Section 12.1: Best Practices 

·         Implement the Principle of Least Privilege

·         Require passwords

·         Use strong passwords

·         Use file and folder permissions

·         Disable the Guest user account

·         Don’t use default user names

·         Disable autorun

 

Students will learn how to:

 

Lecture Focus Questions:

Video/Demo                                                          Time

video12.1.1 Best Practices for Securing Workstations       14:09

Lab/Activity

Number of Exam Questions

4 questions

Total Time

About 25 minutes

Section 12.2: Physical Security

·         Building security

·         Hardware locks

·         Lock the workstation

·         Computer tracking service

·         Removable storage

·         Storage media disposal

·         Mobile devices

 

Students will learn how to:

Lecture Focus Questions:

Video/Demo                                                          Time

video12.2.1 Physical Security                                                            19:39

video12.2.3 Data Disposal and Destruction                                    10:05
demo12.2.4 Wiping a Disk                                                        7:35
demo12.2.5 Configuring a Screen Saver Password           5:20

 Total                                                                           42:39

Lab/Activity

Number of Exam Questions

6 questions

Time

About 60 minutes

Section 12.3: Social Engineering  

In this section students will learn how social engineering exploits human nature to convince someone to perform an activity.  Concepts discussed include:

 

Lecture Focus Questions:

Video/Demo                                                Time

video12.3.1 Social Engineering                                8:25

Number of Exam Questions

7 questions

Total Time

About 20 minutes

Section 12.4: BIOS Security  

In this section students will learn the basics of BIOS security. Concepts covered include:

 

·         Security-related features in the BIOS

o   BIOS passwords

o   Chassis intrusion detection

o   Hard disk password

o   Trusted Platform Module (TPM) 

Students will learn how to:

Lecture Focus Questions:

Video/Demo                                                Time

video12.4.1 BIOS Security                                            9:52
demo12.4.2 Configuring BIOS Security Settings     8:04

 Total                                                               17:56

Lab/Activity

Number of Exam Questions

5 questions

Total Time

About 30 minutes

Section 12.5: Malware Protection  

·         Common malware

o   Virus

o   Worm

o   Trojan horse

o   Rootkit

o   Spyware

o   Adware

o   Grayware

o   Spam

·         Using anti-virus software to protect against malware

·         Additional countermeasures for malware

·         Malicious code

·         Considerations about protecting against malware

·         Symptoms of malware

·         Remediation

·         Actions to recover from malware

 

Students will learn how to:

 

Lecture Focus Questions:

Video/Demo                                                Time

video12.5.1 Malware                                                      3:39
demo12.5.2 Implementing Malware Protection        4:57

video12.5.4 Malware Protection                                13:08
demo12.5.5 Implementing Virus Protection                        15:25

 Total                                                               37:09

Number of Exam Questions

18 questions

Total Time

About 70 minutes

Section 12.6: Authentication

This section discusses using authentication to validate a user’s identity.  Topics covered include:

 

·         Authentication credentials

o   Password

o   Smart card

o   Biometric

·         Categories of authentication factors:

o   Something the user knows

o   Something the user has

o   Something the user is

·         Multifactor authentication

·         Password weaknesses

·         Strong password policy

·         Control passwords with policy settings:

o   Password Policy settings:

§  Minimum password length

§  Password complexity

§  Maximum password age

§  Minimum password age

§  Enforce password history

o   Account Lockout Policy settings:

§  Account lockout threshold

§  Account lockout duration

§  Reset account lockout counter after

·         Troubleshooting user authentication

 

Students will learn how to:

Lecture Focus Questions:

Video/Demo                                                Time

video12.6.1 Authentication                                        16:34
demo12.6.4 Configuring Password Policies                       13:52

demo12.6.6 Using a Biometric Scanner                    3:41

demo12.6.7 Managing Authentication 1                  13:10

demo12.6.8 Managing Authentication 2                  11:20

 Total                                                               58:37

Lab/Activity

Number of Exam Questions

14 questions

Total Time

About 90 minutes

 

Section 12.7: Encryption

This section discusses using encryption to secure data by obscuring it from those who do not have the required key to access the data. Details about the following are presented:

 

·         Types of encryption:

o   File encryption

o   Disk encryption

o   Data transmission encryption

 

Students will learn how to:

Lecture Focus Questions:

Video/Demo                                      Time

video12.7.1 Encryption                                     5:08
demo12.7.3 Encrypting Files                           8:45

 Total                                                   13:53

Lab/Activity

Number of Exam Questions

9 questions

Total Time

About 30 minutes

Section 12.8: Network Security

This section discusses securing a network. Details about the following are presented:

 

·         Best practices for a wired network:

o   Physical security

o   Unnecessary software

o   User accounts

o   Usernames and passwords

o   MAC address filtering

o   Static IP addressing

o   Disabling ports

·         Best practices for a wireless network:

o   Usernames and passwords

o   SSID names

o   SSID broadcast

o   Encryption

o   MAC address filtering

o   Static IP addressing

o   Data emanation

 

Students will learn how to:

 

Lecture Focus Questions:

Video/Demo                                                          Time

video12.8.1 Wired Network Security Best Practices          17:45

12.8.3 Wireless Network Security Best Practices     14:57

 Total                                                                           32:42

Number of Exam Questions

4 questions

Total Time

About 45 minutes

Section 12.9: Firewalls  

This section discusses using firewalls to inspect network traffic and allow or block traffic based on a set of rules. Concepts covered include:

 

 

Students will learn how to:

 

Lecture Focus Questions:

Video/Demo                                                Time

video12.9.1 Introduction to Firewalls                                                  8:01

video12.9.2 Firewalls                                                               10:39
demo12.9.3 Configuring Windows Firewall                                      3:50

demo12.9.4 Configuring a Network-Based Firewall          13:46

 Total                                                                           36:16

Lab/Activity

Number of Exam Questions

9 questions

Total Time

About 55 minutes

Section 12.10: Proxy Servers  

This section discusses the role of a proxy server.

 

Students will learn how to:

 

 

Lecture Focus Questions:

Video/Demo                                                Time

video12.10.1 Proxy Servers                                          4:49

demo12.10.2 Configuring Proxy Settings                  5:25

 Total                                                               10:14

Lab/Activity

Number of Exam Questions

4 questions

Total Time

About 20 minutes