• A Essentials Objectives
  • Lab/Activity Encrypt Files Number of Exam Questions 10 questions Total Time
  • Lab/Activity Require a Screen Saver Password Number of Exam Questions 5 questions Time
  • Lab/Activity Configure the Windows Firewall Number of Exam Questions 9 questions Total Time
  • Lesson Plans




    Download 484.29 Kb.
    bet19/24
    Sana21.03.2017
    Hajmi484.29 Kb.
    1   ...   16   17   18   19   20   21   22   23   24



    Section 9.5: Encryption

    Summary


    This section discusses using encryption to secure data by obscuring it from those who do not have the required key to access the data. Details about the following are presented:

    • Types of encryption:

      • File encryption

      • Disk encryption

      • Data encryption

    Students will learn how to:

    • Encrypt files and add authorized users.
    A Essentials Objectives:

      • Common ports: HTTPS

      • Identify Virtual Private Networks (VPN)

      • Encryption technologies

    • 5.2 Summarize the following security features

      • Wireless encryption

        • WEPx and WPAx

    Lecture Focus Questions:

    • Which encryption method encrypts individual files so that only the owner and other users who have been authorized can decrypt the file and read it?

    • Why is it important to not move files that have been encrypted with EFS to a non-NTFS partition?

    • How does file encryption differ from disk encryption?

    • What is the role of a TPM when implementing whole disk encryption?

    • What protocols are commonly used to establish a VPN? Which protocol is typically used for Web transactions?

    • What protocols are commonly used to encrypt and secure wireless communications?

    Video/Demo Time



    video9.5.1 Encryption 5:08
    demo9.5.3 Encrypting Files 3:09
    Total 8:17

    Lab/Activity


    • Encrypt Files

    Number of Exam Questions


    10 questions

    Total Time


    About 25 minutes

    Section 9.6: Physical Security

    Summary


    This section discusses the following methods of physically securing computer systems:


    • Building security

    • Hardware locks

    • Lock the workstation

    • Computer tracking service

    • Removable storage

    • Storage media disposal

    Students will learn how to:



    • Wipe data from a hard disk prior to disposal.

    • Configure a screen saver and require a password to lock the Windows desktop.
    A Essentials Objectives:




    • 5.1 Explain the basic principles of security concepts and technologies

        • Compliance

        • Classifications

    • 5.2 Summarize the following security features

        • Drive lock

        • TPM

    Lecture Focus Questions:

    • What precautions should you implement for good physical security for a building?

    • How can you prevent laptops and their components from being stolen?

    • How can you secure unattended Windows computers?

    • What measures can you implement to protect data on stolen laptops?

    • What is the difference between a user password and an administrator password set in the BIOS?

    • What is the difference of securely disposing of magnetic media and securely disposing of optical media?

    Video/Demo Time



    video9.6.1 Physical Security 3:08
    demo9.6.3 Wiping a Disk 2:39
    demo9.6.4 Configuring a Screen Saver Password 3:51
    Total 9:38

    Lab/Activity


    • Require a Screen Saver Password

    Number of Exam Questions


    5 questions

    Time


    About 25 minutes

    Section 9.7: Firewalls

    Summary


    This section discusses using firewalls to inspect network traffic and allow or block traffic based on a set of rules. Concepts covered include:



    • Types of firewalls:

      • Network-based firewall

      • Host-based firewall

    • Filtering rules use characteristics of the traffic to identify allowed and blocked traffic.

    • Port numbers for common network protocols

    Students will learn how to:




    • Enable the Windows firewall.

    • Open and close ports in the Windows firewall.



    A Essentials Objectives:




    • 4.1 Summarize the basics of networking fundamentals, including technologies, devices and protocols

      • Common ports: HTTP, FTP, POP, SMTP, TELNET, HTTPS

    • 5.1 Explain the basic principles of security concepts and technologies

      • Software firewall

        • Port security

        • Exceptions

    Lecture Focus Questions:

    • Why is using a firewall important when connecting your computer to the Internet?

    • What is the difference between a network-based firewall and a host-based firewall? Is the Windows firewall service a host-based or a network-based firewall solution?

    • What information does the firewall use to make filtering decisions when allowing or blocking communications?

    • What are the disadvantages to using a firewall?



    Video/Demo Time



    video9.7.1 Firewalls 8:01
    demo9.7.2 Configuring Windows Firewall 7:24
    Total 15:25

    Lab/Activity


    • Configure the Windows Firewall

    Number of Exam Questions


    9 questions

    Total Time


    About 30 minutes
    1   ...   16   17   18   19   20   21   22   23   24


    Download 484.29 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa


    Lesson Plans

    Download 484.29 Kb.