Date | Subject | Lesson Plan |
---|---|---|
11/12/24 | CCNA2 | CCNA2v7 Module 11 Reading Organizer Start Module 11 - Switch Security Configuration Read: 11.0.1 Why should I take this module? Read: 11.0.2 What will I learn in this module? Start Module 11, Section 1 - Implement Port Security Read: 11.1.1 Secure Unused Ports Read: 11.0.2 Mitigate MAC Address Table Attacks Read: 11.1.3 Enable Port Security Read: 11.1.4 Limit and Learn MAC Addresses Read: 11.1.5 Port Security Aging Read: 11.1.6 Port Security Violation Modes Read: 11.1.7 Ports in error-disabled State Read: 11.1.8 Verify Port Security Syntax Checker: 11.1.9 Implement Port Security PT: 11.1.10 Implement Port Security (20 minutes) Assignment: Module 11 Study Guide 1-19 |
A+ | Read: 13.3.3.1 Maintaining Accounts Read: 13.3.3.2 Managing Users Account Tools and User Account Tasks Read: 13.3.3.3 Local Users and Groups Manager Read: 13.3.3.4 Managing Groups Read: 13.3.3.5 Active Directory Users and Computers Lab: 13.3.3.6 Configure Users and Groups in Windows (30 min) Activity: 13.3.3.7 Check Your Understanding - User Account Tools and User Account Tasks |
|
BPA | Prepare for Contests | |
11/14/24 |
Start Module 11, Section 2 - Mitigate VLAN Attacks Read: 11.2.1 VLAN Attacks Review Read: 11.2.2 Steps to Mitigate VLAN Hopping Attacks Syntax Checker: 11.2.3 Mitigate VLAN Hopping Attacks Start Module 11, Section 3 - Mitigate DHCP Attacks Read: 11.3.2 DHCP Snooping Read: 11.3.3 Steps to Implement DHCP Snooping Link: Cisco.com DHCP Snooping Read: 11.3.4 DHCP Snooping Configuration Example Syntax Checker: 11.3.5 Mitigate DHCP Attacks Assignment: Module 11 Study Guide 20-26 |
|
A+ | LearnKey: Domain 2, 2.1.3 workbook pg. 74 Read: 13.3.4.1 Firewalls Read: 13.3.4.2 DMZ Server Read: 13.3.4.3 Typical SOHO Router Firewall Settings Read: 13.3.4.4 Software Firewalls Read: 13.3.4.5 Windows Firewall Read: 13.3.4.6 Configuring Exceptions in Windows Firewall Read: 13.3.4.7 Windows Firewall with Advanced Security Lab: 13.3.4.8 Configure Windows Firewall (30 min) Activity: 13.3.4.9 Check your Understanding - Windows Firewall |
|
BPA | Prepare for Contests | |
11/15/24 | CCNA2 | Video: Capture the Flag Contest Start Module 11, Section 4 - Mitigate ARP Attacks Read: 11.4.1 Dynamic ARP Inspection Read: 11.4.2 DAI Implementation Guidelines Read: 11.4.3 DAI Configuration Example Syntax Checker: 11.4.4 Mitigate ARP Attacks Start Module 11, Section 5 - Mitigate STP Attacks Read: 11.5.1 PortFast and BPDU Guard Read: 11.5.2 Configure PortFast Read: 11.5.3 Configure BPDU Guard Syntax Checker: 11.5.4 Mitigate STP Attacks Assignment: Module 11 Study Guide 27-37 (end) |
A+ | LearnKey: Domain 2: Pages 78-84 Read: 13.3.5.1 Web Security Read: 13.3.5.2 InPrivate Browsing Read: 13.3.5.3 Pop-up Blocker Read: 13.3.5.4 SmartScreen Filter Read: 13.3.5.5 ActiveX Filtering Activity: 13.3.5.6 Check Your Understanding – Web Security Read: 13.3.6.1 Restrictive Settings Read: 13.3.6.2 Disable Auto-Play Read: 13.3.6.3 Operating System Service Packs and Security Patches Activity: 13.3.6.4 Check your Understanding - Security Maintenance |
|
BPA | Prepare for Contests | |
11/18/24 | CCNA2 | Ohio Pin Design Contest: Vote for Pin Ohio T-Shirt Design Contest: Vote for T-Shirt Activity: Capture the Flag (2:00) Link: Online Tools for Capture the Flag Contest Link: Capture the Flag Contest |
A+ | None today |
|
BPA | Prepare for Contests | |
11/19/24 | CCNA2 | Start Module 11, Section 6 - Module Practice and Quiz PT: 11.6.1 Switch Security Configuration |
A+ | Read: 13.4.1.1 What Do You Already Know? - Wireless Security Read: 13.4.1.2 Common Communication Encryption Types Read: 13.4.1.3 Wi-Fi Configuration Best Practices Read: 13.4.1.4 Authentication Methods Read: 13.4.1.5 Wireless Security Modes Read: 13.4.1.6 Firmware Updates Read: 13.4.1.7 Firewalls Read: 13.4.1.8 Port Forwarding and Port Triggering Read: 13.4.1.9 Universal Plug and Play PT: 13.4.1.10 Configure Wireless Security |
|
BPA | Work on judged events | |
11/20/24 | CCNA2 | Lab: 11.6.2 Switch Security Configuration (2:00) Read: 11.6.3 What did I learn in this module? Activity: 11.6.4 Module Quiz - Switch Security Configuration Review: Module 11 Video Review: Module 11 Switch Security (18:43) Test: Module 11 |
A+ | Read: 13.5.1.1 The Six Steps to the Troubleshooting Process Read: 13.5.1.2 Identify the Problem Read: 13.5.1.3 Establish a Theory of Probable Cause Read: 13.5.1.4 Test the Theory to Determine Cause Read: 13.5.1.5 Establish a Plan of Action to Resolve the Problem and Implement the Solution Read: 13.5.1.6 Verify Full System Functionality and, If Applicable Implement Preventive Measures Read: 13.5.1.7 Document Findings, Actions, and Outcomes Activity: 13.5.2.1 Common Problems and Solutions for Security Lab: 13.5.2.2 Document Customer Information in a Work Order Read: 13.6.1.1 Summary Study: Chapter 13 Test |
|