Date | Subject | Lesson Plan |
---|---|---|
10/31/24 | CCNA2 | CCNA2v7 Module 10 Reading Organizer Start Module 10 - LAN Security Concepts Read: 10.0.1 Why should I take this module? Read: 10.0.2 What will I learn in this module? Start Module 10, Section 1 - Endpoint Security Read: 10.1.1 Network Attacks Today Read: 10.1.2 Network Security Devices Read: 10.1.3 Endpoint Protection Read: 10.1.4 Cisco Email Security Appliance Read: 10.1.5 Cisco Web Security Appliance Activity: 10.1.6 Check Your Understanding - Endpoint Security Assignment: Module 10 Study Guide 1-10 |
A+ | Review Video: Jason Johnson: ITE Chapter 12 v7.0 (25:14) Test: Chapter 12 Start Chapter 13 - Security Read: 13.0.1.1 Intro Read: 13.1.1.1 Malware Activity: 13.1.1.2 What Do You Already Know? - Malware Read: 13.1.1.3 Viruses and Trojan Horses Activity: 13.1.1.4 Types of Malware Activity: 13.1.1.5 Check Your Understanding - Malware |
|
BPA | BPA Prep | |
11/04/24 | CCNA2 |
Start Module 10, Section 2 - Access Control Read: 10.2.1 Authentication with a Local Password Read: 10.2.2 AAA Components Read: 10.2.3 Authentication Read: 10.2.4 Authorization Read: 10.2.5 Accounting Read: 10.2.6 802.1X Activity: 10.2.7 Check Your Understanding - Access Control Assignment: Module 10 question 11-20 |
A+ | Read: 13.1.2.1 Anti-Malware Programs Read: 13.1.2.2 Signature File Updates Video Explanation: 13.1.2.3 Protecting Against Malware Read: 13.1.2.4 Remediating Infected Systems Video Explanation: 13.1.2.5 Remediating an Infected System Lab: 13.1.2.6 Operating System Security (Use lab computers) |
|
11/06/24 | CCNA2 | Student Photos 12:45 Start Module 10, Section 3 - Layer 2 Security Threats Read: 10.3.1 Layer 2 Vulnerabilities Read: 10.3.2 Switch Attack Categories Read: 10.3.3 Switch Attack Mitigation Techniques Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats Start Module 10, Section 4 - MAC Address Table Attack Read: 10.4.1 Switch Operation Review Read: 10.4.2 MAC Address Table Flooding Read: 10.4.3 MAC Address Table Attack Mitigation Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks Module 10 question 21-30 |
A+ | Activity: 13.1.2.7 Check Your Understanding - Preventing Malware Activity: 13.1.3.1 Networks Are Targets Activity: 13.1.3.2 Types of TCP/IP Attacks Activity: 13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack Read: 13.1.3.4 Zero-Day Read: 13.1.3.5 Protecting Against Network Attacks Read: 13.1.4.1 Social Engineering Activity: 13.1.4.2 What Do You Already Know? - Social Engineering Techniques Activity: 13.1.4.3 Social Engineering Techniques Read: 13.1.4.4 Protecting Against Social Engineering Video: LearnKey: Domain 2: 2.1.1 Physical Security pg.71 |
|
BPA | Work on preparing for contests! Especially judged events! | |
11/07/24 | CCNA2 | Start Module 10, Section 5 - LAN Attacks Demonstration Video: 10.5.1 VLAN and DHCP Attacks (5:41) Read: 10.5.2 VLAN Hopping Attacks Read: 10.5.3 VLAN Double-Tagging Attack Read: 10.5.4 DHCP Messages Read: 10.5.5 DHCP Attacks Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance Read: 10.5.7 ARP Attacks Read: 10.5.8 Address Spoofing Attack Read: 10.5.9 STP Attack Read: 10.5.10 CDP Reconnaissance Activity: 10.5.11 Check Your Understanding - LAN Attacks Assignment: Module 10 question 31-53 (finish) |
A+ | Video: LearnKey: Domain 2: 2.1.1 Physical Security for staff pg.72 Activity: 13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering Techniques Read: 13.2.1.1 What is a Security Policy Read: 13.2.1.2 Security Policy Category Read: 13.2.1.3 Securing Devices and Data Read: 13.2.2.1 Physical Security Read: 13.2.2.2 Types of Secure Locks Read: 13.2.2.3 Mantraps Read: 13.2.2.4 Securing Computers and Network Hardware Activity: 13.2.2.5 Check Your Understanding - Locking Mechanism Read: 13.2.3.1 Data - Your Greatest Asset Read: 13.2.3.2 Data Backups Read: 13.2.3.3 File and Folder Permissions Read: 13.2.3.4 File and Folder Encryption Read: 13.2.3.5 Windows BitLocker and BitLocker To Go Video Demonstration: 13.2.3.6 Bitlocker and Bitlocker To Go Lab: 13.2.3.7 Bitlocker and Bitlocker To Go |
|
11/11/24 | CCNA2 | Start Module 10, Section 6 - Module Practice and Quiz Read: 10.6.1 What did I learn in this module? Activity: 10.6.2 Module Quiz - LAN Security Concepts Review: Module 10 PowerPoint Video Review: Jason Johnson: Module 10 LAN Security (26:27) Test: Module 10 (12:00) |
A+ | Video: What is HIPAA? Video: Techquickie: What is a Privacy Screen? (5:47) Read: 13.2.4.1 Data Wiping Magnetic Media Read: 13.2.4.2 Data Wiping Other Media Read: 13.2.4.3 Hard Drive Recycling and Destruction Activity: 13.2.4.4 Check Your Understanding - Data Protection Read: 13.3.1.1 Securing a Computer Read: 13.3.1.2 Securing BIOS Read: 13.3.1.3 Securing Windows Login Read: 13.3.1.4 Local Password Management Read: 13.3.1.5 Usernames and Passwords Lab: 13.3.1.6 Operating System Login Activity: 13.3.1.7 Check your Understanding - Secure a Workstation Read: 13.3.2.1 The Windows Local Security Policy Read: 13.3.2.2 Account Policies Security Settings Read: 13.3.2.3 Local Policies Security Settings Read: 13.3.2.4 Exporting the Local Security Policy Lab: 13.3.2.5 Configure Windows Local Security Policy Activity: 13.3.2.6 Check Your Understanding- Local Security Policy |