CCNA2 SRWE Module 10 - LAN Security Concepts

Date Subject Lesson Plan
11/16/21 CCNA2

CCNA2v7 Module 10 Reading Organizer

Start Module 10 - LAN Security Concepts

Read: 10.0.1 Why should I take this module?

Read: 10.0.2 What will I learn in this module?

Start Module 10, Section 1 - Endpoint Security

Read: 10.1.1 Network Attacks Today

Read: 10.1.2 Network Security Devices
Video: Network Security Devices (6:51)

Read: 10.1.3 Endpoint Protection
Video: Professor Messer: Endpoint Protection (9:48)

Read: 10.1.4 Cisco Email Security Appliance
Video: Cisco Email Security (17:21)

Read: 10.1.5 Cisco Web Security Appliance
Video: Cisco Web Security (5:02)

Activity: 10.1.6 Check Your Understanding - Endpoint Security

Assignment: Module 10 Study Guide 1-10


Video: What is Linux? (5:42)

Read: The ls -l command output

Read: Basic Unix File and Directory Permissions

Syntax Checker: File and Directory Permissions

Activity: Check Your Understanding - File and Directory Permissions

Read: Linux Administrative Commands

Read: Linux Administrative Commands Requireing Root Access

Activity: Check Your Understanding - Administrative Commands

Syntax Checker: File Ownership and Permission

11/17/21 CCNA2

Start Module 10, Section 2 - Access Control

Read: 10.2.1 Authentication with a Local Password

Read: 10.2.2 AAA Components

Read: 10.2.3 Authentication

Read: 10.2.4 Authorization

Read: 10.2.5 Accounting

Read: 10.2.6 802.1X

Activity: 10.2.7 Check Your Understanding - Access Control

Assignment: Module 10 question 11-20


Read: The Six Steps of the Troubleshooting Process

Read: Identify the Problem

Read: Establish a theory of Probable Cause

Read: Test the Theory to Determine the Cause

Read: Establish a Plan of Action

Read: Verify Full System Functionality

Read: Document the Findings

Read: Common Problems and Solutions for Mobile Operating Systems

Read: Common Problems and Solutions for Mobile OS Security

Read: Common Problems and Solutions for Linux and macOS

Lab: Troubleshoot Mobile Devices

11/18/21 CCNA2

Start Module 10, Section 3 - Layer 2 Security Threats

Read: 10.3.1 Layer 2 Vulnerabilities

Read: 10.3.2 Switch Attack Categories

Read: 10.3.3 Switch Attack Mitigation Techniques

Activity: 10.3.4 Check Your Understanding - Layer 2 Security Threats

Module 10 question 21-24


Read: Review Chapter 12

Review: Chapter 12 PowerPoint

Study: Chapter 12 Test

11/19/21 CCNA2

Start Module 10, Section 4 - MAC Address Table Attack

Read: 10.4.1 Switch Operation Review

Read: 10.4.2 MAC Address Table Flooding

Read: 10.4.3 MAC Address Table Attack Mitigation

Activity: 10.4.4 Check Your Understanding - MAC Address Table Attacks

Module 10 Study Guide question 25-30


Test: Chapter 12

Start Chapter 13 - Security

Read: Intro

Read: Malware

Activity: What Do You Already Know? - Malware

Read: Viruses and Trojan Horses

Read: Types of Malware

Activity: Check Your Understanding - Malware

11/22/21 CCNA2

Start Module 10, Section 5 - LAN Attacks

Demonstration Video: 10.5.1 VLAN and DHCP Attacks

Read: 10.5.2 VLAN Hopping Attacks
Video: Professor Messer: VLAN Hopping (5:41)

Read: 10.5.3 VLAN Double-Tagging Attack

Read: 10.5.4 DHCP Messages

Read: 10.5.5 DHCP Attacks
Video: Kevin Wallace: DHCP Attacks and Defense Strategies (19:19)

Demonstration Video: 10.5.6 ARP Attacks, STP Attacks, and CDP Reconnaissance

Read: 10.5.7 ARP Attacks
Video: Kevin Wallace: ARP Poisoning and Defense Strategies (20:05)

Read: 10.5.8 Address Spoofing Attack

Read: 10.5.9 STP Attack

Read: 10.5.10 CDP Reconnaissance
Video: Kevin Wallace: Mapping a Network with CDP or LLDP (6:10)

Activity: 10.5.11 Check Your Understanding - LAN Attacks

Module 10 question 31-53 (finish)


Read: Anti-Malware Programs

Read: Signature File Updates

Video Explanation: Protecting Against Malware

Read: Remediating Infected Systems

Video Explanation: Remediating an Infected System

Activity: Check Your Understanding - Preventing Malware

Read: Networks Are Targets

11/23/21 CCNA2

Start Module 10, Section 6 - Module Practice and Quiz

Read: 10.6.1 What did I learn in this module?

Activity: 10.6.2 Module Quiz - LAN Security Concepts

Review: Module 10 PowerPoint

Test: Module 10 (12:00)


Read: Types of TCP/IP Attacks

Activity: Check Your Understanding – Identify the TCP/IP Attack

Read: Zero-Day

Read: Protecting Against Network Attacks

Read: Social Engineering

Activity: What Do You Already Know? - Social Engineering Techniques

Read: Social Engineering Techniques

Read: Protecting Against Social Engineering

Activity: Check Your Understanding - Personal and Corporate Social Engineering Techniques