Security
Overview
In this unit students will learn how to identify different threats against hardware, software, and networks. They will also learn how to defend their systems against these attacks.
Standards
220-1002 (Core 2) Objectives 2.1 - 2.10
Cyber Connections
Cybersecurity
Networks and Internet
Hardware and Software
Section Title
Lessons
Accordion Items
Title
2.1 - Summarize the importance of physical security measures
Content
- Mantrap
- Badge Reader
- Smart Card
- Security Guard
- Door Lock
- Biometric Locks
- Hardware Tokens
- Cable Locks
- Server Locks
- USB Locks
- Privacy Screen
- Key Fobs
- Entry Control Roster
Title
2.2 - Explain logical security concepts
Content
- Active Directory
- Software Tokens
- MDM Policies
- Port Security
- MAC Address Filtering
- Certificates
- Antivirus / Anti-Malware
- Firewalls
- User Authentication / Strong Passwords
- Multifactor Authentication
- Directory Permissions
- VPN
- DLP
- Access Control Lists
- Smart Card
- Email Filtering
- Trusted / Untrusted Software Sources
- Principle of Least Privilege
Title
2.3 - Compare and contrast wireless security protocols and authentication methods
Content
- Protocols and Encryption
- Authentication
Title
2.5 - Compare and contrast social engineering, threats, and vulnerabilities
Content
- Social Engineering
- DDoS
- DoS
- Zero-Day
- Man-in-the-Middle
- Brute Force
- Dictionary
- Rainbow Table
- Spoofing
- Non-Compliant Systems
- Zombie
Title
2.7 - Given a scenario, implement security best practices to secure a workstation
Content
- Password Best Practices
- Account Management
- Disable Autorun
- Data Encryption
- Patch / Update Management
Title
2.8 - Given a scenario, implement methods for securing mobile devices
Content
- Screen Locks
- Remote Wipes
- Locator Applications
- Remote Backup Applications
- Failed Login Attempts Restrictions
- Antivirus / Anti-Malware
- Patching / OS Updates
- Biometric Authentication
- Full Device Encryption
- Multifactor Authentication
- Authenticator Applications
- Trusted Sources vs. Untrusted Sources
- Firewalls
- Policies and Procedures
Title
2.9 - Given a scenario, implement appropriate data destruction and disposal methods
Content
- Physical Destruction
- Recycling or Repurposing Best Practices
Title
2.10 - Given a scenario, configure security on SOHO wireless and wired networks
Content
- Wireless-Specific
- Change Default Usernames and Passwords
- Enable MAC Filtering
- Assign Static UP Addresses
- Firewall SEttings
- Port Forwarding / Mapping
- Disabling Ports
- Content Filtering / Parental Controls
- Update Firmware
- Physical Security