Date | Subject | Lesson Plan |
---|---|---|
02/18/25 | CCNA3 v7 | Install Kali Linux in VirtualBox. Virtual machine is located CNA drive, CCNA3, Chapter 3. Kali Linux image located in the CNA-CCNA3-Module 3 folder. Download image to your local machine - Do Not Install Over Network Choose Dabian 64 bit for the operating system. LearnKey: 200-301 Domain 5 - Security Fundamentals Link: Module 3 Study Guide Start Module 3, Section 0 - Introduction Discussion: 3.0.1 Why should I take this module? Discussion: 3.0.2 What will I learn in this module? Discussion: 3.0.3 Ethical Hacking Statement Start Module 3, Section 1 - Current State of Cybersecurity Discussion: 3.1.1 Current State of Affairs Discussion: 3.1.2 Vectors of Network Attacks Discussion: 3.1.3 Data Loss Activity: 3.1.4 Check Your Understanding - Current State of Cybersecurity Discussion: 3.2.1 The Hacker Discussion: 3.2.2 Evolution of Hackers Discussion: 3.2.3 Cyber Criminals Discussion: 3.2.4 Hacktivists Discussion: 3.2.5 State-Sponsored Hackers Activity: 3.2.6 Check Your Understanding - Threat Actors Assignment: Module 3 Study Guide 1-9 |
02/19/25 | CCNA3 v7 | Start Module 3, Section 3 - Threat Actor Tools Video: 3.3.1 Threat Actor Tools Discussion: 3.3.2 Introduction to Attack Tools Lab: Install Nmap for Windows CNA drive, CCNA3, Chapter 3. Watch video. Discussion: 3.3.3 Evolution of Security Tools Discussion: 3.3.4 Attack Types Activity: 3.3.5 Check Your Understanding - Threat Actor Tools Start Module 3, Section 4 - Malware Discussion: 3.4.1 Overview of Malware Discussion: 3.4.2 Viruses and Trojan Horses Discussion: 3.4.3 Other Types of Malware Activity: 3.4.4 Check Your Understanding - Malware Video: Best Ethical Hacking Tools | Tools For Penetration Testing 2023 (6:03) Assignment: Module 3 Study Guide 10-16 |
A+ | Prepare for state BPA/certification exams | |
02/20/25 | CCNA3 v7 | Video: YouTube: How I passed the CCNA Exam in 6 weeks (15:58) Start Module 3, Section 5 - Overview of Network Attacks Discussion: 3.5.1 Overview of Network Attacks Video: 3.5.2 Reconnaissance Attacks Discussion: 3.5.3 Reconnaissance Attacks (2:58) Video: Computer Everywhere: How to Find and Close Listening Ports Win10 (5:13) Video: 3.5.4 Access and Social Engineering Attacks (3:35) Discussion: 3.5.5 Access Attacks Discussion: 3.5.6 Social Engineering Attacks Lab: 3.5.7 Social Engineering (60 minutes) Video: 3.5.8 Denial of Service Attacks (2:02) Discussion: 3.5.9 DoS and DDoS Attacks Activity: 3.5.10 Check Your Understanding - Common Network Attacks Start Module 3, Section 6 - IP Vulnerabilities and Threats Video: 3.6.1 Common IP and ICMP Attacks (4:32) Discussion: 3.6.2 IPv4 and IPv6 Discussion: 3.6.3 ICMP Attacks Video: 3.6.4 Amplification, Reflection, and Spoofing Attacks (3:29) Discussion: 3.6.5 Amplification and Reflection Attacks Discussion: 3.6.6 Address Spoofing Attacks Activity: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats Assignment: Module 3 Study Guide 17-37 |
A+ Prep | Test Prep 220-1102 LearnKey: Domain 1: Lesson 15 pgs. 62-63 |
|
02/21/25 | CCNA3 v7 | https://cyberskyline.com/events/ncl Video: YouTube: Top Tips to Conquer Life Start Module 3, Section 7 - TCP and UDP Vulnerabilities Read: 3.7.1 TCP Segment Header Read: 3.7.2 TCP Services Read: 3.7.3 TCP Attacks Read: UDP Segment Header and Operation Read: 3.7.5 UDP Attacks Activity: 3.7.6 Check Your Understanding - TCP and UDP Vulnerabilities Start Module 3, Section 8 - IP Services Read: 3.8.1 ARP Vulnerabilities Read: 3.8.2 ARP Cache Poisoning Video: 3.8.3 ARP Spoofing Read: 3.8.4 DNS Attacks Read: 3.8.5 DNS Tunneling Read: 3.8.6 DHCP Read: 3.8.7 DHCP Attacks Lab: 3.8.8 Explore DNS Traffic (60 minutes) Assignment: Module 3 Study Guide 38-56 |
A+ Prep | Link: CompTIA Online Testing ID Requirements Test Prep 220-1102 |
|
02/24/25 | CCNA3 v7 | Test: Certiport Cybersecurity Certification exam after finishing this module Start Module 3, Section 8 - Network Security Best Practices Read: 3.9.1 Confidentiality, Integrity, and Availability Read: 3.9.2 The Defense-in-Depth Approach Read: 3.9.3 Firewalls Read: 3.9.4 IPS Read: 3.9.5 Content Security Appliances Activity: 3.9.6 Check Your Understanding - Network Security Best Practices Start Module 3, Section 10 - Cryptography Video: 3.10.1 Cryptography (4:28) Read: 3.10.2 Securing Communications Read: 3.10.3 Data Integrity Read: 3.10.4 Hash Functions Read: 3.10.5 Origin Authentication Read: 3.10.6 Data Confidentiality Read: 3.10.7 Symmetric Encryption Read: 3.10.8 Asymmetric Encryption Read: 3.10.9 Diffie-Hellman Activity: 3.10.10 Check Your Understanding - Cryptography Start Module 3, Section 11 - Module Practice and Quiz Read: 3.11.2 What did I learn in this module? Activity: 3.11.3 Module Quiz - Network Security Concepts Assignment: Module 3 Study Guide 57-77 (end) Study for Module 3 Test tomorrow |
A+ Prep | Test Prep 220-1002 Video: Network Chuck: 40 Windows Commands You Need To Know (10:54) |
|
02/25/25 | CCNA3 v7 | PT 3.11.1 Network Security Exploration Video: NetITGeeks: CCNA3 Module 3: Network Security Concepts (3:21:12) Review PowerPoint: Module 3 Test: Module 3 Start Module 4 - ACL Concepts |