CCNA2 SRWE Module 10 - LAN Security Concepts

Date Subject Lesson Plan
11//21/25 CCNA2

https://docs.google.com/presentation/d/14vaGxTspgUR0RbD6ZxwA2ezQT2kjzy-3oUtNScvdZSI/edit?usp=sharing


https://forms.gle/jcz4LqgDyo4xTJat7

 

CCNA2v7 Module 10 Reading Organizer

Start Module 10 - LAN Security Concepts

Read: 10.0.1 Why should I take this module?

Read: 10.0.2 What will I learn in this module?

Start Module 10, Section 1 - Endpoint Security

Read: 10.1.1 Network Attacks Today

Read: 10.1.2 Network Security Devices
Video: Network Security Devices (6:51)

Read: 10.1.3 Endpoint Protection
Video: Professor Messer: Endpoint Protection (9:48)

Read: 10.1.4 Cisco Email Security Appliance
Video: Cisco Email Security Appliance (7:04)

Read: 10.1.5 Cisco Web Security Appliance
Video: Cisco Web Security (5:02)

Activity: 10.1.6 Check Your Understanding - Endpoint Security

Assignment: Module 10 Study Guide 1-10

  A+

Read: 12.3.1.1 Introduction to Linux and Mac OS Operating Systems

Video: Professor Messer: Linux Features (3:57)

Read: 12.3.1.2 Overview of the Linux GUI

Video: Professor Messer: macOS Features (8:05)

Read: 12.3.1.3 Overview macOS GUI

Read: 12.3.1.4 Overview of Linux and macOS CLI

Read: 12.3.1.5 Linux and macOS Terminal Emulators

Read: 12.3.1.6 Linux Backup and Recovery

Read: 12.3.1.7 macOS Backup and Recovery

Read: 12.3.1.8 Overview of Disk Utilities

Activity: 12.3.1.9 Check your Understanding - Linux and macOS Operating Systems

Video: Professor Messer: MacOS Features (8:05)

Read: 12.3.2.1 Scheduled Tasks

Read: 12.3.2.2 Operating System Updates

Read: 12.3.2.3 Security

Activity: 12.3.2.4 Check Your Understanding - Linux and macOS Best Practices

Syntax Checker: 12.3.3.1 File and Directory Commands

Activity: 12.3.3.2 Check Your Understanding - File and Directory Commands

Video: The Great History of UNIX (2:30)

Video: What is Linux? (5:42)

Read: 12.3.3.3 The ls -l command output

Read: 12.3.3.4 Basic Unix File and Directory Permissions

Syntax Checker: 12.3.3.5 File and Directory Permissions

Activity: 12.3.3.6 Check Your Understanding - File and Directory Permissions

  BPA BPA Prep
11/24/25 CCNA2

Start Module 10, Section 2 - Access Control

Read: 10.2.1 Authentication with a Local Password

Read: 10.2.2 AAA Components

Read: 10.2.3 Authentication

Read: 10.2.4 Authorization

Read: 10.2.5 Accounting

Read: 10.2.6 802.1X

Activity: 10.2.7 Check Your Understanding - Access Control

Start Module 10, Section 3 - Layer 2 Security Threats

Read: 10.3.1 Layer 2 Vulnerabilities
Video: Kev Techify: Layer 2 Security Threats (5:43)

Read: 10.3.2 Switch Attack Categories

Read: 10.3.3 Switch Attack Mitigation Techniques

Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats

Start Module 10, Section 4 - MAC Address Table Attack

Read: 10.4.1 Switch Operation Review

Read: 10.4.2 MAC Address Table Flooding
Video: Kev Techify: Mac Address Table Attack (6:10)

Read: 10.4.3 MAC Address Table Attack Mitigation
Video: Kev Techify: Mitigate MAC Table Attacks (20:27)

Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks

Assignment: Module 10 question 11-30

  A+

Video: Professor Messer: Linux Commands (28:43)

Read: 12.3.3.7 Linux Administrative Commands

Read: 12.3.3.8 Linux Administrative Commands Requireing Root Access

Activity: 12.3.3.9 Check Your Understanding - Administrative Commands

Syntax Checker: 12.3.3.10 File Ownership and Permission

Read: 12.4.1.1 The Six Steps of the Troubleshooting Process

Read: 12.4.1.2 Identify the Problem

Read: 12.4.1.3 Establish a theory of Probable Cause

Read: 12.4.1.4 Test the Theory to Determine the Cause

Read: 12.4.1.5 Establish a Plan of Action

Read: 12.4.1.6 Verify Full System Functionality

Read: 12.4.1.7 Document the Findings

Read: 12.4.2.1 Common Problems and Solutions for Mobile Operating Systems

Read: 12.4.2.2 Common Problems and Solutions for Mobile OS Security

Read: 12.4.2.3 Common Problems and Solutions for Linux and macOS

Lab: 12.4.2.4 Troubleshoot Mobile Devices

Read: 12.5.1.1 Review Chapter 12

Review: Chapter 12 PowerPoint

Study: Chapter 12 Test

11/25/25 CCNA2

Start Module 10, Section 5 - LAN Attacks

Demonstration Video: 10.5.1 VLAN and DHCP Attacks (5:41)

Read: 10.5.2 VLAN Hopping Attacks
Video: Professor Messer: VLAN Hopping (5:41)

Read: 10.5.3 VLAN Double-Tagging Attack

Read: 10.5.4 DHCP Messages

Read: 10.5.5 DHCP Attacks
Video: Kevin Wallace: DHCP Attacks and Defense Strategies (19:19)

Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance

Read: 10.5.7 ARP Attacks
Video: Kevin Wallace: ARP Poisoning and Defense Strategies (20:05)

Read: 10.5.8 Address Spoofing Attack

Read: 10.5.9 STP Attack

Read: 10.5.10 CDP Reconnaissance
Video: Kevin Wallace: Mapping a Network with CDP or LLDP (6:10)

Activity: 10.5.11 Check Your Understanding - LAN Attacks

Assignment: Module 10 question 31-53 (finish)

https://greatercle.zoom.us/meeting/register/By1yJsQGQQSYejmYC8xqDg 

  A+

Review Video: Jason Johnson: ITE Chapter 12 v7.0 (25:14)

Test: Chapter 12

Start Chapter 13 - Security

Read: 13.0.1.1 Intro

Read: 13.1.1.1 Malware

Activity: 13.1.1.2 What Do You Already Know? - Malware

Read: 13.1.1.3 Viruses and Trojan Horses

Activity: 13.1.1.4 Types of Malware

Activity: 13.1.1.5 Check Your Understanding - Malware

Read: 13.1.2.1 Anti-Malware Programs

Read: 13.1.2.2 Signature File Updates

Video Explanation: 13.1.2.3 Protecting Against Malware

Read: 13.1.2.4 Remediating Infected Systems

Video Explanation: 13.1.2.5 Remediating an Infected System

Lab: 13.1.2.6 Operating System Security (Use lab computers)

Activity: 13.1.2.7 Check Your Understanding - Preventing Malware

Activity: 13.1.3.1 Networks Are Targets

Activity: 13.1.3.2 Types of TCP/IP Attacks

Activity: 13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack

Read: 13.1.3.4 Zero-Day

Read: 13.1.3.5 Protecting Against Network Attacks

Read: 13.1.4.1 Social Engineering
Video: Professor Messer: Social Engineering Attacks (9:59)

Activity: 13.1.4.2 What Do You Already Know? - Social Engineering Techniques

Activity: 13.1.4.3 Social Engineering Techniques

Read: 13.1.4.4 Protecting Against Social Engineering

Video: LearnKey: Domain 2: 2.1.1 Physical Security pg.71


  BPA Work on preparing for contests! Especially judged events!
01/05/26 CCNA2

 

  A+

Video: LearnKey: Domain 2: 2.1.1 Physical Security for staff pg.72

Activity: 13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering Techniques

Read: 13.2.1.1 What is a Security Policy
Video: Professor Messer: Security Policies (2:00)

Read: 13.2.1.2 Security Policy Category

Read: 13.2.1.3 Securing Devices and Data

Read: 13.2.2.1 Physical Security
Video: Professor Messer: Physical Security (8:36)

Read: 13.2.2.2 Types of Secure Locks

Read: 13.2.2.3 Mantraps
Video: Mantraps (0:50)

Read: 13.2.2.4 Securing Computers and Network Hardware

Activity: 13.2.2.5 Check Your Understanding - Locking Mechanism

Read: 13.2.3.1 Data - Your Greatest Asset

Read: 13.2.3.2 Data Backups

Read: 13.2.3.3 File and Folder Permissions

Read: 13.2.3.4 File and Folder Encryption

Read: 13.2.3.5 Windows BitLocker and BitLocker To Go

Video Demonstration: 13.2.3.6 Bitlocker and Bitlocker To Go

Lab: 13.2.3.7 Bitlocker and Bitlocker To Go

01/06/26 CCNA2

Start Module 10, Section 6 - Module Practice and Quiz

Read: 10.6.1 What did I learn in this module?

Activity: 10.6.2 Module Quiz - LAN Security Concepts

Review: Module 10 PowerPoint

Video Review: Jason Johnson: Module 10 LAN Security (26:27)

Test: Module 10 (12:00)

  A+

Video: What is HIPAA?

Video: Techquickie: What is a Privacy Screen? (5:47)

Read: 13.2.4.1 Data Wiping Magnetic Media
Video: What is a degausser? (7:41)
Video: ElectroMagenetic degausser (4:26)

Read: 13.2.4.2 Data Wiping Other Media

Read: 13.2.4.3 Hard Drive Recycling and Destruction
Video: How to destroy a hard drive (15:33)

Activity: 13.2.4.4 Check Your Understanding - Data Protection

Read: 13.3.1.1 Securing a Computer

Read: 13.3.1.2 Securing BIOS

Read: 13.3.1.3 Securing Windows Login

Read: 13.3.1.4 Local Password Management

Read: 13.3.1.5 Usernames and Passwords

Lab: 13.3.1.6 Operating System Login

Activity: 13.3.1.7 Check your Understanding - Secure a Workstation

Read: 13.3.2.1 The Windows Local Security Policy

Read: 13.3.2.2 Account Policies Security Settings

Read: 13.3.2.3 Local Policies Security Settings

Read: 13.3.2.4 Exporting the Local Security Policy

Lab: 13.3.2.5 Configure Windows Local Security Policy

Activity: 13.3.2.6 Check Your Understanding- Local Security Policy