Week 7 – 66 pages and 30 multiple choice questions

Read  Chapter 13, 14 and 15 again

Chapter 16 – Given a scenario, implement IPv4 and IPv6 network servcies  – 25 pages

Chapter 17 – Compare and contrast network access and management methods – 12 pages

Chapter 18 – Explain the importance of change management processes and the impact to security – 29 pages

Action – Ian’s Book Key Elements
Chapter 16 – Read pages 285-309 taking notes
Complete all 10 review questions online
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 17  – Read pages 311-321 taking notes

Complete all 10 review questions pages 27-29

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 18 – Read pages 325-253 taking notes

Complete all 10 review questions pages 39-41

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
1.1 Security Controls

1.2 CIA triad

  • Non repudiation
  • AAA
  • Gap analysis
  • Zero trust
  • Physical Security
  • Deception and Disruption

1.3  Change Management

  • Non repudiation

https://www.professormesser.com/network-plus/n10-009/n10-009-video/n10-009-training -course/

Lab Exercises (optional) 

We are currently trying to find a cost-effective lab provider for Networking

DHCP

  • Reservations
  • Scope
  • Lease time
  • Options
  • Relay/Helper
  • Exclusions

SLAAC

DNS

  • Name resolution
  • Record types
  • Zone types
  • Hosts file

Time protocols

Site to site VPN

Client to site VPN

  • Clientless
  • Split/full tunnel

Connection methods

  • SSH
  • GUI
  • API
  • Console

Jump box/host

In-band v OOB management

Logical Security

Encryption

  • Data in transit/at rest

Certificates

IAM

Authentication

  • MFA
  • SSO
  • RADIUS
  • LDAP
  • SAML
  • TACACS+
  • Time-based authentication

Authorization

Physical Security

Deception technologies

Common security terminology

Audits and regulatory compliance

Network segmentation enforcement

  • IoT
  • IIoT
  • SCADA
  • ICS
  • OT
  • Guest
  • BYOD