Instructor Materials Chapter 7: Fortifying the
Author : tawny-fly | Published Date : 2025-08-16
Description: Instructor Materials Chapter 7 Fortifying the Kingdom Cybersecurity Essentials v10 Instructor Materials Chapter 7 Planning Guide This PowerPoint deck is divided in two parts Instructor Planning Guide Information to help you become
Presentation Embed Code
Download Presentation
Download
Presentation The PPT/PDF document
"Instructor Materials Chapter 7: Fortifying the" is the property of its rightful owner.
Permission is granted to download and print the materials on this website for personal, non-commercial use only,
and to display it on your personal computer provided you do not modify the materials and that you retain all
copyright notices contained in the materials. By downloading content from our website, you accept the terms of
this agreement.
Transcript:Instructor Materials Chapter 7: Fortifying the:
Instructor Materials Chapter 7: Fortifying the Kingdom Cybersecurity Essentials v1.0 Instructor Materials - Chapter 7 Planning Guide This PowerPoint deck is divided in two parts: Instructor Planning Guide Information to help you become familiar with the chapter Teaching aids Instructor Class Presentation Optional slides that you can use in the classroom Begins on slide #10 Note: Remove the Planning Guide from this presentation before sharing with anyone. Cybersecurity Essentials v1.0 Planning Guide Chapter 7: Fortifying the Kingdom Chapter 7: Activities What activities are associated with this chapter? Chapter 7: Activities (Cont.) What activities are associated with this chapter? The password used in the Packet Tracer activities in this chapter is: PT_cyber1 Chapter 7: Assessment Students should complete Chapter 7, “Assessment” after completing Chapter 7. Quizzes, labs, Packet Tracers and other activities can be used to informally assess student progress. Prior to teaching Chapter 7, the instructor should: Complete Chapter 7, “Assessment.” The concepts and topics covered here will follow the students through their cybersecurity career. Make sure to take your time to eliminate any misconceptions. This chapter introduces many of the procedures and methods used to defend information networks and systems. These defenses should and must cross boundaries like networks, systems, file systems and user accounts. Have student write a two minute paper on the concept of defense in depth. The chapter also introduces incident response. Review the stages of incident response and have students work together in teams to create an incident response plan. Chapter 7: Best Practices Chapter 7: Best Practices (Cont.) This chapter covers a wide range of topics related to defending information systems. Encourage students to explore each of the major topics in this chapter. Chapter 7: Additional Help For additional help with teaching strategies, including lesson plans, analogies for difficult concepts, and discussion topics, visit the Cybersecurity Essentials Community at community.netacad.net. If you have lesson plans or resources that you would like to share, upload them to the Cybersecurity Essentials Community in order to help other instructors. Chapter 7: Fortifying the Kingdom Cybersecurity Essentials v1.0 Chapter 7 - Sections & Objectives 7.1 Defending Systems and Devices Describe how cybersecurity domains are used within the CIA triad. Explain how technologies, processes and procedures protect systems. 7.2 Server Hardening Explain how to protect servers on a network. 7.3 Network Hardening Explain how to implement security measures to protect network devices. 7.4 Physical Security Explain how physical security