Cisco Certified Support Technician CCST Networking (100-150)
(100-150.AB1)/ISBN:978-1-64459-521-3
The Cisco Certified Support Technician (CCST) Networking course is designed to equip you with the essential skills and knowledge required to excel in network support roles. This course focuses on mastering network troubleshooting, maintenance, and support techniques using Cisco technologies. The course covers the key areas such as Introduction to Network Support, Networking Fundamentals, Cisco Networking Technologies, Network Troubleshooting, Network Security, Remote Support and Monitoring.
Here's what you will get
The Cisco Certified Support Technician (CCST) Networking certification validates an individual’s skills and knowledge of entry-level networking concepts and topics. The certification demonstrates foundational knowledge and skills needed to show how networks operate, including the devices, media, and protocols that enable network communications.
The Cisco Certified Support Technician (CCST) Networking certification is also a first step toward CCNA certification.
Lessons
25+ Lessons | 368+ Exercises | 203+ Quizzes | 424+ Flashcards | 424+ Glossary of terms
TestPrep
50+ Pre Assessment Questions | 4+ Full Length Tests | 50+ Post Assessment Questions | 200+ Practice Test Questions
Hands-On Labs
64+ LiveLab | 64+ Video tutorials | 02:41+ Hours
Video Lessons
35+ Videos | 05:42+ Hours
Need guidance and support? Click here to check our Instructor Led Course.
Here's what you will learn
Download Course OutlineLessons 1: Introduction
Lessons 2: Shipping Things
- The Purpose of Packaging
- Addressing
- Packaging Data
- Tunnels
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 3: Addresses
- Address Scope
- Physical Addresses
- Internet Protocol Version 4
- Why Two Addresses?
- Internet Protocol Version 6
- Aggregation
- Network Prefixes
- Ports and Sockets
- Network Address Translation
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 4: Routing and Switching
- Assigning IP Addresses to Hosts
- Host-to-Host Communication and Address Resolution on a Single Wire
- Switching Packets
- Routing Packets
- Redirects and Relays
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 5: Wired Host Networking Configuration
- Windows
- macOS
- Linux
- Verifying Connectivity
- Finding Your Public IP Address
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 6: What’s in a Network?
- Hosts and Virtual Hosts
- Mobile Devices
- Things
- Middleboxes
- The Global Internet
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 7: Network Models
- Why Are Models Important?
- The OSI Seven-Layer Model
- The TCP/IP Model
- The Recursive Internet Architecture
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 8: Wired Networks
- Electrical Transmission and Interference
- The Maximum Transmission Unit
- Ethernet over Copper
- Fiber
- Pluggable Interfaces
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 9: Wireless Networks
- Free Space Concepts
- Wi-Fi
- Cellular
- Satellite
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 10: Bandwidth, Delay, and Jitter
- Bandwidth and Throughput
- Bandwidth and Delay
- Jitter
- Measuring Network Performance
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 11: Basic Network Hardware
- Hardware, Ports, and Lights
- Network Diagrams
- Network Wiring
- Handling the Heat
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 12: Local Area Networks
- Building and Campus Networks
- The Home Network
- Configuring the Home Network
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 13: Wide Area Networks
- Common Challenges to Building Wide Area Networks
- Metro and Last-Mile Network Design
- Transit Provider Design
- Ring and Hub-and-Spoke Topologies
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 14: Data Centers and Fabrics
- Web Applications
- Internet Exchange Points
- Spine-and-Leaf Fabrics
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 15: Network Transport
- Internet Protocol Version 4
- Internet Protocol Version 6
- User Datagram Protocol
- Transmission Control Protocol
- Quick UDP Internet Connections (QUIC)
- Identifying Flows
- Path MTU Discovery
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 16: Application Transport
- Marshaling Systems
- Secure Shell
- Hypertext Transfer Protocol
- File Transfer Protocol
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 17: Names and Time
- The Domain Name Space
- The Life of a DNS Query
- DNS Architecture and Operations
- DNS Security and Privacy
- Diagnosing DNS
- The Network Time Protocol
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 18: Cloud Computing
- Cloud Computing
- Public versus Private Cloud
- The Impact of Cloud Computing on Network Engineering
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 19: Security and Privacy Concepts
- A Security Taxonomy
- Privacy Concepts
- Authentication, Authorization, and Accounting
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 20: Attacks and Threats
- Defining Attacks and Threats
- Gaining Access
- Lateral Movement
- Attack Actions
- Denial of Service
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 21: Security Tools
- Authentication Tools
- Defensive Tools and Design
- Countering Spam and Phishing
- Encryption
- Virtual Private Networks
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 22: Managing Networks
- Network Documentation
- Network Processes and Lifecycle
- Management Challenges
- Connecting to Manage
- Management Systems
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 23: Troubleshooting
- Failure Terminology
- Troubleshooting Tools and Techniques
- Packet Captures
- Advice to Troubleshooters
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 24: Configuring a Network
- Foundation Topics
- Initial Access
- Configuring IPv4
- Configuring Routing
- Configuring Remote Access and Security
- Adding IPv6
- Adding a Switch
- Lesson Review
- Review All the Key Topics
- Concepts and Actions
Lessons 25: Final Preparation
- Advice to Future Engineers
- Learning Consolidation Activities
Hands-on LAB Activities
Addresses
- Viewing the MAC Address on Different Interfaces
- Configuring an IPv6 Address
- Configuring NAT
- Configuring PAT
Routing and Switching
- Configuring a DHCP Server
- Configuring a Router with IPv4 and IPv6 Addresses - Packet Tracer
- Configuring SLAAC - Packet Tracer
- Implementing DHCPv4 - Packet Tracer
- Investigating STP Loop Prevention - Packet Tracer
- Configuring BGP
- Configuring a Router
- Configuring OSPF
- Configuring EIGRP
Wired Host Networking Configuration
- Using the net Command
- Using the arp and netstat Utilities
- Using Command Line Tools
What’s in a Network?
- Performing Intrusion Detection
- Using Windows Firewall
Wired Networks
- Powering the Device Using PoE
- Connecting Devices in a Bus Topology
- Preparing a Temporary Server for the Network or Internet Connection
Basic Network Hardware
- Mounting the Switch in the Rack
Local Area Networks
- Connecting an Analog Modem to a Laptop
- Configuring a SOHO Network - Packet Tracer
- Connecting a Wireless Router to a Laptop
- Enabling Cellular Data on an Android Phone
- Disabling Mobile Data on an iPhone
- Checking the Network Connectivity Using an Ethernet Loopback Plug
- Connecting an iPhone to a Wi-Fi Network
- Configuring WAP - Packet Tracer
Network Transport
- Understanding the IPv4 Header
- Displaying the Structure of the UDP Segment
- Displaying the Structure of the TCP Segment
Application Transport
- Configuring an SSH Server
- Configuring an FTP Server
Names and Time
- Adding a DNS Server
- Configuring DNS Resource Records
- Using the dig and nslookup Commands
- Configuring Multi-stratum NTP
Security and Privacy Concepts
- Configuring OpenLDAP Utilities
- Examining AD Objects
Attacks and Threats
- Searching Exploits Using searchsploit
- Performing the MITM Attack
- Using Social Engineering Techniques to Plan an Attack
- Simulating a DoS Attack
- Simulating a DDoS Attack
Security Tools
- Setting Up a DMZ
- Configuring Stateless and Stateful DHCPv6 - Packet Tracer
- Exploiting SMTP
- Using a Symmetric Encryption Algorithm
- Using an Asymmetric Encryption Algorithm
- Configuring a VPN
- Installing the Proxy Server Feature
Managing Networks
- Creating a Security Template
- Enforcing a Security Template
- Connecting to a Remote Computer Using RDP
- Exploiting SNMP
Troubleshooting
- Capturing a Packet Using Wireshark
Configuring a Network
- Performing a Router on a Stick - Packet Tracer
- Using the show IP route Command
- Configuring Static Routing
- Configuring SSH on a Router - Packet Tracer
- Configuring VLAN and Trunking - Packet Tracer
- Securing Switches - Packet Tracer
Exam FAQs
125 USD
Pearson VUE
The exam consists of multiple Choice questions.
There are no pre-requisites for this certification.
The exam contains 40-50 questions.
50 minutes
70%
Candidates who fail an Entry, Associate, Professional, Specialist-level, or CCDE written exam must wait five calendar days, beginning the day after the failed attempt, before they may retest for the same exam.