CCNA3 ENSA Module 3 - Network Security Concepts

Date Subject Lesson Plan
03/23/22 CCNA3 v7

LearnKey: 200-301 Domain 5 - Security Fundamentals

Link: Module 3 Study Guide

Start Module 3, Section 0 - Introduction

Discussion: 3.0.1 Why should I take this module?

Discussion: 3.0.2 What will I learn in this module?

Discussion: 3.0.3 Ethical Hacking Statement

Start Module 3, Section 1 - Current State of Cybersecurity

Discussion: 3.1.1 Current State of Affairs

Discussion: 3.1.2 Vectors of Network Attacks

Discussion: 3.1.3 Data Loss

Activity: 3.1.4 Check Your Understanding - Current State of Cybersecurity

Discussion: 3.2.1 The Hacker
Video: What are the 7 types of Hackers (7:33)

Discussion: 3.2.2 Evolution of Hackers
Link: Bug Bounty

Discussion: 3.2.3 Cyber Criminals

Discussion: 3.2.4 Hacktivists
Video: Anonymous launches 'cyber war' against Russia

Discussion: 3.2.5 State-Sponsored Hackers
Video: Life Inside North Korea’s Hacker Army (13:20)

Activity: 3.2.6 Check Your Understanding - Threat Actors

Assignment: Module 3 Study Guide 1-9

03/24/22 CCNA3 v7

Discussion: Professor Messer Free 220-1002 A+ Video Training Course

Start Module 3, Section 3 - Threat Actor Tools

Video: 3.3.1 Threat Actor Tools

Discussion: 3.3.2 Introduction to Attack Tools
Link: Top 20 Ethical Hacking Tools in 2022

Discussion: 3.3.3 Evolution of Security Tools

Discussion: 3.3.4 Attack Types

Activity: 3.3.5 Check Your Understanding - Threat Actor Tools

Start Module 3, Section 4 - Malware

Discussion: 3.4.1 Overview of Malware

Discussion: 3.4.2 Viruses and Trojan Horses

Discussion: 3.4.3 Other Types of Malware

Activity: 3.4.4 Check Your Understanding - Malware

Assignment: Module 3 Study Guide 10-16

03/25/22 CCNA3 v7

Video: YouTube: Cisco CCNA Exams

Start Module 3, Section 5 - Overview of Network Attacks

Discussion: 3.5.1 Overview of Network Attacks

Video: 3.5.2 Reconnaissance Attacks

Discussion: 3.5.3 Reconnaissance Attacks

Video: 3.5.4 Access and Social Engineering Attacks

Discussion: 3.5.5 Access Attacks

Discussion: 3.5.6 Social Engineering Attacks

Lab: 3.5.7 Social Engineering

Video: 3.5.8 Denial of Service Attacks (2:02)

Discussion: 3.5.9 DoS and DDoS Attacks

Activity: 3.5.10 Check Your Understanding - Common Network Attacks

Start Module 3, Section 6 - IP Vulnerabilities and Threats

Video: 3.6.1 Common IP and ICMP Attacks (4:32)

Discussion: 3.6.2 IPv4 and IPv6

Discussion: 3.6.3 ICMP Attacks

Video: 3.6.4 Amplification, Reflection, and Spoofing Attacks (3:29)

Discussion: 3.6.5 Amplification and Reflection Attacks

Discussion: 3.6.6 Address Spoofing Attacks

Activity: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats

Assignment: Module 3 Study Guide 17-37

04/04/22 CCNA3 v7

Video: YouTube: Top Tips to Conquer Life

Start Module 3, Section 7 - TCP and UDP Vulnerabilities

Read: 3.7.1 TCP Segment Header

Read: 3.7.2 TCP Services

Read: 3.7.3 TCP Attacks

Read: UDP Segment Header and Operation

Read: 3.7.5 UDP Attacks

Activity: 3.7.6 Check Your Understanding - TCP and UDP Vulnerabilities

Start Module 3, Section 8 - IP Services

Read: 3.8.1 ARP Vulnerabilities

Read: 3.8.2 ARP Cache Poisoning
Video: Professor Messer: ARP Cashe Poisoning (8:08)

Video: 3.8.3 ARP Spoofing
Video: Professor Messer: Spoofing (3:26)

Read: 3.8.4 DNS Attacks
Video: Professor Messer: DNS Attacks (8:18)

Read: 3.8.5 DNS Tunneling
Video: DNS Tunneling (9:00)

Read: 3.8.6 DHCP

Read: 3.8.7 DHCP Attacks
Video: DHCP Starvation Attacks (8:35)

Lab: 3.8.8 Explore DNS Traffic

Assignment: Module 3 Study Guide 37-56

  A+ Prep

Link: CompTIA Online Testing ID Requirements

Test Prep 220-1002

04/05/22 CCNA3 v7

Start Module 3, Section 8 - Network Security Best Practices

Read: 3.9.1 Confidentiality, Integrity, and Availability

Read: 3.9.2 The Defense-in-Depth Approach

Read: 3.9.3 Firewalls

Read: 3.9.4 IPS

Read: 3.9.5 Content Security Appliances

Activity: 3.9.6 Check Your Understanding - Network Security Best Practices

Start Module 3, Section 10 - Cryptography

Video: 3.10.1 Cryptography

Read: 3.10.2 Securing Communications

Read: 3.10.3 Data Integrity
Video: What is Cryptography? (17:56)

Read: 3.10.4 Hash Functions

Read: 3.10.5 Origin Authentication

Read: 3.10.6 Data Confidentiality

Read: 3.10.7 Symmetric Encryption

Read: 3.10.8 Asymmetric Encryption
Video: Professor Messer: Symmetric and Asymmetric Encryption (6:07)

Read: 3.10.9 Diffie-Hellman
Video: Diffie-Hellman Key Exchange (2:18)

Activity: 3.10.10 Check Your Understanding - Cryptography

Start Module 3, Section 11 - Module Practice and Quiz

Read: 3.11.1 What did I learn in this module?

Activity: 3.11.2 Module Quiz - Network Security Concepts

Assignment: Module 3 Study Guide 57-77

  A+ Prep Test Prep 220-1002
04/06/22 CCNA3 v7

Test: Module 3

Start Module 4 - ACL Concepts