| Date | Subject | Lesson Plan |
|---|---|---|
| 11//21/25 | CCNA2 | https://docs.google.com/presentation/d/14vaGxTspgUR0RbD6ZxwA2ezQT2kjzy-3oUtNScvdZSI/edit?usp=sharing https://forms.gle/jcz4LqgDyo4xTJat7
CCNA2v7 Module 10 Reading Organizer Start Module 10 - LAN Security Concepts Read: 10.0.1 Why should I take this module? Read: 10.0.2 What will I learn in this module? Start Module 10, Section 1 - Endpoint Security Read: 10.1.1 Network Attacks Today Read: 10.1.2 Network Security Devices Read: 10.1.3 Endpoint Protection Read: 10.1.4 Cisco Email Security Appliance Read: 10.1.5 Cisco Web Security Appliance Activity: 10.1.6 Check Your Understanding - Endpoint Security Assignment: Module 10 Study Guide 1-10 |
| A+ | Read: 12.3.1.1 Introduction to Linux and Mac OS Operating Systems Video: Professor Messer: Linux Features (3:57) Read: 12.3.1.2 Overview of the Linux GUI Video: Professor Messer: macOS Features (8:05) Read: 12.3.1.3 Overview macOS GUI Read: 12.3.1.4 Overview of Linux and macOS CLI Read: 12.3.1.5 Linux and macOS Terminal Emulators Read: 12.3.1.6 Linux Backup and Recovery Read: 12.3.1.7 macOS Backup and Recovery Read: 12.3.1.8 Overview of Disk Utilities Activity: 12.3.1.9 Check your Understanding - Linux and macOS Operating Systems Video: Professor Messer: MacOS Features (8:05) Read: 12.3.2.1 Scheduled Tasks Read: 12.3.2.2 Operating System Updates Read: 12.3.2.3 Security Activity: 12.3.2.4 Check Your Understanding - Linux and macOS Best Practices Syntax Checker: 12.3.3.1 File and Directory Commands Activity: 12.3.3.2 Check Your Understanding - File and Directory Commands Video: The Great History of UNIX (2:30) Video: What is Linux? (5:42) Read: 12.3.3.3 The ls -l command output Read: 12.3.3.4 Basic Unix File and Directory Permissions Syntax Checker: 12.3.3.5 File and Directory Permissions Activity: 12.3.3.6 Check Your Understanding - File and Directory Permissions |
|
| BPA | BPA Prep | |
| 11/24/25 | CCNA2 | Start Module 10, Section 2 - Access Control Read: 10.2.1 Authentication with a Local Password Read: 10.2.2 AAA Components Read: 10.2.3 Authentication Read: 10.2.4 Authorization Read: 10.2.5 Accounting Read: 10.2.6 802.1X Activity: 10.2.7 Check Your Understanding - Access Control Start Module 10, Section 3 - Layer 2 Security Threats Read: 10.3.1 Layer 2 Vulnerabilities Read: 10.3.2 Switch Attack Categories Read: 10.3.3 Switch Attack Mitigation Techniques Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats Start Module 10, Section 4 - MAC Address Table Attack Read: 10.4.1 Switch Operation Review Read: 10.4.2 MAC Address Table Flooding Read: 10.4.3 MAC Address Table Attack Mitigation Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks Assignment: Module 10 question 11-30 |
| A+ | Video: Professor Messer: Linux Commands (28:43) Read: 12.3.3.7 Linux Administrative Commands Read: 12.3.3.8 Linux Administrative Commands Requireing Root Access Activity: 12.3.3.9 Check Your Understanding - Administrative Commands Syntax Checker: 12.3.3.10 File Ownership and Permission Read: 12.4.1.1 The Six Steps of the Troubleshooting Process Read: 12.4.1.2 Identify the Problem Read: 12.4.1.3 Establish a theory of Probable Cause Read: 12.4.1.4 Test the Theory to Determine the Cause Read: 12.4.1.5 Establish a Plan of Action Read: 12.4.1.6 Verify Full System Functionality Read: 12.4.1.7 Document the Findings Read: 12.4.2.1 Common Problems and Solutions for Mobile Operating Systems Read: 12.4.2.2 Common Problems and Solutions for Mobile OS Security Read: 12.4.2.3 Common Problems and Solutions for Linux and macOS Lab: 12.4.2.4 Troubleshoot Mobile Devices Read: 12.5.1.1 Review Chapter 12 Study: Chapter 12 Test |
|
| 11/25/25 | CCNA2 | Start Module 10, Section 5 - LAN Attacks Demonstration Video: 10.5.1 VLAN and DHCP Attacks (5:41) Read: 10.5.2 VLAN Hopping Attacks Read: 10.5.3 VLAN Double-Tagging Attack Read: 10.5.4 DHCP Messages Read: 10.5.5 DHCP Attacks Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance Read: 10.5.7 ARP Attacks Read: 10.5.8 Address Spoofing Attack Read: 10.5.9 STP Attack Read: 10.5.10 CDP Reconnaissance Activity: 10.5.11 Check Your Understanding - LAN Attacks Assignment: Module 10 question 31-53 (finish) https://greatercle.zoom.us/meeting/register/By1yJsQGQQSYejmYC8xqDg |
| A+ | Review Video: Jason Johnson: ITE Chapter 12 v7.0 (25:14) Test: Chapter 12 Start Chapter 13 - Security Read: 13.0.1.1 Intro Read: 13.1.1.1 Malware Activity: 13.1.1.2 What Do You Already Know? - Malware Read: 13.1.1.3 Viruses and Trojan Horses Activity: 13.1.1.4 Types of Malware Activity: 13.1.1.5 Check Your Understanding - Malware Read: 13.1.2.1 Anti-Malware Programs Read: 13.1.2.2 Signature File Updates Video Explanation: 13.1.2.3 Protecting Against Malware Read: 13.1.2.4 Remediating Infected Systems Video Explanation: 13.1.2.5 Remediating an Infected System Lab: 13.1.2.6 Operating System Security (Use lab computers) Activity: 13.1.2.7 Check Your Understanding - Preventing Malware Activity: 13.1.3.1 Networks Are Targets Activity: 13.1.3.2 Types of TCP/IP Attacks Activity: 13.1.3.3 Check Your Understanding – Identify the TCP/IP Attack Read: 13.1.3.4 Zero-Day Read: 13.1.3.5 Protecting Against Network Attacks Read: 13.1.4.1 Social Engineering Activity: 13.1.4.2 What Do You Already Know? - Social Engineering Techniques Activity: 13.1.4.3 Social Engineering Techniques Read: 13.1.4.4 Protecting Against Social Engineering Video: LearnKey: Domain 2: 2.1.1 Physical Security pg.71 |
|
| BPA | Work on preparing for contests! Especially judged events! | |
| 01/05/26 | CCNA2 |
|
| A+ | Video: LearnKey: Domain 2: 2.1.1 Physical Security for staff pg.72 Activity: 13.1.4.5 Check Your Understanding - Personal and Corporate Social Engineering Techniques Read: 13.2.1.1 What is a Security Policy Read: 13.2.1.2 Security Policy Category Read: 13.2.1.3 Securing Devices and Data Read: 13.2.2.1 Physical Security Read: 13.2.2.2 Types of Secure Locks Read: 13.2.2.3 Mantraps Read: 13.2.2.4 Securing Computers and Network Hardware Activity: 13.2.2.5 Check Your Understanding - Locking Mechanism Read: 13.2.3.1 Data - Your Greatest Asset Read: 13.2.3.2 Data Backups Read: 13.2.3.3 File and Folder Permissions Read: 13.2.3.4 File and Folder Encryption Read: 13.2.3.5 Windows BitLocker and BitLocker To Go Video Demonstration: 13.2.3.6 Bitlocker and Bitlocker To Go Lab: 13.2.3.7 Bitlocker and Bitlocker To Go |
|
| 01/06/26 | CCNA2 | Start Module 10, Section 6 - Module Practice and Quiz Read: 10.6.1 What did I learn in this module? Activity: 10.6.2 Module Quiz - LAN Security Concepts Review: Module 10 PowerPoint Video Review: Jason Johnson: Module 10 LAN Security (26:27) Test: Module 10 (12:00) |
| A+ | Video: What is HIPAA? Video: Techquickie: What is a Privacy Screen? (5:47) Read: 13.2.4.1 Data Wiping Magnetic Media Read: 13.2.4.2 Data Wiping Other Media Read: 13.2.4.3 Hard Drive Recycling and Destruction Activity: 13.2.4.4 Check Your Understanding - Data Protection Read: 13.3.1.1 Securing a Computer Read: 13.3.1.2 Securing BIOS Read: 13.3.1.3 Securing Windows Login Read: 13.3.1.4 Local Password Management Read: 13.3.1.5 Usernames and Passwords Lab: 13.3.1.6 Operating System Login Activity: 13.3.1.7 Check your Understanding - Secure a Workstation Read: 13.3.2.1 The Windows Local Security Policy Read: 13.3.2.2 Account Policies Security Settings Read: 13.3.2.3 Local Policies Security Settings Read: 13.3.2.4 Exporting the Local Security Policy Lab: 13.3.2.5 Configure Windows Local Security Policy Activity: 13.3.2.6 Check Your Understanding- Local Security Policy |