| Week 7 – 66 pages and 30 multiple choice questions
Read Chapter 13, 14 and 15 again |
|||||||
|---|---|---|---|---|---|---|---|
| Chapter 16 – Given a scenario, implement IPv4 and IPv6 network servcies – 25 pages
Chapter 17 – Compare and contrast network access and management methods – 12 pages Chapter 18 – Explain the importance of change management processes and the impact to security – 29 pages |
|||||||
| Action – Ian’s Book | Key Elements | ||||||
|
DHCP
SLAAC DNS
Time protocols Site to site VPN Client to site VPN
Connection methods
Jump box/host In-band v OOB management Logical Security Encryption
Certificates IAM Authentication
Authorization Physical Security Deception technologies Common security terminology Audits and regulatory compliance Network segmentation enforcement
|
||||||