CCNA2 SRWE Module 10 - LAN Security Concepts

Date Subject Lesson Plan
11/10/23 CCNA2

CCNA2v7 Module 10 Reading Organizer

Start Module 10 - LAN Security Concepts

Read: 10.0.1 Why should I take this module?

Read: 10.0.2 What will I learn in this module?

Start Module 10, Section 1 - Endpoint Security

Read: 10.1.1 Network Attacks Today

Read: 10.1.2 Network Security Devices
Video: Network Security Devices (6:51)

Read: 10.1.3 Endpoint Protection
Video: Professor Messer: Endpoint Protection (9:48)

Read: 10.1.4 Cisco Email Security Appliance

Read: 10.1.5 Cisco Web Security Appliance
Video: Cisco Web Security (5:02)

Activity: 10.1.6 Check Your Understanding - Endpoint Security

Assignment: Module 10 Study Guide 1-10

  A+

Start Chapter 13 - Security

Read: 13.0.1.1 Intro

Read: 13.1.1.1 Malware

Activity: 13.1.1.2 What Do You Already Know? - Malware

Read: 13.1.1.3 Viruses and Trojan Horses

Activity: 13.1.1.4 Types of Malware

Activity: 13.1.1.5 Check Your Understanding - Malware

  BPA BPA Prep
11/13/23 CCNA2

100% Club 12:30 (2023)
Video: Professor Messer 220-1102 Study Group

Start Module 10, Section 2 - Access Control

Read: 10.2.1 Authentication with a Local Password

Read: 10.2.2 AAA Components

Read: 10.2.3 Authentication

Read: 10.2.4 Authorization

Read: 10.2.5 Accounting

Read: 10.2.6 802.1X

Activity: 10.2.7 Check Your Understanding - Access Control

Assignment: Module 10 question 11-20

  A+

Read: 13.1.2.1 Anti-Malware Programs

Read: 13.1.2.2 Signature File Updates

Video Explanation: 13.1.2.3 Protecting Against Malware

Read: 13.1.2.4 Remediating Infected Systems

Video Explanation: 13.1.2.5 Remediating an Infected System

Lab: 13.1.2.6 Operating System Security (Use lab computers)

11/14/23 CCNA2

Voting Period: November 10th, 2023 - November 20th, 2023 To cast your vote, visit the voting link: T-shirt Designs: - https://forms.gle/WggUVEUkgyAQVFQk8
Pins Designs: https://forms.gle/Z18HFkWxdZuJQVzW6

Start Module 10, Section 3 - Layer 2 Security Threats

Read: 10.3.1 Layer 2 Vulnerabilities

Read: 10.3.2 Switch Attack Categories

Read: 10.3.3 Switch Attack Mitigation Techniques

Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats

Start Module 10, Section 4 - MAC Address Table Attack

Read: 10.4.1 Switch Operation Review

Read: 10.4.2 MAC Address Table Flooding

Read: 10.4.3 MAC Address Table Attack Mitigation

Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks

Module 10 question 21-30

  A+

Activity: 13.1.2.7 Check Your Understanding - Preventing Malware

Activity: 13.1.3.1 Networks Are Targets

Activity: 13.1.3.2 Types of TCP/IP Attacks

Activity: 13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack

Read: 13.1.3.4 Zero-Day

Read: 13.1.3.5 Protecting Against Network Attacks

Read: 13.1.4.1 Social Engineering
Video: Professor Messer: Social Engineering Attacks (9:59)

Activity: 13.1.4.2 What Do You Already Know? - Social Engineering Techniques

Activity: 13.1.4.3 Social Engineering Techniques

Read: 13.1.4.4 Protecting Against Social Engineering

Video: LearnKey: Domain 2: 2.4 Social Engineering
Assignment: Forms of Phishing Worksheet

Activity: 13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering Techniques

Read: 13.2.1.1 What is a Security Policy
Video: Professor Messer: Security Policies (2:00)

Read: 13.2.1.2 Security Policy Category

Read: 13.2.1.3 Securing Devices and Data

Read: 13.2.2.1 Physical Security
Video: Professor Messer: Physical Security (8:36)

Read: 13.2.2.2 Types of Secure Locks

Read: 13.2.2.3 Mantraps
Video: Mantraps (0:50)

Read: 13.2.2.4 Securing Computers and Network Hardware

Activity: 13.2.2.5 Check Your Understanding - Locking Mechanisms

  BPA Work on preparing for contests! Especially judged events!
11/15/23 CCNA2

Start Module 10, Section 5 - LAN Attacks

Demonstration Video: 10.5.1 VLAN and DHCP Attacks

Read: 10.5.2 VLAN Hopping Attacks
Video: Professor Messer: VLAN Hopping (5:41)

Read: 10.5.3 VLAN Double-Tagging Attack

Read: 10.5.4 DHCP Messages

Read: 10.5.5 DHCP Attacks
Video: Kevin Wallace: DHCP Attacks and Defense Strategies (19:19)

Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance

Read: 10.5.7 ARP Attacks
Video: Kevin Wallace: ARP Poisoning and Defense Strategies (20:05)

Read: 10.5.8 Address Spoofing Attack

Read: 10.5.9 STP Attack

Read: 10.5.10 CDP Reconnaissance
Video: Kevin Wallace: Mapping a Network with CDP or LLDP (6:10)

Activity: 10.5.11 Check Your Understanding - LAN Attacks

Assignment: Module 10 question 31-53 (finish)

  A+

Read: 13.2.3.1 Data - Your Greatest Asset

Read: 13.2.3.2 Data Backups

Read: 13.2.3.3 File and Folder Permissions

Read: 13.2.3.4 File and Folder Encryption

Read: 13.2.3.5 Windows BitLocker and BitLocker To Go

Video Demonstration: 13.2.3.6 Bitlocker and Bitlocker To Go

Lab: 13.2.3.7 Bitlocker and Bitlocker To Go
* Use your Windows 10 virtual machine
* Must use software vs. TPM because virtual

Read: 13.2.4.1 Data Wiping Magnetic Media
Video: What is a degausser? (7:41)
Video: ElectroMagenetic degausser (4:26)

Read: 13.2.4.2 Data Wiping Other Media

Read: 13.2.4.3 Hard Drive Recycling and Destruction
Video: How to destroy a hard drive (15:33)

Activity: 13.2.4.4 Check Your Understanding - Data Protection

11/16/23 CCNA2

Start Module 10, Section 6 - Module Practice and Quiz

Read: 10.6.1 What did I learn in this module?

Activity: 10.6.2 Module Quiz - LAN Security Concepts

Review: Module 10 PowerPoint

Video Review: Jason Johnson: Module 10 LAN Security (26:27)

Test: Module 10 (12:00)

  A+

Video: What is HIPAA?

Video: Techquickie: What is a Privacy Screen? (5:47)

Read: 13.3.1.1 Securing a Computer

Read: 13.3.1.2 Securing BIOS

Read: 13.3.1.3 Securing Windows Login

Read: 13.3.1.4 Local Password Management

Read: 13.3.1.5 Usernames and Passwords

Lab: 13.3.1.6 Operating System Login

Activity: 13.3.1.7 Check your Understanding - Secure a Workstation

Read: 13.3.2.1 The Windows Local Security Policy

Read: 13.3.2.2 Account Policies Security Settings

Read: 13.3.2.3 Local Policies Security Settings

Read: 13.3.2.4 Exporting the Local Security Policy

Lab: 13.3.2.5 Configure Windows Local Security Policy

Activity: 13.3.2.6 Check Your Understanding- Local Security Policy