Torrent details for "Cisco Certified Support Technician CCST Cybersecurity 100 160" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
820.1 MB
Info Hash:
59312404B6F09BD7BAD22CE73D8E8C081DB7B3F3
Added By:
Added:
May 29, 2025, 6:50 a.m.
Stats:
|
(Last updated: March 22, 2026, 2:03 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 01 - Welcome to the course.mp4 | 7.8 MB |
| 01 - Welcome to the course.srt | 6.3 KB |
| 02 - Meet your instructor.mp4 | 2.5 MB |
| 02 - Meet your instructor.srt | 1.5 KB |
| 01 - Module 1 Cybersecurity essentials and core concepts.mp4 | 1.6 MB |
| 01 - Module 1 Cybersecurity essentials and core concepts.srt | 1.0 KB |
| 02 - Cybersecurity defined.mp4 | 11.8 MB |
| 02 - Cybersecurity defined.srt | 6.5 KB |
| 03 - CIA triad.mp4 | 8.7 MB |
| 03 - CIA triad.srt | 7.0 KB |
| 04 - Vulnerabilities, threats, exploits, and risks.mp4 | 4.9 MB |
| 04 - Vulnerabilities, threats, exploits, and risks.srt | 4.2 KB |
| 05 - Attack vectors.mp4 | 16.4 MB |
| 05 - Attack vectors.srt | 14.3 KB |
| 01 - Module 2 Threat landscape and attack motives.mp4 | 1.5 MB |
| 01 - Module 2 Threat landscape and attack motives.srt | 842 bytes |
| 02 - Categories of attackers.mp4 | 4.3 MB |
| 02 - Categories of attackers.srt | 4.7 KB |
| 03 - Motivation for attacks.mp4 | 3.3 MB |
| 03 - Motivation for attacks.srt | 3.5 KB |
| 04 - Malware.mp4 | 8.4 MB |
| 04 - Malware.srt | 7.5 KB |
| 05 - Social engineering attacks.mp4 | 18.3 MB |
| 05 - Social engineering attacks.srt | 14.1 KB |
| 06 - Physical attacks.mp4 | 6.4 MB |
| 06 - Physical attacks.srt | 5.5 KB |
| 07 - Denial of service (DoS) attacks.mp4 | 11.2 MB |
| 07 - Denial of service (DoS) attacks.srt | 9.5 KB |
| 08 - Man-in-the-middle attacks.mp4 | 20.3 MB |
| 08 - Man-in-the-middle attacks.srt | 16.8 KB |
| 09 - Internet of things (IoT) weaknesses.mp4 | 8.2 MB |
| 09 - Internet of things (IoT) weaknesses.srt | 6.2 KB |
| 10 - Bring your own device (BYOD) considerations.mp4 | 8.5 MB |
| 10 - Bring your own device (BYOD) considerations.srt | 8.3 KB |
| 11 - Advanced persistent threat (APT).mp4 | 5.3 MB |
| 11 - Advanced persistent threat (APT).srt | 4.9 KB |
| 01 - Module 3 Strengthening your security posture.mp4 | 1.4 MB |
| 01 - Module 3 Strengthening your security posture.srt | 833 bytes |
| 02 - Defense in depth.mp4 | 17.9 MB |
| 02 - Defense in depth.srt | 16.2 KB |
| 03 - System hardening.mp4 | 9.5 MB |
| 03 - System hardening.srt | 6.3 KB |
| 04 - Multi-factor authentication (MFA).mp4 | 3.7 MB |
| 04 - Multi-factor authentication (MFA).srt | 3.7 KB |
| 05 - Password policies and alternatives.mp4 | 8.4 MB |
| 05 - Password policies and alternatives.srt | 6.7 KB |
| 06 - Authentication, authorization, and accounting (AAA).mp4 | 6.8 MB |
| 06 - Authentication, authorization, and accounting (AAA).srt | 6.7 KB |
| 07 - Encryption.mp4 | 20.1 MB |
| 07 - Encryption.srt | 15.6 KB |
| 08 - Protocols supporting encryption.mp4 | 10.3 MB |
| 08 - Protocols supporting encryption.srt | 7.8 KB |
| 09 - Code of ethics.mp4 | 6.5 MB |
| 09 - Code of ethics.srt | 5.6 KB |
| 01 - Module 4 Network foundations and security fundamentals.mp4 | 1.6 MB |
| 01 - Module 4 Network foundations and security fundamentals.srt | 958 bytes |
| 02 - TCPIP protocol weaknesses.mp4 | 26.1 MB |
| 02 - TCPIP protocol weaknesses.srt | 18.0 KB |
| 03 - MAC address security considerations.mp4 | 8.4 MB |
| 03 - MAC address security considerations.srt | 7.5 KB |
| 04 - IPv4 and IPv6 address security considerations.mp4 | 22.9 MB |
| 04 - IPv4 and IPv6 address security considerations.srt | 17.4 KB |
| 05 - Security appliances.mp4 | 13.7 MB |
| 05 - Security appliances.srt | 12.9 KB |
| 06 - Cloud security considerations.mp4 | 10.5 MB |
| 06 - Cloud security considerations.srt | 7.5 KB |
| 07 - Proxy servers.mp4 | 6.7 MB |
| 07 - Proxy servers.srt | 5.6 KB |
| 08 - Honeypots and honeynets.mp4 | 2.5 MB |
| 08 - Honeypots and honeynets.srt | 2.1 KB |
| 01 - Module 5 Controlling access and protecting the network edge.mp4 | 1.7 MB |
| 01 - Module 5 Controlling access and protecting the network edge.srt | 1.0 KB |
| 02 - Access control list (ACL) overview.mp4 | 8.4 MB |
| 02 - Access control list (ACL) overview.srt | 7.7 KB |
| 03 - Numbered standard ACLs.mp4 | 15.7 MB |
| 03 - Numbered standard ACLs.srt | 12.1 KB |
| 04 - Numbered extended ACLs.mp4 | 21.8 MB |
| 04 - Numbered extended ACLs.srt | 16.1 KB |
| 05 - Named ACLs.mp4 | 29.5 MB |
| 05 - Named ACLs.srt | 20.9 KB |
| 06 - ACL considerations.mp4 | 19.7 MB |
| 06 - ACL considerations.srt | 14.6 KB |
| 07 - Virtual private networks (VPNs).mp4 | 18.3 MB |
| 07 - Virtual private networks (VPNs).srt | 16.7 KB |
| 08 - Network access control (NAC).mp4 | 15.9 MB |
| 08 - Network access control (NAC).srt | 13.2 KB |
| 09 - Securing a small officehome office (SOHO) wireless LAN.mp4 | 24.1 MB |
| 09 - Securing a small officehome office (SOHO) wireless LAN.srt | 18.9 KB |
| 01 - Module 6 Operating system security and network tools.mp4 | 6.3 MB |
| 01 - Module 6 Operating system security and network tools.srt | 2.9 KB |
| 02 - Microsoft Windows security considerations.mp4 | 19.1 MB |
| 02 - Microsoft Windows security considerations.srt | 12.7 KB |
| 03 - macOS security considerations.mp4 | 20.3 MB |
| 03 - macOS security considerations.srt | 16.4 KB |
| 04 - Linux security considerations.mp4 | 17.8 MB |
| 04 - Linux security considerations.srt | 14.6 KB |
| 05 - netstat utility.mp4 | 12.3 MB |
| 05 - netstat utility.srt | 7.3 KB |
| 06 - nslookup utility.mp4 | 6.0 MB |
| 06 - nslookup utility.srt | 4.6 KB |
| 07 - tcpdump utility.mp4 | 16.2 MB |
| 07 - tcpdump utility.srt | 9.2 KB |
| 01 - Module 7 System maintenance, updates, and logging.mp4 | 1.6 MB |
| 01 - Module 7 System maintenance, updates, and logging.srt | 858 bytes |
| 02 - Hardware and software inventory.mp4 | 7.1 MB |
| 02 - Hardware and software inventory.srt | 5.5 KB |
| 03 - Software and hardware updates.mp4 | 8.6 MB |
| 03 - Software and hardware updates.srt | 6.7 KB |
| 04 - System log interpretation.mp4 | 14.1 MB |
| 04 - System log interpretation.srt | 10.7 KB |
| 01 - Module 8 Security assessment and risk analysis.mp4 | 4.9 MB |
| 01 - Module 8 Security assessment and risk analysis.srt | 2.7 KB |
| 02 - Vulnerability management.mp4 | 7.3 MB |
| 02 - Vulnerability management.srt | 5.7 KB |
| 03 - Active vs. passive reconnaissance.mp4 | 7.6 MB |
| 03 - Active vs. passive reconnaissance.srt | 6.1 KB |
| 04 - Port scanning.mp4 | 8.1 MB |
| 04 - Port scanning.srt | 5.8 KB |
| 05 - Threat intelligence.mp4 | 11.1 MB |
| 05 - Threat intelligence.srt | 6.7 KB |
| 06 - Vulnerability response.mp4 | 4.3 MB |
| 06 - Vulnerability response.srt | 3.9 KB |
| 07 - Risk management.mp4 | 10.9 MB |
| 07 - Risk management.srt | 10.5 KB |
| 08 - Security assessments.mp4 | 12.5 MB |
| 08 - Security assessments.srt | 9.9 KB |
| 09 - Disaster recovery.mp4 | 18.3 MB |
| 09 - Disaster recovery.srt | 14.5 KB |
| 10 - Types of backups.mp4 | 19.8 MB |
| 10 - Types of backups.srt | 16.8 KB |
| 01 - Module 9 Security incident response.mp4 | 3.9 MB |
| 01 - Module 9 Security incident response.srt | 2.5 KB |
| 02 - Stages of incident response.mp4 | 7.1 MB |
| 02 - Stages of incident response.srt | 5.5 KB |
| 03 - Contrasting SIEM and SOAR.mp4 | 11.3 MB |
| 03 - Contrasting SIEM and SOAR.srt | 9.2 KB |
| 04 - Cyber kill chain.mp4 | 8.2 MB |
| 04 - Cyber kill chain.srt | 6.6 KB |
| 05 - MITRE ATT&CK matrix.mp4 | 5.1 MB |
| 05 - MITRE ATT&CK matrix.srt | 4.5 KB |
| 06 - Diamond model.mp4 | 6.5 MB |
| 06 - Diamond model.srt | 5.3 KB |
| 07 - Tactics, techniques, and procedures (TTP).mp4 | 13.6 MB |
| 07 - Tactics, techniques, and procedures (TTP).srt | 10.7 KB |
| 08 - Evidence.mp4 | 6.9 MB |
| 08 - Evidence.srt | 5.8 KB |
| 09 - Compliance regulations.mp4 | 7.7 MB |
| 09 - Compliance regulations.srt | 6.2 KB |
| 01 - Module 10 Exam preparation.mp4 | 1.5 MB |
| 01 - Module 10 Exam preparation.srt | 1.3 KB |
| 02 - Registering for the exam.mp4 | 6.7 MB |
| 02 - Registering for the exam.srt | 4.9 KB |
| 03 - Study strategies.mp4 | 14.0 MB |
| 03 - Study strategies.srt | 8.3 KB |
| 04 - What to do on exam day.mp4 | 5.6 MB |
| 04 - What to do on exam day.srt | 6.0 KB |
| 01 - Module 11 Congratulations and next steps.mp4 | 5.3 MB |
| 01 - Module 11 Congratulations and next steps.srt | 3.1 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
1.5 GB
[16
/
8]
2023-08-17
| Uploaded by FreeCourseWeb | Size 1.5 GB | Health [ 16 /8 ] | Added 2023-08-17 |
-
459.4 MB
[5
/
0]
2023-07-01
| Uploaded by FreeCourseWeb | Size 459.4 MB | Health [ 5 /0 ] | Added 2023-07-01 |
-
820.1 MB
[0
/
1]
2025-05-29
| Uploaded by freecoursewb | Size 820.1 MB | Health [ 0 /1 ] | Added 2025-05-29 |
-
765.1 MB
[4
/
0]
2023-10-28
| Uploaded by freecoursewb | Size 765.1 MB | Health [ 4 /0 ] | Added 2023-10-28 |
-
663.3 MB
[10
/
7]
2023-06-01
| Uploaded by freecoursewb | Size 663.3 MB | Health [ 10 /7 ] | Added 2023-06-01 |
-
26.0 MB
[22
/
0]
2023-07-01
| Uploaded by indexFroggy | Size 26.0 MB | Health [ 22 /0 ] | Added 2023-07-01 |
-
102.4 MB
[18
/
0]
2023-07-01
| Uploaded by indexFroggy | Size 102.4 MB | Health [ 18 /0 ] | Added 2023-07-01 |
-
17.1 MB
[12
/
3]
2023-10-26
| Uploaded by indexFroggy | Size 17.1 MB | Health [ 12 /3 ] | Added 2023-10-26 |
-
13.4 MB
[12
/
0]
2023-10-29
| Uploaded by freecoursewb | Size 13.4 MB | Health [ 12 /0 ] | Added 2023-10-29 |
NOTE
SOURCE: Cisco Certified Support Technician CCST Cybersecurity 100 160
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


