating Common Network Attacks
  • Attacking What We Do Summary
Module 5: Wireless Network Communication
  • Introduction
  • Wireless Communications
  • WLAN Threats
  • Secure WLANs
  • Wireless Network Communication Summary
Module 6: Network Security Infrastructure
  • Introduction
  • Security Devices
  • Security Services
  • Network Security Infrastructure Summary
Module 7: The Windows Operating System
  • Introduction
  • Windows History
  • Windows Architecture and Operations
  • Windows Configuration and Monitoring
  • Windows Security
  • The Windows Operating System Summary
Module 8: Linux Overview
  • Introduction
  • Linux Basics
  • Working in the Linux Shell
  • Linux Servers and Clients
  • Basic Server Administration
  • The Linux File System
  • Working with the Linux GUI
  • Working on a Linux Host
  • Linux Basics Summary
Module 9: System and Endpoint Protection
  • Introduction
  • Defending Systems and Devices
  • Antimalware Protection
  • Host-Based Intrusion Prevention
  • Application Security
  • System and Endpoint Protection Summary
Module 10: Cybersecurity Principles, Practices, and Processes
  • Introduction
  • The Three Dimensions
  • States of Data
  • Cybersecurity Countermeasures
  • Cybersecurity Principles, Practices, and Processes Summary
Module 11: Understanding Defense
  • Introduction
  • Defense-in-Depth
  • Cybersecurity Operations Management
  • Security Policies, Regulations, and Standards
  • Understanding Defense Summary
Module 12: System and Network Defense
  • Introduction
  • Physical Security
  • Application Security
  • Network Hardening: Services and Protocols
  • Network Hardening: Segmentation
  • Hardening Wireless and Mobile Devices
  • Cybersecurity Resilience
  • Embedded and Specialized Systems
  • System and Network Defense Summary
Module 13: Access Control
  • Introduction
  • Access Controls
  • Access Control Concepts
  • Account Management
  • AAA usage and operation
  • Access Control Summary
Module 14: Access Control Lists
  • Introduction
  • Introduction to Access Control Lists
  • Wildcard Masking
  • Configure ACLs
  • Named Standard IPv4 ACL Syntax
  • Implement ACLs
  • Mitigate Attacks with ACLs
  • IPv6 ACLs
  • Access Control Lists Summary
Module 15: Firewall Technologies
  • Introduction
  • Secure Networks with Firewalls
  • Firewalls in Network Design
  • Firewall Technologies Summary
Module 16: Zone-Based Policy Firewalls
  • Introduction
  • ZPF Overview
  • ZPF Operation
  • Configure a ZPF
  • Zone-Based Firewalls Summary
Module 17: Cloud Security
  • Introduction
  • Virtualization and Cloud Computing
  • The Domains of Cloud Security
  • Cloud Infrastructure Security
  • Cloud Application Security
  • Cloud Data Security
  •  Protecting VMs
  • Cloud Security Summary
 Module 18: Cryptography
Module 19: Technologies and Protocols
Module 20: Network Security Data