pacing guide-full (2)

docx

School

Western Governors University *

*We aren’t endorsed by this school

Course

D329

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by LieutenantFire12897

Report
Security + 601 Pacing Guide Course Link: https://lrps.wgu.edu/provision/284891943 Week 1 Topic 1A: Compare and Contrast Information Security Roles Review Activity: Information Security Roles PBQ 1A: Compare and Contrast Security Control and Framework Types Topic 1B: Compare and Contrast security Control and Framework Review Activity: Security Control and Framework PBQ 1B: Lesson 1: Practice Questions Assisted Lab: Exploring the lab environment Topic 2A: Explain Threat Actor Types and Attack Vectors Review Activity: Threat Actor Types and Attack Vectors Topic 2B: Explain Threat Intelligence Sources Review Activity: Threat Intelligence Sources Lesson 2: Practice Questions Lesson 3A: Assess Organizational Security with Network Review Activity: organizational Security with Network Reconnaissance Tools Assisted Lab: Exploring the Lab Environment Assisted Lab: Scanning and Identifying Network Nodes Assisted Lab: Scanning and Identifying Network Nodes Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools PBQ 3A: Assess Organizational Security with Network Reconnaissance Tools Topic 3B: Explain Security Concerns with General Vulnerability Types Review Activity: Security Concerns with General Vulnerability Types Topic 3C: Summarize Vulnerability Scanning Techniques Review Activity: Vulnerability Scanning Techniques Assisted Lab: analyzing the Results of a Credentialed Vulnerability Scan Topic 3D: Explain Penetration Testing Concepts Lesson 3: Practice Questions Assisted Lab: Scanning and Identifying Network Nodes Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan Week 2 Topic 4A: Compare and Contrast Social Engineering Techniques Review Activity: Social Engineering Techniques PBQ 4A: Compare and Contrast Social Engineering Techniques Topic 4B: Analyze Indicators of Malware-Based Attacks Review Activity: Indicators of Malware-Based Attacks PBQ4B: Analyze Indicators of Malware-Based Attacks Assisted Lab: Installing, Using, and Blocking a Malware-Based Backdoor Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning Lesson 4: Practice Questions Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning Topic 5A: Compare and Contrast Cryptographic Ciphers Review Activity: Cryptographic Ciphers Topic 5B: Summarize Cryptographic Modes of Operation Review Activity: Cryptographic Modes of Operation
PBQ 5B: Summarize Cryptographic Modes of Operation Topic 5C: Summarize Cryptographic Use Cases and Weaknesses Review Activity: Summarize Cryptographic Use Cases and Weaknesses Topic 5D: Summarize Other Cryptographic Technologies Review Activity: Other Cryptographic Technologies Lesson 5: Practice Questions Topic 6A: Implement Certificates and Certificate Authorities Review Activity: Certificates and Certificate Authorities PBQ 6A: Implement Certificates and Certificate Authorities Assisted Lab: Managing the Life Cycle of a Certificate Topic 6B: Implement PKI Management Review Activity: PKI Management Assisted Lab: Managing the Lifecycle of a Certificate Assisted Lab: Managing Certificates with OpenSSL Lesson 6: Practice Questions Week 3 Topic 7A: Summarize Authentication Design Concepts Review Activity: Authentication Design Concepts Topic 7B: Implement Knowledge-Based Authentication Review Activity: Knowledge-Based Authentication PBQ 7B: Implement Knowledge-Based Authentication Assisted Lab: Auditing Passwords with a Password Cracking Utility Topic 7C: implement Authentication Technologies Review Activity: Authentication Technologies Assisted Lab: Managing Centralized Authentication Topic 7D: Summarize Biometrics Authentication Concepts Review Activity: Biometrics Authentication Concepts Lesson 7 Practice Questions Assisted Lab: Auditing Passwords with a Password Cracking Utility Assisted Lab: Managing Centralized Authentication Topic 8A: Implement Identity and Account Types Review Activity: Identity and Account Types Topic 8B: Implement Account Policies Review Activity: Account Policies PBQ 8B: Implement Account Policies Assisted Lab: Configuring a System for Auditing Policies Topic 8C: Implement Authorization Solutions Review Activity: Authorization Solutions Assisted Lab: Managing Access Controls in Linux Topic 8D: Explain the Importance of Personnel Policies Review Activity: Importance of Personnel Policies Lesson 8: Practice Questions Lesson 8 PBQ: Implement Identity, Account Types, and Account Policies Assisted Lab: Managing Access Controls in Windows Server Assisted Lab: Configuring a System for Auditing Policies Assisted Lab: Managing Access Controls in Linux Applied Lab: Configuring Identity and Access Management Controls
Topic 9A: Implement Secure Network Designs Review Activity: Secure Network Designs Topic 9B: Implement Secure Switching and Routing Review Activity: Secure Switching and Routing PBQ 9B: Implement Secure Switching and Routing Review Activity: Secure Switching and Routing PBQ 9B: Implement Secure Switching and Routing Assisted Lab: Implementing a Secure Network Design Topic 9C: Implement Secure Wireless Infrastructure Review Activity: Secure Wireless Infrastructure PBQ 9C: Implement Secure Wireless Infrastructure Topic 9D: Implement Load Balancers Review Activity: Load Balancers Lesson 9: Practice Questions Assisted Lab: I mplementing a Secure Network Design Week 4 Topic 10A: Implement Firewalls and Proxy Servers Review Activity Firewalls and Proxy Servers PBQ 10A: Implement Firewalls and Proxy Servers Assisted Lab: Configuring a Firewall Topic 10B: Implement Network Security Monitoring Review Activity: Network Security Monitoring Assisted Lab: Configuring and Intrusion Detection System Topic 10C: Summarize the Use of SIEM Review Activity: Use of SIEM Lesson 10: Practice Questions Assisted Lab: Configuring a Firewall Assisted Lab: Configuring an Intrusion Detection System Topic 11A: Implement Secure Network Operations Protocols Review Activity: Secure Network Operations Protocols Assisted Lab: Implementing Secure Network Addressing Protocols Topic 11B: Implement Secure Application Protocols Review Activity: Secure Application Protocols PBQ 11B: Implement Secure Application Protocols Topic 11C: Implement Secure Remote Access Protocols Review Activity: Secure Remote Access Protocols PBQ 11C: Implement Secure Remote Access Protocols Assisted Lab: Implementing a Virtual Private Network Assisted Lab: Implementing a secure SSH server Lesson 11: Practice Questions Assisted Lab: Implementing Secure Network Addressing Services Assisted Lab: Implementing a Virtual Private Network Assisted Lab: Implementing a Secure SSH Server Topic 12A: Implement Secure Firmware Review Activity: Secure Firmware Topic 12B: Implement Endpoint Security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Review Activity: Endpoint Security Assisted Lab: Implementing Endpoint Protection Topic 12C: Explain Embedded System Security Implications Review Activity: Embedded System Security Implications Lesson 12: Practice Questions Assisted Lab: Implementing Endpoint Protection Applied Lab: Securing the Network Infrastructure Week 5 Topic 13A: Implement Mobile Device Management Review Activity: Mobile Device Management PBQ 13A: Implement Mobile Device Management Topic 13B: Implement Secure Mobile Device Connections Review Activity: secure Mobile Device Connections Lesson 13: Practice Questions Topic 14A: Analyze Indicators of Application Attacks Review Activity: Indicators of Application Attacks Assisted Lab: Identifying Application Attack Indicators Topic 14B: Analyze Indicators of Web Application Attacks Review Activity: Indicators of Web Application Attacks Assisted Lab: Identifying a Browser Attack Topic 14C: Summarize Secure Coding Practices Review Activity: Secure Coding Practices Topic 14D: Implement secure Script Environments Assisted Lab: Implementing PowerShell Security Assisted Lab: Identifying Malicious Code Topic 14E: Summarize Deployment and Automation Concepts Review Activity: Deployment and Automation Concepts Lesson 14: Practice Questions Assisted Lab: Identifying Application Attack Indicators Assisted Lab: Identifying a Browser Attack Assisted Lab: Implementing PowerShell Security Assisted Lab: Identifying Malicious Code Applied Lab: Identifying Application Attacks Topic 15A: Summarize Secure Cloud and Virtualization Services Review Activity: Secure Cloud and Virtualization Services PBQ 15B Apply Cloud Security Solutions Topic 15B: Apply Cloud Security Solutions Review Activity: Cloud Security Solutions Topic 15C: Summarize Infrastructure as Code Concepts Review Activity: Infrastructure as a Code Lesson 15: Practice Questions Week 6 Topic 16A: Explain Privacy and Data Sensitivity Concepts Review Activity: Privacy and Data Sensitivity Concepts PBQ 16A: Explain Privacy and Data Protection Controls Review Activity: Privacy and Data Protection Controls Lesson 16: Practice Questions Applied Lab: Identifying Application Attacks
Topic 17A: Summarize Incident Response Procedures Review Activity: Incident Response Procedures PBQ 17A: Summarize Incident Response Procedures Topic 17B: Utilize Appropriate Data Sources for Incident Response Assisted Lab: Managing Data Sources for Incident Response Topic 17C: Apply Mitigation Controls Review Activity: Mitigation Controls Assisted Lab: Managing Data Sources for Incident Response Assisted Lab: Configuring Mitigation Controls Lesson 17: Practice Questions Topic 18A: Explain Key Aspects of Digital Forensics Documentation Review Activity: Explain Key Aspects of Digital Forensics Documentation Review Activity: Digital Forensics Documentation Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition Review Activity: Digital Forensics Evidence Acquisition Assisted Lab: Acquiring Digital Forensics Evidence Lesson 18: Practice Questions Week 7 Topic 19A: Explain Risk Management Processes and Concepts Review Activity: Risk Management Processes and Concepts PBQ 19A: Explain Risk Management Processes and Concepts Topic 19B: Explain Business Impact Analysis Concepts Review Activity: Business Impact Analysis Concepts Lesson 19: Practice questions Topic 20A: Implement Redundancy Strategies Review Activity: Redundancy Strategies PBQ 20A: Implement Redundancy Strategies Topic 20B: Implement Backup Strategies Review Activity: Backup Strategies Topic 20C: Implement Cybersecurity Resiliency Strategies Review Activity: Cybersecurity Resiliency Strategies Assisted Lab: Backing Up and Restoring Data in Windows and Linux Applied Lab: Managing Incident Response, Mitigation, and Recovery Lesson 20: Practice Questions Topic 21A: Explain the Importance of Physical Site Security Controls Review Activity: Physical Site Security Controls Topic 21B: Explain the Importance of Physical Host Security Controls Review Activity: Physical Host Security Controls Lesson 21: Practice Question Applied Lab: Managing Incident Response, Mitigation, and Recover Week 8 Final Assessment, review gaps and take the Security + Exam