UNIT 9–MANAGING INTERNET
EXPLORER AND ITS SECURITY
FEATURES
READING
MOAC 70-270 Installing, Configuring, and Administering Microsoft Windows XP Professional
(2nd Edition) Textbook, Chapter 11, Configuring TCP/IP Addressing and Security, pp. 365-377,
Chapter 12, Managing Internet Explorer Connections and Security.
OBJECTIVES
After completing this unit, the student will have the opportunity to:
11: Manage Internet Connections, security settings, and privacy settings.
11.1: Identify Internet security threats.
11.2: Configure Windows Firewall settings.
11.3: Configure Internet connections in Internet Explorer.
11.4: Configure Internet Explorer security settings.
11.5: Configure Internet Explorer privacy settings.
11.6: Configure Internet Explorer using the group policy
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Get Ready for Class Project
REVIEW QUESTIONS
Chapter 12, pp. 414–415, Review Questions 1–6
LAB EXERCISE 11-3: CONFIGURING FIREWALLS
Problem Statement:
See the scenario in Lab Manual Exercise 11-3.
Learning Objectives:
Configure Windows Firewall settings.
LAB EXERCISE 12-2: INTERNET SECURITY
Problem Statement:
See the scenario in Lab Manual Exercise 12-2.
Learning Objectives:
Configure Internet Explorer security settings.
LAB EXERCISE 12-3: MAINTAINING INTERNET EXPLORER
Problem Statement:
See the scenario in Lab Manual Exercise 12-3.
Learning Objectives:
Configure Internet Explorer privacy settings.
LAB EXERCISE 12-4: USE THE GROUP POLICY TO CONFIGURE
INTERNET EXPLORER
Problem Statement:
See the scenario in Lab Manual Exercise 12-4.
Learning Objectives:
Configure Internet Explorer using the group policy.
Friday, February 13, 2009
Friday, February 6, 2009
IT109 Lesson Plan for 02/06/2009
OBJECTIVES
After completing this unit, the student will have the opportunity to:
10: Manage local security policy by using templates and audit policy.
10.1: Configure security options.
10.2: Create a security template.
10.3: Use the Security Configuration and Analysis snap-in.
10.4: Configure security by using the SECEDIT.EXE command.
10.5: Manage the security audit policy.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Read
Chapter 11, Configuring TCP/IP Addressing and Security, pp. 365-377,
Chapter 12, Managing Internet Explorer Connections and Security.
LAB EXERCISE 14-1: CONFIGURING SECURITY OPTIONS
Problem Statement:
See the scenario in Lab Manual Exercise 14-1.
Learning Objectives:
Configure security options.
LAB EXERCISE 14-2: UNDERSTANDING SECURITY TEMPLATES
Problem Statement:
See the scenario in Lab Manual Exercise 14-2.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-3: CREATING AND EDITING A SECURITY
TEMPLATE
Problem Statement:
See the scenario in Lab Manual Exercise 14-3.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-4: USING THE SECURITY CONFIGURATION AND
ANALYSIS TOOL
Problem Statement:
See the scenario in Lab Manual Exercise 14-4.
Learning Objectives:
Use the Security Configuration and Analysis snap-in.
LAB EXERCISE 14-5: USING SECEDIT
Problem Statement:
See the scenario in Lab Manual Exercise 14-5.
Learning Objectives:
Configure security by using the SECEDIT.EXE command.
After completing this unit, the student will have the opportunity to:
10: Manage local security policy by using templates and audit policy.
10.1: Configure security options.
10.2: Create a security template.
10.3: Use the Security Configuration and Analysis snap-in.
10.4: Configure security by using the SECEDIT.EXE command.
10.5: Manage the security audit policy.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Read
Chapter 11, Configuring TCP/IP Addressing and Security, pp. 365-377,
Chapter 12, Managing Internet Explorer Connections and Security.
LAB EXERCISE 14-1: CONFIGURING SECURITY OPTIONS
Problem Statement:
See the scenario in Lab Manual Exercise 14-1.
Learning Objectives:
Configure security options.
LAB EXERCISE 14-2: UNDERSTANDING SECURITY TEMPLATES
Problem Statement:
See the scenario in Lab Manual Exercise 14-2.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-3: CREATING AND EDITING A SECURITY
TEMPLATE
Problem Statement:
See the scenario in Lab Manual Exercise 14-3.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-4: USING THE SECURITY CONFIGURATION AND
ANALYSIS TOOL
Problem Statement:
See the scenario in Lab Manual Exercise 14-4.
Learning Objectives:
Use the Security Configuration and Analysis snap-in.
LAB EXERCISE 14-5: USING SECEDIT
Problem Statement:
See the scenario in Lab Manual Exercise 14-5.
Learning Objectives:
Configure security by using the SECEDIT.EXE command.
Friday, January 30, 2009
IT109 Lesson Plan Week 7 01/30/2009
UNIT 7–MANAGING SHARED FOLDER SECURITY
READING
MOAC 70-270
Installing, Configuring, and Administering Microsoft Windows XP Professional
(2nd Edition) Textbook, Chapter 8, Configuring and Managing Shared Folder Security, pp. 253-
283.
OBJECTIVES
After completing this unit, the student will have the opportunity to:
9: Apply controlled access to shared folders by using permissions.
9.1: Explain the guidelines and requirements for using shared permissions.
9.2: Assign permissions to a shared folder by using different methods.
9.3: Access a shared folder.
9.4: Explain the effects of combining shared folder permissions and NTFS permissions.
9.5: Monitor access to shared folders by using the Computer Management console.
9.6: Configure the synchronization of offline folders.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Read Chapter 14
REVIEW QUESTIONS
Chapter 8, pp. 290–291, Review Questions 1–10
LAB EXERCISE 8-1: SHARING A FOLDER ON THE NETWORK
Problem Statement:
See the scenario in Lab Manual Exercise 8-1.
Learning Objectives:
Assign permissions to the shared folder by using different methods.
LAB EXERCISE 8-2: ACCESSING SHARED FOLDERS
Problem Statement:
See the scenario in Lab Manual Exercise 8-2.
Learning Objectives:
Access the shared folder.
LAB EXERCISE8-3: MONITORING SHARED FOLDERS
Problem Statement:
See the scenario in Lab Manual Exercise 8-3.
Learning Objectives:
Monitor access to shared folders by using the Computer Management console.
LAB EXERCISE 8-4: CONFIGURING SYNCHRONIZATION
Problem Statement:
See the scenario in Lab Manual Exercise 8-4.
Learning Objectives:
Configure the synchronization of offline folders.
LAB EXERCISE 8-5: SHARING A FOLDER WITH DIFFERENT NAMES
Problem Statement:
See the scenario in Lab Manual Exercise 8-5.
Learning Objectives:
Assign permissions to the shared folder by using different methods.
READING
MOAC 70-270
Installing, Configuring, and Administering Microsoft Windows XP Professional
(2nd Edition) Textbook, Chapter 8, Configuring and Managing Shared Folder Security, pp. 253-
283.
OBJECTIVES
After completing this unit, the student will have the opportunity to:
9: Apply controlled access to shared folders by using permissions.
9.1: Explain the guidelines and requirements for using shared permissions.
9.2: Assign permissions to a shared folder by using different methods.
9.3: Access a shared folder.
9.4: Explain the effects of combining shared folder permissions and NTFS permissions.
9.5: Monitor access to shared folders by using the Computer Management console.
9.6: Configure the synchronization of offline folders.
SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES
Read Chapter 14
REVIEW QUESTIONS
Chapter 8, pp. 290–291, Review Questions 1–10
LAB EXERCISE 8-1: SHARING A FOLDER ON THE NETWORK
Problem Statement:
See the scenario in Lab Manual Exercise 8-1.
Learning Objectives:
Assign permissions to the shared folder by using different methods.
LAB EXERCISE 8-2: ACCESSING SHARED FOLDERS
Problem Statement:
See the scenario in Lab Manual Exercise 8-2.
Learning Objectives:
Access the shared folder.
LAB EXERCISE8-3: MONITORING SHARED FOLDERS
Problem Statement:
See the scenario in Lab Manual Exercise 8-3.
Learning Objectives:
Monitor access to shared folders by using the Computer Management console.
LAB EXERCISE 8-4: CONFIGURING SYNCHRONIZATION
Problem Statement:
See the scenario in Lab Manual Exercise 8-4.
Learning Objectives:
Configure the synchronization of offline folders.
LAB EXERCISE 8-5: SHARING A FOLDER WITH DIFFERENT NAMES
Problem Statement:
See the scenario in Lab Manual Exercise 8-5.
Learning Objectives:
Assign permissions to the shared folder by using different methods.
Friday, January 23, 2009
IT 109 Lesson Plan for 01/23/2009
Mr. Perez IT109 Week 6
Lecture Plan MOAC 70-270
OBJECTIVES
After completing this unit, the student will have the opportunity to:
7: Manage user accounts and groups to include their properties, rights, and policies.
7.1: Explain the difference between users and groups.
7.2: Plan user accounts and groups.
7.3: Create user accounts with local users and groups.
7.4: Create groups.
7.5: Manage user account-related system policies.
7.6: Create a roaming profile.
SUGGESTED ACTIVITIES, ASSIGNMENTS, AND DELIVERABLES
Read Chapter 7, Configuring and Managing NTFS Security, pp 219-245.
Review Questions for Chapter 7
Read Chapter 8: Configuring and Managing Shared Folder Security
Review Questions for Chapter 8
LAB EXERCISE 13-1: CREATING USERS AND GROUPS
Problem Statement:
See the scenario in Lab Manual Exercise 13-1.
Learning Objectives:
Create user accounts with local users and groups.
Create groups.
LAB EXERCISE 13-2: ASSIGNING USER RIGHTS
Problem Statement:
See the scenario in Lab Manual Exercise 13-2.
Learning Objectives:
Create user accounts with local users and groups.
Create groups.
LAB EXERCISE 13-3: CONFIGURE ROAMING PROFILES
Problem Statement:
See the scenario in Lab Manual Exercise 13-3.
Learning Objectives:
Create a roaming profile.
Lecture Plan MOAC 70-270
OBJECTIVES
After completing this unit, the student will have the opportunity to:
7: Manage user accounts and groups to include their properties, rights, and policies.
7.1: Explain the difference between users and groups.
7.2: Plan user accounts and groups.
7.3: Create user accounts with local users and groups.
7.4: Create groups.
7.5: Manage user account-related system policies.
7.6: Create a roaming profile.
SUGGESTED ACTIVITIES, ASSIGNMENTS, AND DELIVERABLES
Read Chapter 7, Configuring and Managing NTFS Security, pp 219-245.
Review Questions for Chapter 7
Read Chapter 8: Configuring and Managing Shared Folder Security
Review Questions for Chapter 8
LAB EXERCISE 13-1: CREATING USERS AND GROUPS
Problem Statement:
See the scenario in Lab Manual Exercise 13-1.
Learning Objectives:
Create user accounts with local users and groups.
Create groups.
LAB EXERCISE 13-2: ASSIGNING USER RIGHTS
Problem Statement:
See the scenario in Lab Manual Exercise 13-2.
Learning Objectives:
Create user accounts with local users and groups.
Create groups.
LAB EXERCISE 13-3: CONFIGURE ROAMING PROFILES
Problem Statement:
See the scenario in Lab Manual Exercise 13-3.
Learning Objectives:
Create a roaming profile.
Friday, January 16, 2009
IT109 Lesson Plan for 01/16/09
Mr. Perez IT109 Week 5
Lecture Plan MOAC 70-270
Installing, Configuring, and Administering Microsoft® Windows® XP Professional
Chapter 5, ”Configuring and Managing the User Experience”
Learning Objectives
After completing this lesson, students will be able to:
Configure and manage desktop components.
Configure display options.
Configure multiple displays.
Configure power management options.
Manage users’ profiles and data.
Configure regional and language settings.
Manage accessibility settings.
Assignment and Homework:
Chapter 5 Review Questions
Labs 5 Review Questions
Lab 5-1
Lab 5-2
Lab 5-3
Lab 5-4
Read Chapter 13: Managing Users and Groups
Lecture Plan MOAC 70-270
Installing, Configuring, and Administering Microsoft® Windows® XP Professional
Chapter 5, ”Configuring and Managing the User Experience”
Learning Objectives
After completing this lesson, students will be able to:
Configure and manage desktop components.
Configure display options.
Configure multiple displays.
Configure power management options.
Manage users’ profiles and data.
Configure regional and language settings.
Manage accessibility settings.
Assignment and Homework:
Chapter 5 Review Questions
Labs 5 Review Questions
Lab 5-1
Lab 5-2
Lab 5-3
Lab 5-4
Read Chapter 13: Managing Users and Groups
Friday, January 9, 2009
IT109 Lesson Plan for 01/09/2009
This chapter covers device management and power management.
We will cover installation and configuration of computer hardware;
installing, updating, and troubleshooting device drivers;
and power management.
Learning Objectives
On completion of this lesson, students will be able to do the following:
Implement, manage, and troubleshoot input and output (I/O) devices
Manage and troubleshoot drivers and driver signing
Configure and monitor multiprocessor computers
Configure Advanced Configuration and Power Interface (ACPI) settings and support
Lab Assignments and Homework.
Lab Manual Exercises: 4-1, 4-3, 4-5, 4-6 including Lab Cleanup
Homework:
o Chapter 4 Review Questions 1-5
o Study for Quiz on Units 1-3
o Read Chapter 5
We will cover installation and configuration of computer hardware;
installing, updating, and troubleshooting device drivers;
and power management.
Learning Objectives
On completion of this lesson, students will be able to do the following:
Implement, manage, and troubleshoot input and output (I/O) devices
Manage and troubleshoot drivers and driver signing
Configure and monitor multiprocessor computers
Configure Advanced Configuration and Power Interface (ACPI) settings and support
Lab Assignments and Homework.
Lab Manual Exercises: 4-1, 4-3, 4-5, 4-6 including Lab Cleanup
Homework:
o Chapter 4 Review Questions 1-5
o Study for Quiz on Units 1-3
o Read Chapter 5
Subscribe to:
Posts (Atom)