Cisco CyberSecurity

$99.99 / year with a 7-day free trial

Join instructor William Price, a seasoned cybersecurity professional, on a captivating journey into the world of Cisco Certified Support Technician Cybersecurity. This course is created to prepare you for the Cisco Certified Support Technician Cybersecurity Certification, offering real-life industry scenarios, engaging experiences, and essential tech skills that ignite your passion for the digital realm. Master the certification, gain practical skills, and become part of the future of technology and security. Enroll now for an unforgettable cybersecurity adventure and step confidently into the world of digital defense.

For group/class purchases and public K-12, please contact us.
Group Members

Course Hours: 10h
Total Video Duration: 6hr
Videos: 62
Modules: 5

Instructor(s):

Instructor Avatar

William Price

Certification aligned:

Cisco Certified Support Technician - Cybersecurity

Learn more about the certification

Transcripts and language:

Spanish

|

Portuguese

|

English


What you will learn

Module 1
Build a strong foundation in cybersecurity by learning how risk, threats, and security controls work together. Explore common attacks like ransomware and malware, understand access management mistakes, and discover modern protection methods such as multi-factor authentication, biometrics, encryption, and passwordless security.

Module 2
Learn how networks are attacked—and how to defend them. Explore network vulnerabilities, spoofing attacks, secure network design, firewalls, VPNs, cloud services, and home network security. You’ll also learn how organizations protect internal systems using tools like DMZs, access controls, and virtualization.

Module 3
Dive into operating systems and security from the inside out. Compare Windows, Linux, and macOS, explore command-line tools and PowerShell, and learn how organizations secure employee devices with BYOD policies, encryption, VPNs, and disaster recovery planning. You’ll also analyze system activity using event logs.

Module 4
Step into the world of cyber threat intelligence and vulnerability management. Learn how security teams track threats, analyze vulnerabilities, prioritize risks, and plan for business continuity using industry-standard frameworks, tools, and scanning techniques.

Module 5
Master the role of logs and monitoring in cybersecurity. Learn how security teams detect threats using logs and SIEM tools, investigate incidents through digital forensics, and respond to attacks using structured incident response models—all while understanding legal and ethical responsibilities.


Student resources

  • Workbooks
  • Module Assessments
  • Video Questions

Screenshots