CCST Cybersecurity Video Training Series (2025)
File List
- z.9781806023776_Code/13.1 Course Slides Download - CCST Cybersecurity.pdf 413.0 MB
- Chapter 05 Network Foundations and Security Fundamentals/002. TCP-IP Protocol Weaknesses.mp4 49.9 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/005. Named ACLs.mp4 43.7 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/009. Securing a Small Office-Home Office SOHO Wireless LAN.mp4 36.8 MB
- Chapter 07 Operating System Security and Network Tools/002. Microsoft Windows Security Considerations.mp4 35.2 MB
- Chapter 05 Network Foundations and Security Fundamentals/004. IPv4 and IPv6 Addresses Security Considerations.mp4 34.8 MB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/Installing Kali Linux.pdf 32.9 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/004. Numbered Extended ACLs.mp4 32.0 MB
- Chapter 04 Strengthening Your Security Posture/007. Encryption.mp4 30.9 MB
- Chapter 03 Threat Landscape and Attack Motives/008. Man-in-the-Middle Attacks.mp4 30.6 MB
- Chapter 07 Operating System Security and Network Tools/004. Linux Security Considerations.mp4 30.4 MB
- Chapter 07 Operating System Security and Network Tools/003. macOS Security Considerations.mp4 30.0 MB
- Chapter 07 Operating System Security and Network Tools/007. tcpdump Utility.mp4 30.0 MB
- Chapter 04 Strengthening Your Security Posture/002. Defense-in-Depth.mp4 30.0 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/006. ACL Considerations.mp4 29.1 MB
- Chapter 09 Security Assessment and Risk Analysis/010. Types of Backups.mp4 29.0 MB
- Chapter 09 Security Assessment and Risk Analysis/009. Disaster Recovery.mp4 28.4 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/007. Virtual Private Networks VPNs.mp4 27.9 MB
- Chapter 03 Threat Landscape and Attack Motives/005. Social Engineering Attacks.mp4 27.8 MB
- Chapter 02 Cybersecurity Essentials and Core Concepts/005. Attack Vectors.mp4 27.4 MB
- Chapter 11 Exam Preparation/003. Study Strategies.mp4 24.3 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/003. Numbered Standard ACLs.mp4 24.2 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/008. Network Access Control NAC.mp4 23.9 MB
- Chapter 08 System Maintenance, Updates, and Logging/004. System Log Interpretation.mp4 23.8 MB
- Chapter 10 Security Incident Response/007. Tactics Techniques and Procedures TTP.mp4 20.9 MB
- Chapter 09 Security Assessment and Risk Analysis/008. Security Assessments.mp4 20.4 MB
- Chapter 05 Network Foundations and Security Fundamentals/005. Security Appliances.mp4 19.8 MB
- Chapter 07 Operating System Security and Network Tools/005. netstat Utility.mp4 19.5 MB
- Chapter 09 Security Assessment and Risk Analysis/005. Threat Intelligence.mp4 18.7 MB
- Chapter 02 Cybersecurity Essentials and Core Concepts/002. Cybersecurity Defined.mp4 18.2 MB
- Chapter 10 Security Incident Response/003. Contrasting SIEM and SOAR.mp4 16.9 MB
- Chapter 09 Security Assessment and Risk Analysis/007. Risk Management.mp4 16.2 MB
- Chapter 05 Network Foundations and Security Fundamentals/006. Cloud Security Considerations.mp4 15.8 MB
- Chapter 04 Strengthening Your Security Posture/008. Protocols Supporting Encryption.mp4 15.7 MB
- Chapter 03 Threat Landscape and Attack Motives/007. Denial of Service DoS Attacks.mp4 15.2 MB
- Chapter 04 Strengthening Your Security Posture/003. System Hardening.mp4 15.0 MB
- Chapter 11 Exam Preparation/002. Registering for the Exam.mp4 14.7 MB
- Chapter 08 System Maintenance, Updates, and Logging/003. Software and Hardware Updates.mp4 13.7 MB
- Chapter 01 Welcome to the Course!/001. Welcome to the Course!.mp4 13.4 MB
- Chapter 04 Strengthening Your Security Posture/005. Password Policies and Alternatives.mp4 13.3 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/002. Access Control List ACL Overview.mp4 13.2 MB
- Chapter 02 Cybersecurity Essentials and Core Concepts/003. The CIA Triad.mp4 13.0 MB
- Chapter 03 Threat Landscape and Attack Motives/006. Physical Attacks.mp4 13.0 MB
- Chapter 03 Threat Landscape and Attack Motives/009. Internet of Things IoT Weaknesses.mp4 12.9 MB
- Chapter 10 Security Incident Response/004. Cyber Kill Chain.mp4 12.9 MB
- Chapter 09 Security Assessment and Risk Analysis/004. Port Scanning.mp4 12.8 MB
- Chapter 03 Threat Landscape and Attack Motives/010. Bring Your Own Device BYOD Considerations.mp4 12.8 MB
- Chapter 05 Network Foundations and Security Fundamentals/003. MAC Address Security Considerations.mp4 12.4 MB
- Chapter 03 Threat Landscape and Attack Motives/004. Malware.mp4 12.4 MB
- Chapter 10 Security Incident Response/009. Compliance Regulations.mp4 12.3 MB
- Chapter 09 Security Assessment and Risk Analysis/001. Module 8 - Security Assessment and Risk Analysis.mp4 12.3 MB
- Chapter 09 Security Assessment and Risk Analysis/003. Active vs. Passive Reconnaissance.mp4 12.2 MB
- Chapter 09 Security Assessment and Risk Analysis/002. Vulnerability Management.mp4 11.5 MB
- Chapter 12 Next Steps/001. Module 11 - Congratulations and Next Steps.mp4 11.3 MB
- Chapter 08 System Maintenance, Updates, and Logging/002. Hardware and Software Inventory.mp4 11.1 MB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/NMAP.pdf 10.8 MB
- Chapter 10 Security Incident Response/008. Evidence.mp4 10.7 MB
- Chapter 07 Operating System Security and Network Tools/001. Module 6 - Operating System Security and Network Tools.mp4 10.7 MB
- Chapter 07 Operating System Security and Network Tools/006. nslookup Utility.mp4 10.7 MB
- Chapter 05 Network Foundations and Security Fundamentals/007. Proxy Servers.mp4 10.6 MB
- Chapter 10 Security Incident Response/002. Stages of Incident Response.mp4 10.5 MB
- Chapter 04 Strengthening Your Security Posture/006. Authentication Authorization and Accounting AAA.mp4 10.5 MB
- Chapter 10 Security Incident Response/006. Diamond Model.mp4 10.1 MB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/Installing Wireshark.pdf 10.1 MB
- Chapter 04 Strengthening Your Security Posture/009. Code of Ethics.mp4 9.7 MB
- Chapter 03 Threat Landscape and Attack Motives/011. Advanced Persistent Threat APT.mp4 8.3 MB
- Chapter 11 Exam Preparation/004. What to do on Exam Day.mp4 8.2 MB
- Chapter 02 Cybersecurity Essentials and Core Concepts/004. Vulnerabilities Threats Exploits and Risks.mp4 7.4 MB
- Chapter 10 Security Incident Response/005. MITRE ATT&CK Matrix.mp4 7.3 MB
- Chapter 09 Security Assessment and Risk Analysis/006. Vulnerability Response.mp4 6.5 MB
- Chapter 03 Threat Landscape and Attack Motives/002. Categories of Attackers.mp4 6.5 MB
- Chapter 10 Security Incident Response/001. Module 9 - Security Incident Response.mp4 6.2 MB
- Chapter 03 Threat Landscape and Attack Motives/003. Motivation for Attacks.mp4 5.6 MB
- Chapter 04 Strengthening Your Security Posture/004. Multi-Factor Authentication.mp4 5.3 MB
- Chapter 01 Welcome to the Course!/002. Meet Your Instructor.mp4 3.9 MB
- Chapter 05 Network Foundations and Security Fundamentals/008. Honeypots and Honeynets.mp4 3.9 MB
- Chapter 08 System Maintenance, Updates, and Logging/001. Module 7 - System Maintenance, Updates, and Logging.mp4 3.0 MB
- Chapter 06 Controlling Access and Protecting the Network Edge/001. Module 5 - Controlling Access and Protecting the Network Edge.mp4 2.7 MB
- Chapter 02 Cybersecurity Essentials and Core Concepts/001. Module 1 - Cybersecurity Essentials and Core Concepts.mp4 2.6 MB
- Chapter 03 Threat Landscape and Attack Motives/001. Module 2 - Threat Landscape and Attack Motives.mp4 2.6 MB
- Chapter 05 Network Foundations and Security Fundamentals/001. Module 4 - Network Foundations and Security Fundamentals.mp4 2.5 MB
- Chapter 04 Strengthening Your Security Posture/001. Module 3 - Strengthening Your Security Posture.mp4 2.2 MB
- Chapter 11 Exam Preparation/001. Module 10 - Exam Preparation.mp4 2.2 MB
- z.9781806023776_Code/Practice Exams Download - CCST Cybersecurity/Practice Exam #1.pdf 650.4 KB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/NETSTAT.pdf 428.0 KB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/Extended Named ACL.pdf 416.4 KB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/Extended Numbered ACL.pdf 397.2 KB
- z.9781806023776_Code/Labs Download - CCST Cybersecurity/Standard Numbered ACL.pdf 332.2 KB
- z.9781806023776_Code/Practice Exams Download - CCST Cybersecurity/Practice Exam #2.pdf 181.2 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 2 Quiz.pdf 57.2 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 9 Quiz.pdf 54.8 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 5 Quiz.pdf 54.7 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 8 Quiz.pdf 54.6 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 6 Quiz.pdf 52.0 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 3 Quiz.pdf 51.9 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 4 Quiz.pdf 49.4 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 1 Quiz.pdf 43.8 KB
- z.9781806023776_Code/Module Quiz Download - CCST Cybersecurity/Module 7 Quiz.pdf 41.3 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/005. Named ACLs.en.srt 20.5 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/009. Securing a Small Office-Home Office SOHO Wireless LAN.en.srt 18.2 KB
- Chapter 05 Network Foundations and Security Fundamentals/002. TCP-IP Protocol Weaknesses.en.srt 17.1 KB
- Chapter 05 Network Foundations and Security Fundamentals/004. IPv4 and IPv6 Addresses Security Considerations.en.srt 16.7 KB
- Chapter 09 Security Assessment and Risk Analysis/010. Types of Backups.en.srt 16.7 KB
- Chapter 07 Operating System Security and Network Tools/003. macOS Security Considerations.en.srt 16.1 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/007. Virtual Private Networks VPNs.en.srt 16.0 KB
- Chapter 03 Threat Landscape and Attack Motives/008. Man-in-the-Middle Attacks.en.srt 15.7 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/004. Numbered Extended ACLs.en.srt 15.7 KB
- Chapter 04 Strengthening Your Security Posture/002. Defense-in-Depth.en.srt 15.4 KB
- Chapter 04 Strengthening Your Security Posture/007. Encryption.en.srt 15.0 KB
- Chapter 09 Security Assessment and Risk Analysis/009. Disaster Recovery.en.srt 14.4 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/006. ACL Considerations.en.srt 14.2 KB
- Chapter 02 Cybersecurity Essentials and Core Concepts/005. Attack Vectors.en.srt 13.4 KB
- Chapter 03 Threat Landscape and Attack Motives/005. Social Engineering Attacks.en.srt 13.1 KB
- Chapter 07 Operating System Security and Network Tools/004. Linux Security Considerations.en.srt 13.0 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/008. Network Access Control NAC.en.srt 12.7 KB
- Chapter 05 Network Foundations and Security Fundamentals/005. Security Appliances.en.srt 12.3 KB
- Chapter 07 Operating System Security and Network Tools/002. Microsoft Windows Security Considerations.en.srt 12.0 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/003. Numbered Standard ACLs.en.srt 11.9 KB
- Chapter 08 System Maintenance, Updates, and Logging/004. System Log Interpretation.en.srt 10.4 KB
- Chapter 10 Security Incident Response/007. Tactics Techniques and Procedures TTP.en.srt 10.3 KB
- Chapter 09 Security Assessment and Risk Analysis/007. Risk Management.en.srt 10.0 KB
- Chapter 09 Security Assessment and Risk Analysis/008. Security Assessments.en.srt 9.6 KB
- Chapter 10 Security Incident Response/003. Contrasting SIEM and SOAR.en.srt 9.0 KB
- Chapter 03 Threat Landscape and Attack Motives/007. Denial of Service DoS Attacks.en.srt 8.8 KB
- Chapter 07 Operating System Security and Network Tools/007. tcpdump Utility.en.srt 8.7 KB
- Chapter 11 Exam Preparation/003. Study Strategies.en.srt 8.1 KB
- Chapter 04 Strengthening Your Security Posture/008. Protocols Supporting Encryption.en.srt 7.6 KB
- Chapter 03 Threat Landscape and Attack Motives/010. Bring Your Own Device BYOD Considerations.en.srt 7.5 KB
- Chapter 06 Controlling Access and Protecting the Network Edge/002. Access Control List ACL Overview.en.srt 7.3 KB
- Chapter 05 Network Foundations and Security Fundamentals/006. Cloud Security Considerations.en.srt 7.3 KB
- Chapter 07 Operating System Security and Network Tools/005. netstat Utility.en.srt 7.2 KB
- Chapter 03 Threat Landscape and Attack Motives/004. Malware.en.srt 7.1 KB
- Chapter 05 Network Foundations and Security Fundamentals/003. MAC Address Security Considerations.en.srt 6.9 KB
- Chapter 04 Strengthening Your Security Posture/006. Authentication Authorization and Accounting AAA.en.srt 6.6 KB
- Chapter 08 System Maintenance, Updates, and Logging/003. Software and Hardware Updates.en.srt 6.6 KB
- Chapter 09 Security Assessment and Risk Analysis/005. Threat Intelligence.en.srt 6.6 KB
- Chapter 02 Cybersecurity Essentials and Core Concepts/003. The CIA Triad.en.srt 6.5 KB
- Chapter 04 Strengthening Your Security Posture/005. Password Policies and Alternatives.en.srt 6.5 KB
- Chapter 10 Security Incident Response/004. Cyber Kill Chain.en.srt 6.3 KB
- Chapter 01 Welcome to the Course!/001. Welcome to the Course!.en.srt 6.3 KB
- Chapter 02 Cybersecurity Essentials and Core Concepts/002. Cybersecurity Defined.en.srt 6.2 KB
- Chapter 10 Security Incident Response/009. Compliance Regulations.en.srt 6.2 KB
- Chapter 11 Exam Preparation/004. What to do on Exam Day.en.srt 6.0 KB
- Chapter 10 Security Incident Response/008. Evidence.en.srt 5.9 KB
- Chapter 04 Strengthening Your Security Posture/003. System Hardening.en.srt 5.9 KB
- Chapter 03 Threat Landscape and Attack Motives/009. Internet of Things IoT Weaknesses.en.srt 5.9 KB
- Chapter 09 Security Assessment and Risk Analysis/004. Port Scanning.en.srt 5.8 KB
- Chapter 09 Security Assessment and Risk Analysis/003. Active vs. Passive Reconnaissance.en.srt 5.7 KB
- Chapter 09 Security Assessment and Risk Analysis/002. Vulnerability Management.en.srt 5.6 KB
- Chapter 10 Security Incident Response/002. Stages of Incident Response.en.srt 5.5 KB
- Chapter 05 Network Foundations and Security Fundamentals/007. Proxy Servers.en.srt 5.3 KB
- Chapter 03 Threat Landscape and Attack Motives/006. Physical Attacks.en.srt 5.3 KB
- Chapter 04 Strengthening Your Security Posture/009. Code of Ethics.en.srt 5.3 KB
- Chapter 10 Security Incident Response/006. Diamond Model.en.srt 5.3 KB
- Chapter 08 System Maintenance, Updates, and Logging/002. Hardware and Software Inventory.en.srt 5.1 KB
- Chapter 03 Threat Landscape and Attack Motives/011. Advanced Persistent Threat APT.en.srt 4.6 KB
- Chapter 11 Exam Preparation/002. Registering for the Exam.en.srt 4.6 KB
- Chapter 07 Operating System Security and Network Tools/006. nslookup Utility.en.srt 4.5 KB
- Chapter 10 Security Incident Response/005. MITRE ATT&CK Matrix.en.srt 4.4 KB
- Chapter 03 Threat Landscape and Attack Motives/002. Categories of Attackers.en.srt 4.3 KB
- Chapter 09 Security Assessment and Risk Analysis/006. Vulnerability Response.en.srt 3.9 KB
- Chapter 02 Cybersecurity Essentials and Core Concepts/004. Vulnerabilities Threats Exploits and Risks.en.srt 3.8 KB
- Chapter 04 Strengthening Your Security Posture/004. Multi-Factor Authentication.en.srt 3.5 KB
- Chapter 03 Threat Landscape and Attack Motives/003. Motivation for Attacks.en.srt 3.1 KB
- Chapter 12 Next Steps/001. Module 11 - Congratulations and Next Steps.en.srt 3.1 KB
- Chapter 07 Operating System Security and Network Tools/001. Module 6 - Operating System Security and Network Tools.en.srt 2.7 KB
- Chapter 09 Security Assessment and Risk Analysis/001. Module 8 - Security Assessment and Risk Analysis.en.srt 2.6 KB
- Chapter 10 Security Incident Response/001. Module 9 - Security Incident Response.en.srt 2.4 KB
- Chapter 05 Network Foundations and Security Fundamentals/008. Honeypots and Honeynets.en.srt 1.9 KB
- Chapter 01 Welcome to the Course!/002. Meet Your Instructor.en.srt 1.4 KB
- Chapter 11 Exam Preparation/001. Module 10 - Exam Preparation.en.srt 1.2 KB
- Chapter 05 Network Foundations and Security Fundamentals/001. Module 4 - Network Foundations and Security Fundamentals.en.srt 990 bytes
- Chapter 02 Cybersecurity Essentials and Core Concepts/001. Module 1 - Cybersecurity Essentials and Core Concepts.en.srt 982 bytes
- Chapter 06 Controlling Access and Protecting the Network Edge/001. Module 5 - Controlling Access and Protecting the Network Edge.en.srt 978 bytes
- Chapter 04 Strengthening Your Security Posture/001. Module 3 - Strengthening Your Security Posture.en.srt 820 bytes
- Chapter 03 Threat Landscape and Attack Motives/001. Module 2 - Threat Landscape and Attack Motives.en.srt 802 bytes
- Chapter 08 System Maintenance, Updates, and Logging/001. Module 7 - System Maintenance, Updates, and Logging.en.srt 783 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.