Friday, February 13, 2009

IT109 Lesson Plan February 13th 2009

UNIT 9–MANAGING INTERNET
EXPLORER AND ITS SECURITY
FEATURES
READING
MOAC 70-270 Installing, Configuring, and Administering Microsoft Windows XP Professional
(2nd Edition) Textbook, Chapter 11, Configuring TCP/IP Addressing and Security, pp. 365-377,
Chapter 12, Managing Internet Explorer Connections and Security.
OBJECTIVES
After completing this unit, the student will have the opportunity to:
11: Manage Internet Connections, security settings, and privacy settings.
11.1: Identify Internet security threats.
11.2: Configure Windows Firewall settings.
11.3: Configure Internet connections in Internet Explorer.
11.4: Configure Internet Explorer security settings.
11.5: Configure Internet Explorer privacy settings.
11.6: Configure Internet Explorer using the group policy


SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES

Get Ready for Class Project

REVIEW QUESTIONS
Chapter 12, pp. 414–415, Review Questions 1–6
LAB EXERCISE 11-3: CONFIGURING FIREWALLS
Problem Statement:
See the scenario in Lab Manual Exercise 11-3.
Learning Objectives:
Configure Windows Firewall settings.
LAB EXERCISE 12-2: INTERNET SECURITY
Problem Statement:
See the scenario in Lab Manual Exercise 12-2.
Learning Objectives:
Configure Internet Explorer security settings.
LAB EXERCISE 12-3: MAINTAINING INTERNET EXPLORER
Problem Statement:
See the scenario in Lab Manual Exercise 12-3.
Learning Objectives:
Configure Internet Explorer privacy settings.
LAB EXERCISE 12-4: USE THE GROUP POLICY TO CONFIGURE
INTERNET EXPLORER
Problem Statement:
See the scenario in Lab Manual Exercise 12-4.
Learning Objectives:
Configure Internet Explorer using the group policy.

Friday, February 6, 2009

IT109 Lesson Plan for 02/06/2009

OBJECTIVES
After completing this unit, the student will have the opportunity to:
10: Manage local security policy by using templates and audit policy.
10.1: Configure security options.
10.2: Create a security template.
10.3: Use the Security Configuration and Analysis snap-in.
10.4: Configure security by using the SECEDIT.EXE command.
10.5: Manage the security audit policy.


SUGGESTED ACTIVITIES, ASSIGNMENTS & DELIVERABLES

Read
Chapter 11, Configuring TCP/IP Addressing and Security, pp. 365-377,
Chapter 12, Managing Internet Explorer Connections and Security.


LAB EXERCISE 14-1: CONFIGURING SECURITY OPTIONS
Problem Statement:
See the scenario in Lab Manual Exercise 14-1.
Learning Objectives:
Configure security options.
LAB EXERCISE 14-2: UNDERSTANDING SECURITY TEMPLATES
Problem Statement:
See the scenario in Lab Manual Exercise 14-2.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-3: CREATING AND EDITING A SECURITY
TEMPLATE
Problem Statement:
See the scenario in Lab Manual Exercise 14-3.
Learning Objectives:
Create a security template.
LAB EXERCISE 14-4: USING THE SECURITY CONFIGURATION AND
ANALYSIS TOOL
Problem Statement:
See the scenario in Lab Manual Exercise 14-4.
Learning Objectives:
Use the Security Configuration and Analysis snap-in.
LAB EXERCISE 14-5: USING SECEDIT
Problem Statement:
See the scenario in Lab Manual Exercise 14-5.
Learning Objectives:
Configure security by using the SECEDIT.EXE command.