CCNA2 R&S Chapter 9 - NAT

Date Subject Lesson Plan
04/19/17 CCNA2 Class Feedback

Video: YouTube: TedED: The Happy Secret to Better Work (12:20)
Chapter 11 Tour
Discussion: 11.0.1.1-11.0.1.2
Activity: 11.0.1.2 Conceptual NAT
Discussion: 11.1.1.1-11.1.1.5
Activity: Im 11.1.1.6
Assignment: Study Guide 1-7 (turn in)
  Security+ Chapter 4 Test
04/20/17 CCNA2

Instructor: Cisco Regional Conference

Video: YouTube: TedED: Brain Magic (19:49)
Discussion: 11.1.2.1-11.1.2.5 (telephone company example)
Video: CBTNugg100-101: 32-Routing-NAT Concepts (27:41)
PT: 11.1.2.6 Investigating NAT Operations
Assignment: Study Guide 8-13

  Security+  
04/21/17 CCNA2

Instructor: Cisco Regional Conference

Discussion: 11.1.3.1- 11.2.1.1
Syntax Checker: 11.2.1.1 (4)
Discussion: 11.2.1.2-11.2.1.3
PT: 11.2.1.4 Configuring Static NAT
Assignment: Study Guide 14-20 (turn in)

  Security+ Chapter 4 Test
04/24/17 CCNA2 Discussion: 11.2.2.1-11.2.2.2
Syntax Checker: 11.2.2.2 (4)
Discussion: 11.2.2.3-11.2.2.4
Video: CBTNugg100-101: 33-Routing-NAT Configuration (41:51)
PT: 11.2.2.5 Configuring Dynamic NAT (due today!)
Assignment: Study Guide 21-25 (turn in today)
  Intro to Cybersecurity

Feedback Quiz: Ethics
Video: Khan Academy: Cybersecurity and crime (5:01)
Intro to Cybersecurity: Course Tour - 15 Hour Mini-Course (Grades will be put in A+ Course)

  • Prereq for Cybersecurity Essentials
  • 5 Chapters
  • Finish in a week
  • Labs
  • Final exam at end

Read/Study: 1.0.1.1 The Need for Cybersecurity
Read/Study: 1.1.1.1 What is Cybersecurity?
Read/Study: 1.1.1.2 Your Online and Offline Identity

  • Know difference between two
  • Picking a Username

Read/Study: 1.1.1.3 Your Data

  • EHRs
  • IEPs

Read/Study: 1.1.1.4 Where is Your Data?
Read/Study: 1.1.1.5 Your Computing Devices
Read/Study: 1.1.2.1 They Want Your Money
Read/Study: 1.1.2.2 They Want Your Identity
Read/Study: 1.2.1.1 Types of Organizational Data

  • Traditional Data
  • Internet of Things (IoT) and Big Data

Read/Study: 1.2.1.2 Confidentiality, Integrity, and Availablility

  • Checksum and Hash terms
  • MD5, SHA-1, SHA-256, SHA-512

Lab: 1.2.1.3 Compare Data with a Hash (due today!)

04/25/17 CCNA2 Lab: 11.2.2.6 Configuring Dynamic and Static NAT
  Intro to Cybersecurity

Chapter 5

Read/Study: 1.2.2.1 The Consequence of a Security Breach
Read/Study: 1.2.2.2-1.2.2.3 Security Breach Examples 1 & 2

Lab: 1.2.2.4 What was Taken?

Read/Study: 1.3.1.1 Types of Attackers

  • Amateurs
  • Hackers
  • Organized Hackers
  • White, Grey, Black Hat Hackers

Read/Study: 1.3.1.2 Internal and External Threats
Read/Study: Legal Issues in Cybersecurity

  • Personal Legal Issues, Corporate Legal Issues, International Law
  • IMPACT

Read/Study: 1.3.2.2 Ethical Issues in Cybersecurity
Activity: 1.3.2.3 What Color is My Hat?
Read/Study/Video: 1.4.1.1 What is Cyberwarfare?
Read/Study: 1.4.1.2 The Purpose of Cyberwarfare
Read/Study: 1.5.1.1 The Need for Cybersecurity

04/26/17 CCNA2 Discussion: 11.2.3.1
Syntax Checker: 11.2.3.1 (3)
Discussion: 11.2.3.2
Syntax Checker: 11.2.3.2 (3)
Discussion: 11.2.3.3-11.2.3.4
Activity: IM 11.2.3.5 (1-5)
PT: 11.2.3.6 Implementing Static and Dynamic NAT
Lab: 11.2.3.7 Configuring Port Address Translation (PAT)
Assignment: Study Guide 26-29
  Intro to Cybersecurity Test: Chapter 1 Intro to Cybersecurity
04/27/17 CCNA2 Netriders Round 2
  Intro to Cybersecurity  
04/28/16 CCNA2 Rite Board Field Trip
  Intro to Cybersecurity  
05/01/17 CCNA2 Discussion: 11.2.4.1-11.2.4.3
PT: 11.2.4.4 Configuring Port Forwarding on a Linksys Router
Discussion: 11.2.5.1-11.2.5.3
Assignment: Study Guide 30-36
  Intro to Cybersecurity

Start Chapter 2: 2.0.1.1 Attacks, Concepts and Techniques

Read/Study: 2.1.1.1 Finding Security Vulnerabilities

  • Hardware and Software Vulnerabilities

Read/Study: 2.1.2.1 Categorizing Security Vulnerabilities

  • Buffer Overflow
  • Non-validated output
  • Race conditions
  • Weaknesses in security practices
  • Access-control problems

Activity: 2.1.2.2 Identify Vulnerability Terminology
Read/Study: 2.1.3.1 Types of Malware

  • Spyware, Adware, Bot, Ransomeware, Scareware, Rootkit, Virus, Trojan Horse, Worms
  • Man-In-The-Middle (MitM)
  • Man-In-The-Mobile (MitMo)

Read/Study: 2.1.3.2 Symptoms of Malware
Activity: 2.1.3.3 Identify Malware Types
Read/Study: 2.1.4.1 Social Engineering

  • Pretexing, Tailgating, Something for Something

Read/Study: 2.1.4.2 Wi-Fi Password Cracking

  • Social Engineering, Brute-force attacks, Network sniffing

Read/Study: 2.1.4.3 Phishing
Read/Study: 2.1.4.4 Vulnerability Exploitation

  • Advanced Persistent Threats

Read/Study 2.1.5.1 DoS
Read/Study 2.1.5.2 DDoS
Read/Study: 2.1.5.3 SEO Poisoning
Activity: 2.1.5.4 Identify the DoS Type

05/02/17 CCNA2 Video: YouTube: TedED: Looks Aren't Everything. Believe Me, I'm A Model (9:37)
Discussion: 11.3.1.1-11.3.1.3
PT: 11.3.1.4 Verifying and Troubleshooting NAT Configurations
Lab: 11.3.1.5 Troubleshooting NAT Configurations
Assignment: Study Guide 37-40 (finish)
  Intro to Cybersecurity

Read/Study 2.2.1.1 What is a Blended Attack?

  • Nimbda, CodeRed, BugBear, Klez, Slammer, Conflicker, ZeuS

Read/Study 2.2.2.1 What is Impact Reduction?
Read/Study 2.3.1.1 Attacks, Concepts and Techniques

05/03/17 CCNA2 Activity: 11.4.1.1 NAT Check
PT: 11.4.1.2 Skills Integration Challenge
  Intro to Cybersecurity

Chapter 2 Test

Chapter 3: Protecting Your Data and Privacy
Read/Study: 3.1.1.1 Protecting Your Computing Devices
Read/Staudy 3.1.1.2 Use Wireless Networks Safely
Read/Study 3.1.1.3 Use Unique Passwords for Each Online Account
Read/Staudy 3.1.1.4 Use Passphrase Rather Than a Password
Lab: 3.1.1.5 Create and Store Strong Passwords

05/04/17 CCNA2 Discussion: 11.4.1.3 Summary
Review: Chapt 11 PowerPoint
Activity: IM Quiz
  Intro to Cybersecurity Read/Study 3.1.2.1 Encrypt Your Data
Read/Study: 3.1.2.2 Back up Your Data
Lab 3.1.2.3: Backup Data to External Storage
05/05/17 CCNA2 Test: Chapter 11 (1:00)
Video: CBTNugg100-101: 37: Studying for Cisco Exams (7:57)
Assignment: PT Introduction to Networking Skills Assessment
  Intro to Cybersecurity Read/Study 3.1.2.4 Deleting Your Data Permanently
Lab 3.1.2.5 Who Owns Your Data?
  Resources Review: PowerPoint Chapter 11