Please enable JavaScript to use CodeHS

Tennessee Cybersecurity II: 21

CodeHS Lessons

Utilizing prior fundamentals, demonstrate proper secure network configuration and administration. For example, use common tools and design a network utilizing secure protocols, and evaluate the network upon completion. The plan should address, but is not limited, to the following: a. Applying and implementing secure network administration principles. b. Demonstrating knowledge of how network services and protocols interact to provide network communications in order to securely implement and use common protocols. c. Identifying commonly used default network ports. d. Setting up a Network Address Translation (NAT) device. e. Configuring a Virtual Private Network (VPN). f. Configuring a remote access policy Layer 2 Tunneling Protocol (L2TP) and Point-toPoint Tunneling Protocol (PPTP). g. Demonstrating knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol (TCP/IP), Dynamic Host Configuration Protocol (DHCP) and directory services (e.g., Domain Name System (DNS) by setting up common protocols, e.g., Secure Shell (SSH), netstat, Simple Mail Transfer Protocol (SMTP), nslookup, Telnet, DNS/Bind, FTP, IIS/Web Pages, DHCP/DNS server. h. Locating open ports by completing a port scan. i. Demonstrating the knowledge and use of network statistics (netstat)

Standard
3.4 Private Networks
Standard
18.4 Private Networks
18.4 Private Networks
Standard
9.8 Private Networks
Standard
5.5 Private Networks
Standard
5.5 Private Networks