CCNA2 SRWE Module 11 - Switch Security Configuration

Date Subject Lesson Plan
11/17/23 CCNA2

CCNA2v7 Module 11 Reading Organizer

Start Module 11 - Switch Security Configuration

Read: 11.0.1 Why should I take this module?

Read: 11.0.2 What will I learn in this module?

Start Module 11, Section 1 - Implement Port Security

Read: 11.1.1 Secure Unused Ports

Read: 11.0.2 Mitigate MAC Address Table Attacks

Read: 11.1.3 Enable Port Security

Read: 11.1.4 Limit and Learn MAC Addresses

Read: 11.1.5 Port Security Aging

Read: 11.1.6 Port Security Violation Modes

Read: 11.1.7 Ports in error-disabled State

Read: 11.1.8 Verify Port Security

Syntax Checker: 11.1.9 Implement Port Security

PT: 11.1.10 Implement Port Security (20 minutes)

Assignment: Module 11 Study Guide 1-19

  A+

Read: 13.3.3.1 Maintaining Accounts

Read: 13.3.3.2 Managing Users Account Tools and User Account Tasks

Read: 13.3.3.3 Local Users and Groups Manager

Read: 13.3.3.4 Managing Groups

Read: 13.3.3.5 Active Directory Users and Computers

Lab: 13.3.3.6 Configure Users and Groups in Windows (30 min)

Activity: 13.3.3.7 Check Your Understanding - User Account Tools and User Account Tasks

  BPA Prepare for Contests
11/20/23  

Start Module 11, Section 2 - Mitigate VLAN Attacks

Read: 11.2.1 VLAN Attacks Review

Read: 11.2.2 Steps to Mitigate VLAN Hopping Attacks
Video: Professor Messer: VLAN Hopping (4:56)

Syntax Checker: 11.2.3 Mitigate VLAN Hopping Attacks

Start Module 11, Section 3 - Mitigate DHCP Attacks

Read: 11.3.1 DHCP Attack Review

Read: 11.3.2 DHCP Snooping
Video: Jeremy's IT Lab: DHCP Snooping (28:23)

Read: 11.3.3 Steps to Implement DHCP Snooping

Link: Cisco.com DHCP Snooping

Read: 11.3.4 DHCP Snooping Configuration Example

Syntax Checker: 11.3.5 Mitigate DHCP Attacks

Assignment: Module 11 Study Guide 20-26

  A+

Read: 13.3.4.1 Firewalls

Read: 13.3.4.2 Software Firewalls

Read: 13.3.4.3 Windows Firewall

Read: 13.3.4.4 Configuring Exceptions in Windows Firewall

Read: 13.3.4.5 Windows Firewall with Advanced Security

Lab: 13.3.4.6 Configure Windows Firewall (30 min)

Activity: 13.3.4.7 Check your Understanding - Windows Firewall

  BPA Prepare for Contests
11/21/23 CCNA2

Start Module 11, Section 4 - Mitigate ARP Attacks

Read: 11.4.1 Dynamic ARP Inspection

Read: 11.4.2 DAI Implementation Guidelines

Read: 11.4.3 DAI Configuration Example

Syntax Checker: 11.4.4 Mitigate ARP Attacks

Start Module 11, Section 5 - Mitigate STP Attacks

Read: 11.5.1 PortFast and BPDU Guard
Video: Rick Graziani: BPDU Guard (5:43)

Read: 11.5.2 Configure PortFast
Video: Keith Barker: PortFast (34:11)

Read: 11.5.3 Configure BPDU Guard

Syntax Checker: 11.5.4 Mitigate STP Attacks

Assignment: Module 11 Study Guide 27-37 (end)

  A+

Read: 13.3.5.1 Web Security

Read: 13.3.5.2 InPrivate Browsing

Read: 13.3.5.3 Pop-up Blocker

Read: 13.3.5.4 SmartScreen Filter

Read: 13.3.5.5 ActiveX Filtering

Activity: 13.3.5.6 Check Your Understanding – Web Security

Read: 13.3.6.1 Restrictive Settings

Read: 13.3.6.2 Disable Auto-Play

Read: 13.3.6.3 Operating System Service Packs and Security Patches

Activity: 13.3.6.4 Check your Understanding - Security Maintenance

  BPA Prepare for Contests
11/27/23 CCNA2

Start Module 11, Section 6 - Module Practice and Quiz

PT: 11.6.1 Switch Security Configuration

Lab: 11.6.2 Switch Security Configuration (Start approx. 2 hrs.)

Read: 11.6.3 What did I learn in this module?

Activity: 11.6.4 Module Quiz - Switch Security Configuration

  A+

Read: 13.4.1.1 What Do You Already Know? - Wireless Security

Read: 13.4.1.2 Common Communication Encryption Types

Read: 13.4.1.3 Wi-Fi Configuration Best Practices

Read: 13.4.1.4 Authentication Methods

Read: 13.4.1.5 Wireless Security Modes

Read: 13.4.1.6 Firmware Updates

Read: 13.4.1.7 Firewalls

Read: 13.4.1.8 Port Forwarding and Port Triggering

Read: 13.4.1.9 Universal Plug and Play

PT: 13.4.1.10 Configure Wireless Security

  BPA Prepare for Contests
11/28/23 CCNA2

Lab: 11.6.2 Switch Security Configuration (Finish)

Review: Module 11

Video Review: Module 11 Switch Security (18:43)

Test: Module 11

  A+

Read: 13.5.1.1 The Six Steps to the Troubleshooting Process

Read: 13.5.1.2 Identify the Problem

Read: 13.5.1.3 Establish a Theory of Probable Cause

Read: 13.5.1.4 Test the Theory to Determine Cause

Read: 13.5.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution

Read: 13.5.1.6 Verify Full System Functionality and, If Applicable Implement Preventive Measures

Read: 13.5.1.7 Document Findings, Actions, and Outcomes

Activity: 13.5.2.1 Common Problems and Solutions for Security

Lab: 13.5.2.2 Document Customer Information in a Work Order

Read: 13.6.1.1 Summary

Study: Chapter 13 Test