Lesson Plans LabSim pc pro


Section 12.4: BIOS Security



Download 1.23 Mb.
Page35/47
Date31.01.2017
Size1.23 Mb.
#14042
1   ...   31   32   33   34   35   36   37   38   ...   47

Section 12.4: BIOS Security

Summary


In this section students will learn the basics of BIOS security. Concepts covered include:


  • Security-related features in the BIOS

    • BIOS passwords

    • Chassis intrusion detection

    • Hard disk password

    • Trusted Platform Module (TPM)

Students will learn how to:



  • Clear BIOS passwords and settings.

  • Configure BIOS and hard disk passwords.

  • Enable and reset chassis intrusion detection.

  • Initialize a TPM.
PC Pro Exam Objectives:

  • Configure BIOS security settings such as configuring drive lock, setting user and administrator passwords, enabling/disabling chassis intrusion detection, and enabling/disabling TPM.
A+ 220-801 Exam Objectives:

  • 1.1   Configure and apply BIOS settings.

    • BIOS configurations

      • Virtualization support

        • BIOS security (passwords, drive encryption: TPM, lo-jack)

    • Monitoring

      • Intrusion detection/notification

Lecture Focus Questions:

  • What is the difference between a user and an administrator password in the BIOS?

  • Why do BIOS passwords offer little system protection?

  • How does chassis intrusion detection help to secure the BIOS?

  • How does a hard disk password differ from a BIOS password? What happens to the hard disk password if the disk is moved to another system?

  • What is the function of the TPM? Where is the TPM chip located?

Video/Demo Time



video12.4.1 BIOS Security 9:52
demo12.4.2 Configuring BIOS Security Settings 8:04
Total 17:56

Lab/Activity


  • Configure BIOS Security

Number of Exam Questions


5 questions

Total Time


About 30 minutes






Section 12.5: Malware Protection

Summary


In this section students will learn the basics of protecting against malware. Concepts covered include:


  • Common malware

    • Virus

    • Worm

    • Trojan horse

    • Rootkit

    • Spyware

    • Adware

    • Grayware

    • Spam

  • Using anti-virus software to protect against malware

  • Additional countermeasures for malware

  • Malicious code

  • Considerations about protecting against malware

  • Symptoms of malware

  • Remediation

  • Actions to recover from malware

Students will learn how to:



  • Install and configure malware protection software.

  • Update malware definition files.

  • Research virus hoaxes using Internet sources.

  • Scan and repair infected files and systems.
A+ 220-802 Exam Objectives:

  • 2.1   Apply and use common prevention methods.

    • Digital security

      • Antivirus

      • Antispyware

    • User education

  • 2.2   Compare and contrast common security threats.

    • Social engineering

    • Malware

    • Rootkits

    • Phishing

    • Shoulder surfing

    • Spyware

    • Viruses

      • Worms

      • Trojans

  • 4.7   Given a scenario, troubleshoot common security issues with appropriate tools and best practices.

    • Common symptoms

      • Pop-ups

      • Browser redirection

      • Security alerts

      • Slow performance

      • Internet connectivity issues

      • PC locks up

      • Windows updates failures

      • Rogue antivirus

      • Spam

      • Renamed system files

      • Files disappearing

      • File permission changes

      • Hijacked email

      • Access denied

    • Tools

      • Anti-virus software

      • Anti-malware software

      • Anti-spyware software

      • Recovery console

      • System restore

      • Pre-installation environments

      • Event viewer

    • Best practices for malware removal

      • Identify malware symptoms

      • Quarantine infected system

      • Disable system restore

      • Remediate infected systems

      • Schedule scans and updates

      • Enable system restore and create restore point

      • Educate end user

Lecture Focus Questions:

  • What is the role of a signature file when using anti-malware software to protect a system?

  • How and when should you keep the signature files up to date?

  • How does showing full file extensions on all files help to protect against malware?

  • What are some common symptoms that might make you suspect that your system is infected with malware?

  • When your system is infected with malware, what remediation actions might your antivirus software prompt you to select from?

  • What is the process of quarantining a file?

  • What types of actions might a hoax virus instruct you to perform?

  • Why is user education often the best protection against malware?

Video/Demo Time



video12.5.1 Malware 3:39
demo12.5.2 Implementing Malware Protection 4:57

video12.5.4 Malware Protection 13:08
demo12.5.5 Implementing Virus Protection 15:25
Total 37:09

Number of Exam Questions


18 questions

Total Time


About 70 minutes


Download 1.23 Mb.

Share with your friends:
1   ...   31   32   33   34   35   36   37   38   ...   47




The database is protected by copyright ©ininet.org 2024
send message

    Main page