• A Essentials Objectives
  • Number of Exam Questions 4 questions Total Time About 15 minutes Section 9.3: Authentication Summary
  • Lab/Activity Enforce Password Settings Number of Exam Questions 10 questions Total Time
  • Lab/Activity Configure BIOS Security Number of Exam Questions 7 questions Total Time
  • Lesson Plans




    Download 484.29 Kb.
    bet18/24
    Sana21.03.2017
    Hajmi484.29 Kb.
    1   ...   14   15   16   17   18   19   20   21   ...   24

    Section 9.2: Social Engineering

    Summary


    In this section students will learn how social engineering exploits human nature to convince someone to perform an activity. Concepts discussed include:


    • Examples of social engineering

    • Social engineering attacks:

      • Dumpster diving

      • Shoulder surfing

      • Masquerading

      • Eavesdropping

      • Phishing

    • Countermeasures to social engineering



    A Essentials Objectives:

    Lecture Focus Questions:

    • What characteristics of human nature does social engineering exploit?

    • Who is usually the target in social engineering?

    • How can dumpster diving give attackers valuable information?

    • What is the best defense against a social engineering attack?

    Video/Demo Time



    video9.2.1 Social Engineering 8:25

    Number of Exam Questions


    4 questions

    Total Time


    About 15 minutes

    Section 9.3: Authentication

    Summary


    This section discusses using authentication to validate a user’s identity. Topics covered include:

    • Authentication credentials

      • Password

      • Smart card

      • Biometric

    • Password weaknesses

    • Strong password policy

    • Control passwords with policy settings:

    • Password Policy settings:

      • Minimum password length

      • Password complexity

      • Maximum password age

      • Minimum password age

      • Enforce password history

    • Account Lockout Policy settings:

    Students will learn how to:

    • Configure Password Policy and Account Lockout settings in the local security policy.

    • Use a biometric scanner to enroll (record) fingerprints that can be used for authentication.

    • Configure fingerprint settings to automate execution of an application.
    A Essentials Objectives:

    • 1.8 Install and configure peripherals and input devices

      • Biometric devices

    • 5.1 Explain the basic principles of security concepts and technologies

      • Authentication technologies

        • User name

        • Password

        • Biometrics

        • Smart cards

    • 5.2 Summarize the following security features

    Lecture Focus Questions:

    • What is the difference between a password and a passphrase?

    • How is cognitive information typically used in an authentication system?

    • What additional information is typically required when authenticating with a smart card?

    • What type of credentials do biometric systems use for authentication? What are four examples of biometric credentials?

    • What tendency of human nature makes many passwords easier to crack?

    • What are the characteristics of a strong password policy?

    • What is the difference between password policy settings and account lockout settings?

    Video/Demo Time



    video9.3.1 Authentication 2:57
    demo9.3.4 Configuring Password Policies 6:22

    demo9.3.6 Using a Biometric Scanner 3:41
    Total 13:00

    Lab/Activity

    Number of Exam Questions


    10 questions

    Total Time


    About 30 minutes

    Section 9.4: BIOS Security

    Summary


    In this section students will learn the basics of BIOS security. Concepts covered include:

    • Security-related features in the BIOS

      • BIOS passwords

      • Chassis intrusion detection

      • Hard disk password

      • Trusted Platform Module (TPM)

    Students will learn how to:

    • Configure BIOS and hard disk passwords.

    • Enable and reset chassis intrusion detection.

    • Initialize a TPM.
    A Essentials Objectives:

    • 5.2 Summarize the following security features

      • BIOS Security

        • Drive lock

        • Passwords

        • Intrusion detection

        • TPM

    Lecture Focus Questions:

    • What is the difference between a user and an administrator password in the BIOS?

    • Why do BIOS passwords offer little system protection?

    • How does chassis intrusion detection help to secure the BIOS?

    • How does a hard disk password differ from a BIOS password? What happens to the hard disk password if the disk is moved to another system?

    • What is the function of the TPM? Where is the TPM chip located?



    Video/Demo Time



    video9.4.1 BIOS Security 4:00
    demo9.4.2 Configuring BIOS Security Settings 8:04
    Total 12:04

    Lab/Activity


    • Configure BIOS Security

    Number of Exam Questions


    7 questions

    Total Time


    About 25 minutes
    1   ...   14   15   16   17   18   19   20   21   ...   24


    Download 484.29 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa


    Lesson Plans

    Download 484.29 Kb.