Date | Subject | Lesson Plan |
---|---|---|
01/3/22 | CCNA2 | Start Module 11 - Switch Security Configuration CCNA2v7 Module 11 Reading Organizer Start Module 11 - Switch Security Configuration Read: 11.0.1 Why should I take this module? Read: 11.0.2 What will I learn in this module? Start Module 11, Section 1 - Implement Port Security Read: 11.1.1 Secure Unused Ports Read: 11.0.2 Mitigate MAC Address Table Attacks Read: 11.1.3 Enable Port Security Read: 11.1.4 Limit and Learn MAC Addresses Read: 11.1.5 Port Security Aging Read: 11.1.6 Port Security Violation Modes Read: 11.1.7 Ports in error-disabled State Read: 11.1.8 Verify Port Security Syntax Checker: 11.1.9 Implement Port Security PT: 11.1.10 Implement Port Security Assignment: Module 11 Study Guide 1-19 |
A+ | Read: 13.2.1.1 What is a Security Policy Read: 13.2.1.2 Security Policy Category Read: 13.2.1.3 Securing Devices and Data Read: 13.2.2.1 Physical Security Read: 13.2.2.2 Types of Secure Locks Read: 13.2.2.3 Mantraps Read: 13.2.2.4 Securing Computers and Network Hardware Activity: 13.2.2.5 Check Your Understanding - Locking Mechanisms |
|
01/04/22 | Start Module 11, Section 2 - Mitigate VLAN Attacks Read: 11.2.1 VLAN Attacks Review Read: 11.2.2 Steps to Mitigate VLAN Hopping Attacks Syntax Checker: 11.2.3 Mitigate VLAN Hopping Attacks Start Module 11, Section 3 - Mitigate DHCP Attacks Read: 11.3.1 DHCP Attack Review Read: 11.3.2 DHCP Snooping Read: 11.3.3 Steps to Implement DHCP Snooping Read: 11.3.4 DHCP Snooping Configuration Example Syntax Checker: 11.3.5 Mitigate DHCP Attacks Assignment: Module 11 Study Guide 20-26 |
|
A+ | Read: 13.2.3.1 Data - Your Greatest Asset Read: 13.2.3.2 Data Backups Read: 13.2.3.3 File and Folder Permissions Read: 13.2.3.4 File and Folder Encryption Read: 13.2.3.5 Windows BitLocker and BitLocker To Go Video Demonstration: 13.2.3.6 Bitlocker and Bitlocker To Go Lab: 13.2.3.7 Bitlocker and Bitlocker To Go Read: 13.2.4.1 Data Wiping Magnetic Media Read: 13.2.4.2 Data Wiping Other Media Read: 13.2.4.3 Hard Drive Recycling and Destruction Activity: 13.2.4.4 Check Your Understanding - Data Protection |
|
01/05/22 | CCNA2 | Start Module 11, Section 4 - Mitigate ARP Attacks Read: 11.4.1 Dynamic ARP Inspection Read: 11.4.2 DAI Implementation Guidelines Read: 11.4.3 DAI Configuration Example Syntax Checker: 11.4.4 Mitigate ARP Attacks Start Module 11, Section 5 - Mitigate STP Attacks Read: 11.5.1 PortFast and BPDU Guard Read: 11.5.2 Configure PortFast Read: 11.5.3 Configure BPDU Guard Syntax Checker: 11.5.4 Mitigate STP Attacks Assignment: Module 11 Study Guide 27-37 (end) |
A+ | Read: 13.3.1.1 Securing a Computer Read: 13.3.1.2 Securing BIOS Read: 13.3.1.3 Securing Windows Login Read: 13.3.1.4 Local Password Management Read: 13.3.1.5 Usernames and Passwords Activity: 13.3.1.6 Check your Understanding - Secure a Workstation |
|
01/06/22 | CCNA2 | Start Module 11, Section 6 - Module Practice and Quiz PT: 11.6.1 Switch Security Configuration Lab: 11.6.2 Switch Security Configuration Read: 11.6.3 What did I learn in this module? Activity: 11.6.4 Module Quiz - Switch Security Configuration |
A+ | Read: 13.3.2.1 The Windows Local Security Policy Read: 13.3.2.2 Account Policies Security Settings Read: 13.3.2.3 Local Policies Security Settings Read: 13.3.2.4 Exporting the Local Security Policy Lab: 13.3.2.5 Configure Windows Local Security Policy Activity: 13.3.2.6 Check Your Understanding- Local Security Policy |
|
01/07/22 | CCNA2 | Review: Module 11 Test: Module 11 |
A+ | Read: 13.3.3.1 Maintaining Accounts Read: 13.3.3.2 Managing Users Account Tools and User Account Tasks Read: 13.3.3.3 Local Users and Groups Manager Read: 13.3.3.4 Managing Groups Read: 13.3.3.5 Active Directory Users and Computers Lab: 13.3.3.6 Configure Users and Groups in Windows Activity: 13.3.3.7 Check Your Understanding - User Account Tools and User Account Tasks |