CCNA3 ENSA Module 3 - Network Security Concepts

Date Subject Lesson Plan
03/20/24 CCNA3 v7

Install Kali Linux in VirtualBox. Virtual machine is located CNA drive, CCNA3, Chapter 3.
Video: How To Install Kali Linux in VirtualBox (2022) | Kali Linux 2022.1 (6:19)

Kali Linux image located in the CNA-CCNA3-Module 3 folder. Download image to your local machine - Do Not Install Over Network

Choose Dabian 64 bit for the operating system.

LearnKey: 200-301 Domain 5 - Security Fundamentals

Link: Module 3 Study Guide

Start Module 3, Section 0 - Introduction

Discussion: 3.0.1 Why should I take this module?

Discussion: 3.0.2 What will I learn in this module?

Discussion: 3.0.3 Ethical Hacking Statement

Start Module 3, Section 1 - Current State of Cybersecurity

Discussion: 3.1.1 Current State of Affairs

Discussion: 3.1.2 Vectors of Network Attacks

Discussion: 3.1.3 Data Loss

Activity: 3.1.4 Check Your Understanding - Current State of Cybersecurity

Discussion: 3.2.1 The Hacker
Video: What are the 7 types of Hackers (7:33)

Discussion: 3.2.2 Evolution of Hackers
Link: Bug Bounty

Discussion: 3.2.3 Cyber Criminals

Discussion: 3.2.4 Hacktivists
Video: Anonymous launches 'cyber war' against Russia (3:07)

Discussion: 3.2.5 State-Sponsored Hackers
Video: Life Inside North Korea’s Hacker Army (13:20)

Activity: 3.2.6 Check Your Understanding - Threat Actors

Assignment: Module 3 Study Guide 1-9

03/21/24 CCNA3 v7

Start Module 3, Section 3 - Threat Actor Tools

Video: 3.3.1 Threat Actor Tools

Discussion: 3.3.2 Introduction to Attack Tools
Link: Top 10 Hacking Tools in Kali Linux You Must Know (7:31)

Lab: Install Nmap for Windows CNA drive, CCNA3, Chapter 3. Watch video.
Video: Network Chuck: Nmap Tutorial to find Network Vulnerabilities (17:08)
Note: Enter commands in the Command text box at the top of the Zenmap application window.

Discussion: 3.3.3 Evolution of Security Tools

Discussion: 3.3.4 Attack Types

Activity: 3.3.5 Check Your Understanding - Threat Actor Tools

Start Module 3, Section 4 - Malware

Discussion: 3.4.1 Overview of Malware
Video: NetworkChuck: i created malware with Python (it's SCARY easy!!) (25:18)

Discussion: 3.4.2 Viruses and Trojan Horses
Video: Kaspersky: Malware: Difference Between Computer Viruses, Worms and Trojans (2:45)

Discussion: 3.4.3 Other Types of Malware

Activity: 3.4.4 Check Your Understanding - Malware

Video: Best Ethical Hacking Tools | Tools For Penetration Testing 2023 (6:03)

Assignment: Module 3 Study Guide 10-16

  A+ Practice Exam
04/02/24 CCNA3 v7

Video: YouTube: How I passed the CCNA Exam in 6 weeks (15:58)

Start Module 3, Section 5 - Overview of Network Attacks

Discussion: 3.5.1 Overview of Network Attacks

Video: 3.5.2 Reconnaissance Attacks

Discussion: 3.5.3 Reconnaissance Attacks

Video: Computer Everywhere: How to Find and Close Listening Ports Win10 (5:13)

Video: 3.5.4 Access and Social Engineering Attacks

Discussion: 3.5.5 Access Attacks

Discussion: 3.5.6 Social Engineering Attacks

Lab: 3.5.7 Social Engineering (60 minutes)

Video: 3.5.8 Denial of Service Attacks (2:02)

Discussion: 3.5.9 DoS and DDoS Attacks

Activity: 3.5.10 Check Your Understanding - Common Network Attacks

Start Module 3, Section 6 - IP Vulnerabilities and Threats

Video: 3.6.1 Common IP and ICMP Attacks (4:32)

Discussion: 3.6.2 IPv4 and IPv6

Discussion: 3.6.3 ICMP Attacks

Video: 3.6.4 Amplification, Reflection, and Spoofing Attacks (3:29)

Discussion: 3.6.5 Amplification and Reflection Attacks

Discussion: 3.6.6 Address Spoofing Attacks

Activity: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats

Assignment: Module 3 Study Guide 17-37

  A+ Prep

Test Prep 220-1102

LearnKey: Domain 1: Lesson 15 pgs. 62-63
LearnKey: Domain 1: Lesson 16 pgs. 65-66
LearnKey: Domain 1: Lesson 17 pgs. 68-69

04/03/24 CCNA3 v7

https://cyberskyline.com/events/ncl

Video: YouTube: Top Tips to Conquer Life

Start Module 3, Section 7 - TCP and UDP Vulnerabilities

Read: 3.7.1 TCP Segment Header

Read: 3.7.2 TCP Services

Read: 3.7.3 TCP Attacks

Read: UDP Segment Header and Operation

Read: 3.7.5 UDP Attacks

Activity: 3.7.6 Check Your Understanding - TCP and UDP Vulnerabilities

Start Module 3, Section 8 - IP Services

Read: 3.8.1 ARP Vulnerabilities

Read: 3.8.2 ARP Cache Poisoning
Video: Professor Messer: ARP Cashe Poisoning (8:08)

Video: 3.8.3 ARP Spoofing
Video: Professor Messer: Spoofing (3:26)

Read: 3.8.4 DNS Attacks
Video: Professor Messer: DNS Attacks (8:18)

Read: 3.8.5 DNS Tunneling
Video: DNS Tunneling (9:00)

Read: 3.8.6 DHCP

Read: 3.8.7 DHCP Attacks
Video: DHCP Starvation Attacks (8:35)

Lab: 3.8.8 Explore DNS Traffic (60 minutes)

Assignment: Module 3 Study Guide 38-56

  A+ Prep

Link: CompTIA Online Testing ID Requirements

Test Prep 220-1102

04/04/24 CCNA3 v7

Test: Certiport Cybersecurity Certification exam

Start Module 3, Section 8 - Network Security Best Practices

Read: 3.9.1 Confidentiality, Integrity, and Availability

Read: 3.9.2 The Defense-in-Depth Approach

Read: 3.9.3 Firewalls

Read: 3.9.4 IPS

Read: 3.9.5 Content Security Appliances

Activity: 3.9.6 Check Your Understanding - Network Security Best Practices

Start Module 3, Section 10 - Cryptography

Video: 3.10.1 Cryptography (4:28)

Read: 3.10.2 Securing Communications

Read: 3.10.3 Data Integrity
Video: What is Cryptography? (17:56)

Read: 3.10.4 Hash Functions

Read: 3.10.5 Origin Authentication

Read: 3.10.6 Data Confidentiality

Read: 3.10.7 Symmetric Encryption

Read: 3.10.8 Asymmetric Encryption
Video: Professor Messer: Symmetric and Asymmetric Encryption (6:07)

Read: 3.10.9 Diffie-Hellman
Video: Diffie-Hellman Key Exchange (6:55)

Activity: 3.10.10 Check Your Understanding - Cryptography

Start Module 3, Section 11 - Module Practice and Quiz

Read: 3.11.2 What did I learn in this module?

Activity: 3.11.3 Module Quiz - Network Security Concepts

Assignment: Module 3 Study Guide 57-77 (end)

Study for Module 3 Test tomorrow

  A+ Prep

Test Prep 220-1002

Video: Network Chuck: 40 Windows Commands You Need To Know (10:54)

04/05/24 CCNA3 v7

PT 3.11.1 Network Security Exploration

Video: NetITGeeks: CCNA3 Module 3: Network Security Concepts (3:21:12)

Review PowerPoint: Module 3

Test: Module 3

Start Module 4 - ACL Concepts