Week 7 – 66 pages and 30 multiple choice questions

Read  Chapter 13, 14 and 15 again

Chapter 16 – Given a scenario, implement IPv4 and IPv6 network servcies  – 25 pages

Chapter 17 – Compare and contrast network access and management methods – 12 pages

Chapter 18 – Explain the importance of change management processes and the impact to security – 29 pages

Action – Ian’s Book Key Elements
Chapter 16 – Read pages 285-309 taking notes
Complete all 10 review questions online
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 17  – Read pages 311-321 taking notes

Complete all 10 review questions pages 27-29

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 18 – Read pages 325-253 taking notes

Complete all 10 review questions pages 39-41

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
3.4 IP Services

  • DHCP
  • Configuring DHCP
  • IPv6 and SLAAC
  • An overview of DNS
  • DNS records
  • Time protocols

3.5 Network access

  • VPNs
  • Remote Access

4.1 Network security

  • Security concepts
  • Authentication
  • Security technologies
  • Regulatory compliance
  • Segementation enforcement

https://www.professormesser.com/network-plus/n10-009/n10-009-video/n10-009-training -course/

Videos

Lab Exercises (optional) 

We are currently trying to find a cost-effective lab provider for Networking

DHCP

  • Reservations
  • Scope
  • Lease time
  • Options
  • Relay/Helper
  • Exclusions

SLAAC

DNS

  • Name resolution
  • Record types
  • Zone types
  • Hosts file

Time protocols

Site to site VPN

Client to site VPN

  • Clientless
  • Split/full tunnel

Connection methods

  • SSH
  • GUI
  • API
  • Console

Jump box/host

In-band v OOB management

Logical Security

Encryption

  • Data in transit/at rest

Certificates

IAM

Authentication

  • MFA
  • SSO
  • RADIUS
  • LDAP
  • SAML
  • TACACS+
  • Time-based authentication

Authorization

Physical Security

Deception technologies

Common security terminology

Audits and regulatory compliance

Network segmentation enforcement

  • IoT
  • IIoT
  • SCADA
  • ICS
  • OT
  • Guest
  • BYOD