pacing guide-full (2)
docx
keyboard_arrow_up
School
Western Governors University *
*We aren’t endorsed by this school
Course
D329
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by LieutenantFire12897
Security + 601 Pacing Guide Course Link: https://lrps.wgu.edu/provision/284891943
Week 1
Topic 1A: Compare and Contrast Information Security Roles
Review Activity: Information Security Roles
PBQ 1A: Compare and Contrast Security Control and Framework Types
Topic 1B: Compare and Contrast security Control and Framework
Review Activity: Security Control and Framework
PBQ 1B:
Lesson 1: Practice Questions
Assisted Lab: Exploring the lab environment Topic 2A: Explain Threat Actor Types and Attack Vectors
Review Activity: Threat Actor Types and Attack Vectors
Topic 2B: Explain Threat Intelligence Sources
Review Activity: Threat Intelligence Sources
Lesson 2: Practice Questions
Lesson 3A: Assess Organizational Security with Network
Review Activity: organizational Security with Network Reconnaissance Tools
Assisted Lab: Exploring the Lab Environment
Assisted Lab: Scanning and Identifying Network Nodes
Assisted Lab: Scanning and Identifying Network Nodes
Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
PBQ 3A: Assess Organizational Security with Network Reconnaissance Tools
Topic 3B: Explain Security Concerns with General Vulnerability Types
Review Activity: Security Concerns with General Vulnerability Types
Topic 3C: Summarize Vulnerability Scanning Techniques
Review Activity: Vulnerability Scanning Techniques
Assisted Lab: analyzing the Results of a Credentialed Vulnerability Scan
Topic 3D: Explain Penetration Testing Concepts
Lesson 3: Practice Questions
Assisted Lab: Scanning and Identifying Network Nodes
Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
Week 2
Topic 4A: Compare and Contrast Social Engineering Techniques
Review Activity: Social Engineering Techniques
PBQ 4A: Compare and Contrast Social Engineering Techniques
Topic 4B: Analyze Indicators of Malware-Based Attacks
Review Activity: Indicators of Malware-Based Attacks
PBQ4B: Analyze Indicators of Malware-Based Attacks
Assisted Lab: Installing, Using, and Blocking a Malware-Based Backdoor
Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning
Lesson 4: Practice Questions
Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning
Topic 5A: Compare and Contrast Cryptographic Ciphers
Review Activity: Cryptographic Ciphers
Topic 5B: Summarize Cryptographic Modes of Operation
Review Activity: Cryptographic Modes of Operation
PBQ 5B: Summarize Cryptographic Modes of Operation
Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
Review Activity: Summarize Cryptographic Use Cases and Weaknesses
Topic 5D: Summarize Other Cryptographic Technologies
Review Activity: Other Cryptographic Technologies
Lesson 5: Practice Questions
Topic 6A: Implement Certificates and Certificate Authorities
Review Activity: Certificates and Certificate Authorities
PBQ 6A: Implement Certificates and Certificate Authorities
Assisted Lab: Managing the Life Cycle of a Certificate
Topic 6B: Implement PKI Management
Review Activity: PKI Management
Assisted Lab: Managing the Lifecycle of a Certificate
Assisted Lab: Managing Certificates with OpenSSL
Lesson 6: Practice Questions
Week 3
Topic 7A: Summarize Authentication Design Concepts
Review Activity: Authentication Design Concepts
Topic 7B: Implement Knowledge-Based Authentication
Review Activity: Knowledge-Based Authentication
PBQ 7B: Implement Knowledge-Based Authentication
Assisted Lab: Auditing Passwords with a Password Cracking Utility
Topic 7C: implement Authentication Technologies
Review Activity: Authentication Technologies
Assisted Lab: Managing Centralized Authentication
Topic 7D: Summarize Biometrics Authentication Concepts
Review Activity: Biometrics Authentication Concepts
Lesson 7 Practice Questions
Assisted Lab: Auditing Passwords with a Password Cracking Utility
Assisted Lab: Managing Centralized Authentication
Topic 8A: Implement Identity and Account Types
Review Activity: Identity and Account Types
Topic 8B: Implement Account Policies
Review Activity: Account Policies
PBQ 8B: Implement Account Policies
Assisted Lab: Configuring a System for Auditing Policies
Topic 8C: Implement Authorization Solutions
Review Activity: Authorization Solutions
Assisted Lab: Managing Access Controls in Linux
Topic 8D: Explain the Importance of Personnel Policies
Review Activity: Importance of Personnel Policies
Lesson 8: Practice Questions
Lesson 8 PBQ: Implement Identity, Account Types, and Account Policies
Assisted Lab: Managing Access Controls in Windows Server
Assisted Lab: Configuring a System for Auditing Policies
Assisted Lab: Managing Access Controls in Linux
Applied Lab: Configuring Identity and Access Management Controls
Topic 9A: Implement Secure Network Designs
Review Activity: Secure Network Designs
Topic 9B: Implement Secure Switching and Routing
Review Activity: Secure Switching and Routing
PBQ 9B: Implement Secure Switching and Routing
Review Activity: Secure Switching and Routing
PBQ 9B: Implement Secure Switching and Routing
Assisted Lab: Implementing a Secure Network Design
Topic 9C: Implement Secure Wireless Infrastructure
Review Activity: Secure Wireless Infrastructure
PBQ 9C: Implement Secure Wireless Infrastructure
Topic 9D: Implement Load Balancers
Review Activity: Load Balancers
Lesson 9: Practice Questions
Assisted Lab: I
mplementing a Secure Network Design
Week 4
Topic 10A: Implement Firewalls and Proxy Servers
Review Activity Firewalls and Proxy Servers
PBQ 10A: Implement Firewalls and Proxy Servers
Assisted Lab: Configuring a Firewall
Topic 10B: Implement Network Security Monitoring
Review Activity: Network Security Monitoring
Assisted Lab: Configuring and Intrusion Detection System
Topic 10C: Summarize the Use of SIEM
Review Activity: Use of SIEM
Lesson 10: Practice Questions
Assisted Lab: Configuring a Firewall
Assisted Lab: Configuring an Intrusion Detection System
Topic 11A: Implement Secure Network Operations Protocols
Review Activity: Secure Network Operations Protocols
Assisted Lab: Implementing Secure Network Addressing Protocols
Topic 11B: Implement Secure Application Protocols
Review Activity: Secure Application Protocols
PBQ 11B: Implement Secure Application Protocols
Topic 11C: Implement Secure Remote Access Protocols
Review Activity: Secure Remote Access Protocols
PBQ 11C: Implement Secure Remote Access Protocols
Assisted Lab: Implementing a Virtual Private Network
Assisted Lab: Implementing a secure SSH server
Lesson 11: Practice Questions
Assisted Lab: Implementing Secure Network Addressing Services
Assisted Lab: Implementing a Virtual Private Network
Assisted Lab: Implementing a Secure SSH Server
Topic 12A: Implement Secure Firmware
Review Activity: Secure Firmware
Topic 12B: Implement Endpoint Security
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Review Activity: Endpoint Security
Assisted Lab: Implementing Endpoint Protection
Topic 12C: Explain Embedded System Security Implications
Review Activity: Embedded System Security Implications
Lesson 12: Practice Questions
Assisted Lab: Implementing Endpoint Protection
Applied Lab: Securing the Network Infrastructure
Week 5
Topic 13A: Implement Mobile Device Management
Review Activity: Mobile Device Management
PBQ 13A: Implement Mobile Device Management
Topic 13B: Implement Secure Mobile Device Connections
Review Activity: secure Mobile Device Connections
Lesson 13: Practice Questions
Topic 14A: Analyze Indicators of Application Attacks
Review Activity: Indicators of Application Attacks
Assisted Lab: Identifying Application Attack Indicators
Topic 14B: Analyze Indicators of Web Application Attacks
Review Activity: Indicators of Web Application Attacks
Assisted Lab: Identifying a Browser Attack
Topic 14C: Summarize Secure Coding Practices
Review Activity: Secure Coding Practices
Topic 14D: Implement secure Script Environments
Assisted Lab: Implementing PowerShell Security
Assisted Lab: Identifying Malicious Code
Topic 14E: Summarize Deployment and Automation Concepts
Review Activity: Deployment and Automation Concepts
Lesson 14: Practice Questions
Assisted Lab: Identifying Application Attack Indicators
Assisted Lab: Identifying a Browser Attack
Assisted Lab: Implementing PowerShell Security
Assisted Lab: Identifying Malicious Code
Applied Lab: Identifying Application Attacks
Topic 15A: Summarize Secure Cloud and Virtualization Services
Review Activity: Secure Cloud and Virtualization Services
PBQ 15B Apply Cloud Security Solutions
Topic 15B: Apply Cloud Security Solutions
Review Activity: Cloud Security Solutions
Topic 15C: Summarize Infrastructure as Code Concepts
Review Activity: Infrastructure as a Code
Lesson 15: Practice Questions
Week 6
Topic 16A: Explain Privacy and Data Sensitivity Concepts
Review Activity: Privacy and Data Sensitivity Concepts
PBQ 16A: Explain Privacy and Data Protection Controls
Review Activity: Privacy and Data Protection Controls
Lesson 16: Practice Questions
Applied Lab: Identifying Application Attacks
Topic 17A: Summarize Incident Response Procedures
Review Activity: Incident Response Procedures
PBQ 17A: Summarize Incident Response Procedures
Topic 17B: Utilize Appropriate Data Sources for Incident Response
Assisted Lab: Managing Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls
Review Activity: Mitigation Controls
Assisted Lab: Managing Data Sources for Incident Response
Assisted Lab: Configuring Mitigation Controls
Lesson 17: Practice Questions
Topic 18A: Explain Key Aspects of Digital Forensics Documentation
Review Activity: Explain Key Aspects of Digital Forensics Documentation
Review Activity: Digital Forensics Documentation
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Review Activity: Digital Forensics Evidence Acquisition
Assisted Lab: Acquiring Digital Forensics Evidence
Lesson 18: Practice Questions
Week 7
Topic 19A: Explain Risk Management Processes and Concepts
Review Activity: Risk Management Processes and Concepts
PBQ 19A: Explain Risk Management Processes and Concepts
Topic 19B: Explain Business Impact Analysis Concepts
Review Activity: Business Impact Analysis Concepts
Lesson 19: Practice questions
Topic 20A: Implement Redundancy Strategies
Review Activity: Redundancy Strategies
PBQ 20A: Implement Redundancy Strategies
Topic 20B: Implement Backup Strategies
Review Activity: Backup Strategies
Topic 20C: Implement Cybersecurity Resiliency Strategies
Review Activity: Cybersecurity Resiliency Strategies
Assisted Lab: Backing Up and Restoring Data in Windows and Linux
Applied Lab: Managing Incident Response, Mitigation, and Recovery
Lesson 20: Practice Questions
Topic 21A: Explain the Importance of Physical Site Security Controls
Review Activity: Physical Site Security Controls
Topic 21B: Explain the Importance of Physical Host Security Controls
Review Activity: Physical Host Security Controls
Lesson 21: Practice Question
Applied Lab: Managing Incident Response, Mitigation, and Recover
Week 8
Final Assessment, review gaps and take the Security + Exam