Objective:
- Students will be able to implement secure network designs.
Standards:
CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
- Infrastructure considerations
- Network Appliances
- Jump Server
- Proxy Server
- Intrusion Prevention System (IPS)/Intrusion Detection System (IDS)
- Load balancer
- Sensors
Guiding Question:
How are network appliances secured?
Resources:
- Lesson 3.2.2 – Network Appliances.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 3.2.2 – Network Appliances.pptx presentation in today’s class.
- Complete the Unit 3 – Network Appliances activity using the materials provided in Google Classroom.
Assigned: December 12th, 2025
Teacher Pacing Due Date: December 15th, 2025
Objective:
- Students will investigate common methods to enhance enterprise security with Firewalls, IDS/IPS devices and Web Filtering.
Standards:
CompTIA Security+ SYO-701 Objective:
4.5 – Given a scenario, modify enterprise capabilities to enhance security
- Firewalls
- Rules
- Access lists
- Ports/protocols
- Screened subnets
- IDS/IPS
- Web filter
- Agent-based
- Centralized proxy
- Universal Resource Locator (URL) scanning
- Content categorization
- Block rules
- Reputation
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
- Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 4.5.3 – Endpoint – Firewall, IDS/IPS & Web Filter.pptx presentation in today’s class.
- Complete the Unit 3 – Endpoint Firewall, IDS, and Web Filter activity using the materials provided in Google Classroom.
Assigned: December 11th, 2025
Teacher Pacing Due Date: December 12th, 2025
Objective:
- Students will compare various types of infrastructure security systems.
Standards:
CompTIA Security+ SYO-701 Objective:
3.2 – Given a scenario, apply security principles to secure enterprise infrastructure
- Infrastructure considerations
- Device placement
- Security zones
- Attack surface
- Connectivity
- Failure modes
- Device attribute
- Active vs passive
- Inline vs tap/monitor
- Port security
- 802.1X
- Extensible Authentication Protocol (EAP)
- Firewall types
- Web application firewall (WAF)
- Unified threat management (UTM)
- Next-generation firewall (NGFW)
- Layer 4/Layer 7
Guiding Question:
What is the best way to secure an organization’s infrastructure?
Resources:
- Lesson 3.2.1 – Infrastructure Considerations.pptx Presentation available on Google Classroom
Assignment:
- Read the Lesson 3.2.1 – Infrastructure Considerations.pptx presentation in today’s class.
- Complete the Unit 3 – Infrastructure Considerations activity using the materials provided in Google Classroom.
Assigned: December 10th, 2025
Teacher Pacing Due Date: December 11th, 2025
It's dangerous to go alone!