CCNA2 SRWE Module 10 - LAN Security Concepts

Date Subject Lesson Plan
11/16/21 CCNA2

CCNA2v7 Module 10 Reading Organizer

Start Module 10 - LAN Security Concepts

Read: 10.0.1 Why should I take this module?

Read: 10.0.2 What will I learn in this module?

Start Module 10, Section 1 - Endpoint Security

Read: 10.1.1 Network Attacks Today

Read: 10.1.2 Network Security Devices
Video: Network Security Devices (6:51)

Read: 10.1.3 Endpoint Protection
Video: Professor Messer: Endpoint Protection (9:48)

Read: 10.1.4 Cisco Email Security Appliance
Video: Cisco Email Security (17:21)

Read: 10.1.5 Cisco Web Security Appliance
Video: Cisco Web Security (5:02)

Activity: 10.1.6 Check Your Understanding - Endpoint Security

Assignment: Module 10 Study Guide 1-10

  A+

Video: What is Linux? (5:42)

Read: 12.3.3.3 The ls -l command output

Read: 12.3.3.4 Basic Unix File and Directory Permissions

Syntax Checker: 12.3.3.5 File and Directory Permissions

Activity: 12.3.3.6 Check Your Understanding - File and Directory Permissions

Read: 12.3.3.7 Linux Administrative Commands

Read: 12.3.3.8 Linux Administrative Commands Requireing Root Access

Activity: 12.3.3.9 Check Your Understanding - Administrative Commands

Syntax Checker: 12.3.3.10 File Ownership and Permission

11/17/21 CCNA2

Start Module 10, Section 2 - Access Control

Read: 10.2.1 Authentication with a Local Password

Read: 10.2.2 AAA Components

Read: 10.2.3 Authentication

Read: 10.2.4 Authorization

Read: 10.2.5 Accounting

Read: 10.2.6 802.1X

Activity: 10.2.7 Check Your Understanding - Access Control

Assignment: Module 10 question 11-20

  A+

Read: 12.4.1.1 The Six Steps of the Troubleshooting Process

Read: 12.4.1.2 Identify the Problem

Read: 12.4.1.3 Establish a theory of Probable Cause

Read: 12.4.1.4 Test the Theory to Determine the Cause

Read: 12.4.1.5 Establish a Plan of Action

Read: 12.4.1.6 Verify Full System Functionality

Read: 12.4.1.7 Document the Findings

Read: 12.4.2.1 Common Problems and Solutions for Mobile Operating Systems

Read: 12.4.2.2 Common Problems and Solutions for Mobile OS Security

Read: 12.4.2.3 Common Problems and Solutions for Linux and macOS

Lab: 12.4.2.4 Troubleshoot Mobile Devices

11/18/21 CCNA2

Start Module 10, Section 3 - Layer 2 Security Threats

Read: 10.3.1 Layer 2 Vulnerabilities

Read: 10.3.2 Switch Attack Categories

Read: 10.3.3 Switch Attack Mitigation Techniques

Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats

Module 10 question 21-24

  A+

Read: 12.5.1.1 Review Chapter 12

Review: Chapter 12 PowerPoint

Study: Chapter 12 Test

11/19/21 CCNA2

Start Module 10, Section 4 - MAC Address Table Attack

Read: 10.4.1 Switch Operation Review

Read: 10.4.2 MAC Address Table Flooding

Read: 10.4.3 MAC Address Table Attack Mitigation

Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks

Module 10 Study Guide question 25-30

  A+

Test: Chapter 12

Start Chapter 13 - Security

Read: 13.0.1.1 Intro

Read: 13.1.1.1 Malware

Activity: 13.1.1.2 What Do You Already Know? - Malware

Read: 13.1.1.3 Viruses and Trojan Horses

Read: 13.1.1.4 Types of Malware

Activity: 13.1.1.5 Check Your Understanding - Malware

11/22/21 CCNA2

Start Module 10, Section 5 - LAN Attacks

Demonstration Video: 10.5.1 VLAN and DHCP Attacks

Read: 10.5.2 VLAN Hopping Attacks
Video: Professor Messer: VLAN Hopping (5:41)

Read: 10.5.3 VLAN Double-Tagging Attack

Read: 10.5.4 DHCP Messages

Read: 10.5.5 DHCP Attacks
Video: Kevin Wallace: DHCP Attacks and Defense Strategies (19:19)

Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance

Read: 10.5.7 ARP Attacks
Video: Kevin Wallace: ARP Poisoning and Defense Strategies (20:05)

Read: 10.5.8 Address Spoofing Attack

Read: 10.5.9 STP Attack

Read: 10.5.10 CDP Reconnaissance
Video: Kevin Wallace: Mapping a Network with CDP or LLDP (6:10)

Activity: 10.5.11 Check Your Understanding - LAN Attacks

Module 10 question 31-53 (finish)

  A+

Read: 13.1.2.1 Anti-Malware Programs

Read: 13.1.2.2 Signature File Updates

Video Explanation: 13.1.2.3 Protecting Against Malware

Read: 13.1.2.4 Remediating Infected Systems

Video Explanation: 13.1.2.5 Remediating an Infected System

Activity: 13.1.2.6 Check Your Understanding - Preventing Malware

Read: 13.1.3.1 Networks Are Targets

11/23/21 CCNA2

Start Module 10, Section 6 - Module Practice and Quiz

Read: 10.6.1 What did I learn in this module?

Activity: 10.6.2 Module Quiz - LAN Security Concepts

Review: Module 10 PowerPoint

Test: Module 10 (12:00)

  A+

Read: 13.1.3.2 Types of TCP/IP Attacks

Activity: 13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack

Read: 13.1.3.4 Zero-Day

Read: 13.1.3.5 Protecting Against Network Attacks

Read: 13.1.4.1 Social Engineering

Activity: 13.1.4.2 What Do You Already Know? - Social Engineering Techniques

Read: 13.1.4.3 Social Engineering Techniques

Read: 13.1.4.4 Protecting Against Social Engineering

Activity: 13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering Techniques