Summary
This section discusses securing a network. Details about the following are presented:
-
Best practices for a wired network:
-
Physical security
-
Unnecessary software
-
User accounts
-
Usernames and passwords
-
MAC address filtering
-
Static IP addressing
-
Disabling ports
-
Best practices for a wireless network:
-
Usernames and passwords
-
SSID names
-
SSID broadcast
-
Encryption
-
MAC address filtering
-
Static IP addressing
-
Data emanation
Students will learn how to:
-
Physically secure a wired or wireless network.
-
Control access to a wired network by disabling switch ports.
-
Control access to a wired or wireless network by implementing MAC address filtering.
-
Secure a wired or wireless network with static IP address assignments.
-
Secure a wireless network access point.
-
Prevent data emanation from a wireless network.
A+ 220-802 Exam Objectives: -
2.5 Given a scenario, secure a SOHO wireless network.
-
Change default user-names and passwords
-
Changing SSID
-
Setting encryption
-
Disabling SSID broadcast
-
Enable MAC filtering
-
Antenna and access point placement
-
Radio power levels
-
Assign static IP addresses
-
2.6 Given a scenario, secure a SOHO wired network.
-
Change default usernames and passwords
-
Enable MAC filtering
-
Assign static IP addresses
-
Disabling ports
-
Physical security
Lecture Focus Questions:
-
What steps should be taken to physically secure a wired network?
-
Which ports on a network switch should be disabled?
-
What is the effect of unnecessary or unused software installed on a workstation or server?
-
What can be done to make usernames and passwords more secure?
-
How can MAC address filtering increase the security of a wired or wireless network?
-
Is using static IP address assignments more secure than using dynamic assignments via DHCP?
-
What can be done to secure a wireless network access point?
-
How can you keep a wireless network's radio signal from emanating outside your facility or campus?
Video/Demo Time
12.8.1 Wired Network Security Best Practices 17:45
12.8.3 Wireless Network Security Best Practices 14:57
Total 32:42
Number of Exam Questions
4 questions
Total Time
About 45 minutes
Section 12.9: Firewalls Summary
This section discusses using firewalls to inspect network traffic and allow or block traffic based on a set of rules. Concepts covered include:
-
Types of firewalls:
-
Network-based firewall
-
Host-based firewall
-
Filtering rules use characteristics of the traffic to identify allowed and blocked traffic.
-
In Windows Firewall, you can configure two exception types:
-
Identifying the traffic type for network-based firewalls:
-
Port triggering
-
Port forwarding
-
Port numbers for common network protocols
Students will learn how to:
-
Enable the Windows firewall.
-
Open and close ports in the Windows firewall.
-
Configure a network-based firewall using port forwarding.
-
Configure a network-based firewall using port triggering.
PC Pro Exam Objectives: -
Configure the basic Windows Firewall. Open necessary ports to support running services and applications.
A+ 220-802 Exam Objectives: -
1.1 Compare and contrast the features and requirements of various Microsoft Operating Systems.
-
Features:
-
Aero, gadgets, user account control, BitLocker, shadow copy, system restore, ready boost, sidebar, compatibility mode, XP mode, easy transfer, administrative tools, defender, Windows firewall, security center, event viewer, file structure and paths, category view vs. classic view
-
1.4 Given a scenario, use appropriate operating system features and tools.
-
Administrative
-
Windows firewall
-
Advanced security
-
1.5 Given a scenario, use Control Panel utilities (the items are organized by "classic view/large icons" in Windows).
-
Common to all Microsoft Operating Systems
-
Security center
-
Windows firewall
-
1.6 Setup and configure Windows networking on a client/desktop.
-
Firewall settings
-
Exceptions
-
Configuration
-
Enabling/disabling Windows firewall
-
2.1 Apply and use common prevention methods.
Lecture Focus Questions:
-
Why is using a firewall important when connecting your computer to the Internet?
-
Is the Windows firewall service a host-based or a network-based firewall solution?
-
In Windows Firewall, what types of exception types can be configured to allow incoming traffic?
-
What information does the firewall use to allow or prevent communication?
-
What are the disadvantages of using a firewall?
-
What capabilities does configuring port forwarding provide?
-
How would you configure port triggering?
Video/Demo Time
12.9.1 Introduction to Firewalls 8:01
12.9.2 Firewalls 10:39
12.9.3 Configuring Windows Firewall 3:50
12.9.4 Configuring a Network-Based Firewall 13:46
Total 36:16
Lab/Activity -
Configure the Windows Firewall
Number of Exam Questions
9 questions
Total Time
About 55 minutes
Share with your friends: |