Cybersecurity Support Technician β Course Outline
Module 1: Introduction to Cybersecurity & Essential Security Principles
Cybersecurity fundamentals and importance
Confidentiality, Integrity, and Availability (CIA triad)
Vulnerabilities, threats, exploits, and risks
Types of attackers and their motivations
Attack vectors and defense-in-depth strategy
System hardening basics
Cybersecurity code of ethics
Module 2: Networking Fundamentals for Cybersecurity
TCP/IP protocol vulnerabilities (TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS)
IPv4 and IPv6 addressing and security implications
MAC addresses and network communication
Network segmentation and CIDR notation
NAT (Network Address Translation), public vs. private networks
Network troubleshooting tools for security assessment
Module 3: Network Security Infrastructure & Technologies
Network security architecture and DMZ design
Virtualization and cloud security basics
Honeypots and deception technologies
Proxy servers, IDS (Intrusion Detection Systems), and IPS (Intrusion Prevention Systems)
Secure wireless network configuration (SoHo)
MAC address filtering and encryption standards
SSID security and wireless protocols
Access Control Lists (ACLs)
Firewall fundamentals and VPN basics
Network Access Control (NAC)
Authentication, Authorization, and Accounting (AAA) principles
Multi-factor authentication (MFA) and encryption methods
Module 4: Endpoint Security & Operating System Fundamentals
Security features in Windows, macOS, and Linux
Windows Defender and host-based firewalls
CLI (Command Line Interface) and PowerShell basics
File and directory permissions
Privilege escalation concepts
Endpoint security tools (netstat, nslookup, tcpdump)
Malware scanning and removal procedures
System security baselines
Password policies and secure authentication practices
Module 5: System Management, Compliance & Log Analysis
Hardware and software asset management
Program deployment and configuration management
Data backup strategies and implementation
Regulatory compliance (PCI DSS, HIPAA, GDPR)
BYOD (Bring Your Own Device) management and security
Software and hardware update procedures
Device drivers and firmware updates
System log analysis (Event Viewer, audit logs, syslog)
Anomaly identification in logs
Module 6: Vulnerability Assessment & Risk Management
Vulnerability management processes (identification, management, mitigation)
Active and passive reconnaissance techniques
Port scanning and automated testing
Threat intelligence techniques and sources
Vulnerability databases and CVE system
Cybersecurity reports and collective intelligence
Risk vs. vulnerability concepts
Risk ranking and mitigation strategies
Disaster recovery and business continuity planning
Backup strategies and recovery controls
Module 7: Introduction to Penetration Testing & Ethical Hacking
Penetration testing fundamentals and methodology
Legal and ethical considerations
Authorized testing vs. malicious hacking
Penetration testing phases (planning, reconnaissance, scanning, exploitation, reporting)
Basic reconnaissance and information gathering
Network discovery and port scanning tools
Common vulnerability types and impact assessment
Vulnerability scanners and security testing
Basic web application security testing
Documentation and reporting of findings
Difference between penetration testing and vulnerability assessments
Module 8: Security Operations & Incident Response
SIEM (Security Information and Event Management) and SOAR platforms overview
Security event monitoring and escalation
Network data analysis for incident detection
Packet capture analysis
Digital forensics fundamentals
Cyber Kill Chain and MITRE ATT&CK framework
Diamond Model and TTPs analysis
Evidence handling and chain of custody
Compliance frameworks impact (GDPR, HIPAA, PCI-DSS, FERPA, FISMA)
Incident response lifecycle (NIST SP 800-61)
Incident response policies and procedures
Integration with penetration testing findings
Course Overview
Target Audience: Beginners seeking CCST certification and entry-level cybersecurity roles
Duration: 8β10 weeks
Prerequisites: Basic computer literacy (no prior cybersecurity experience needed)
Certification Goal: Cisco Certified Support Technician (CCST)
Career Preparation: Cybersecurity Technician, SOC Analyst (Tier 1), Security Analyst, Junior Penetration Tester
Course Features:
Full CCST exam coverage
Hands-on labs and practical exercises
Industry-standard tools and techniques
Penetration testing introduction
Job-ready competencies for immediate employment