In this lesson, students will build upon their foundational knowledge of networks to learn about advanced network devices. Students will delve into devices that enable communication and data sharing, such as servers and load balancers, as well as devices that increase network security, such as firewalls, IDP, IPD, and UTM. In sum, students will understand how complex networks use a variety of devices, each playing an important role in the functionality and security of the network.
Students will be able to:
In this lesson, students will learn about the importance of physical security as well as environmental controls. Students will understand that the security and functionality of a network goes beyond simply having the necessary devices - it includes proper security and maintenance of the devices.
In this lesson, students will learn about the many protocols and standards that are used to send and receive information across a network. Students will learn how networks use specific ports and protocols, each with a specific purpose, such as sending and receiving emails. Students will also learn about wireless networking standards and how frequency and channels relate to speed of data transmission.
Students will be able to:
In this lesson, students will build on their knowledge of networks and consider how to ensure the perimeter of a network is secure. Students will learn about different devices that can be used to secure a company’s intranet from the internet as well as ways to enable remote access to the intranet.
Students will be able to:
In this lesson, students will extend their understanding of securing a network to include securing mobile devices. Students will learn about best practices for mobile device security as well as how BYOD (bring your own device) policies have impacted a company’s network security.
Students will be able to:
At this point, students have a strong understanding of how different devices can be used to configure a secure network. In this lesson, students will learn how access controls and the AAA protocol (authentication, authorization, and accounting) can be used to ensure only authorized personnel access a network.
Students will be able to:
In this lesson, students review content with a 20 question Unit Quiz.
Students will be able to: