Week 8 40 pages and 30 multiple choice questions

Read Chapters 16, 17 and 18 again

Chapter 19 – Summarize various types of attacks and their impact to the network – 13 pages

Chapter 20- Given a scenario, apply network security features, defense techniques, and solutions – 14 pages

Chapter 21 – Explain the troubleshooting methodology – 13 pages

Action – Ian’s Book Key Elements
Chapter 19 – Read pages  355-367 taking notes
Complete all 10 review questions online
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 20- Read pages 369-382 taking notes

Complete all 10 review questions online

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 21 – Read pages 385-397 taking notes

Complete all 10 review questions online

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
1.1 Security Controls

1.2 CIA triad

  • Non repudiation
  • AAA
  • Gap analysis
  • Zero trust
  • Physical Security
  • Deception and Disruption

1.3  Change Management

  • Non repudiation

https://www.professormesser.com/network-plus/n10-009/n10-009-video/n10-009-training -course/

Lab Exercises (optional) 

We are currently trying to find a cost-effective lab provider for Networking

DOS/DDoS

VLAN hopping

MAC flooding

ARP poisoning

ARP spoofing

DNS  poisoning

DNS spoofing

Rogue devices and services

Evil twin

On-path attack

Social Engineering

Malware

Device hardening

NAC

Security rules

Zones

Troubleshooting

  • Identify the problem
  • Establish a theory of probable causes
  • Test the theory to determine the cause
  • Establish a plan of action
  • Implement the solution or escalate as necessary
  • Verifiy full system functionality and implement preventive measures if applicable
  • Document findings, actions, outcomes and lessons learned throughout the process

 

 

 

 

 

 

urity operations

Technical Implications

Documentation

Version Control