Week 8 40 pages and 30 multiple choice questions

Read Chapters 16, 17 and 18 again

Chapter 19 – Summarize various types of attacks and their impact to the network – 13 pages

Chapter 20- Given a scenario, apply network security features, defense techniques, and solutions – 14 pages

Chapter 21 – Explain the troubleshooting methodology – 13 pages

Action – Ian’s Book Key Elements
Chapter 19 – Read pages  355-367 taking notes
Complete all 10 review questions online
Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 20- Read pages 369-382 taking notes

Complete all 10 review questions online

Any review questions that are wrong or missing then go back into the chapter and read those areas

Chapter 21 – Read pages 385-397 taking notes

Complete all 10 review questions online

Any review questions that are wrong or missing then go back into the chapter and read those areas

Action – Videos Professor Messer
4.2 Attack types

  • Denial of Service
  • VLAN hopping
  • MAC flooding
  • ARP and DNS Poisoning
  • Rogue services
  • Social engineering
  • Malware

4,3 Network security features

  • Device security
  • Security rules

5.1 Network troubleshooting

  • Network troubleshooting methodology

https://www.professormesser.com/network-plus/n10-009/n10-009-video/n10-009-training -course/

Videos

Lab Exercises (optional) 

We are currently trying to find a cost-effective lab provider for Networking

Attacks

  • DoS/DDoS-
  • VLAN hopping
  • MAC flooding
  • ARP poisoning
  • Rogue devices and services
  • DHCP
  • AP
  • Evil twin
  • On-path attack

Social engineering

  • Phishing
  • Dumpster diving
  • Shoulder surfing
  • Tailgating

Malware

Device hardening

  • Disable unused ports and services
  • Change default password

Network access control (NAC)

  • Port security
  • 802.1X
  • MAC filtering

Security rules

  • Access control list (ACL)
  • Uniform Resource Locator (URL) filtering
  • Content filtering

Zones

  • Trusted untrusted
  • Screened subnet

Troubleshooting methodology

  • Identify the problem
  • Establish a theory of probable cause
  • Test the theory to determine the cause
  • Establish a plan of action to resolve the problem and identify potential effects
  • Implement the solution or escalate as necessary
  • Verify full system functionality and implement preventive measures if applicable
  • Document findings, actions, outcomes, and lessons learned throughout the process