Implement Device Security with Host-Based Firewall and Password Policy

Practice Labs Module
Time
47 minutes
Difficulty
Intermediate

Welcome to the "Implement Device Security with Host-Based Firewall and Password Policy" Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Overview

Introduction

Welcome to the Implement Device Security with Host-Based Firewall and Password Policy Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1. Create Firewall Rules
  • Exercise 2. Implement Password Policy

After completing this lab, you will be able to:

  • Configure a sample website and a secure website
  • Verify firewall rules on PLABDM01
  • Test firewall rules
  • Change a firewall rule
  • Create an outbound rule
  • Modify password policy
  • Verify application of password policy

Exam Objectives

The following exam objective is covered in this lab:

  • 6.2 Explain methods to secure devices and best practices.

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1 - Create Firewall Rules

A port is an endpoint of communication in computer networking. In the context of an operating system, a port is a theoretical entity that identifies a network service. The software port is composed of a numeric IP address of a host (computer), and the protocol type associated with a port number—both components identify the network address of a source and a destination host.

Learning Outcomes

After completing this exercise, you will be able to:

  • Configure a sample website and a secure website
  • Verify firewall rules on PLABDM01
  • Test firewall rules
  • Change a firewall rule
  • Create an outbound rule

Exercise 2 - Implement Password Policy

Desktop and server operating systems use passwords to prevent unauthorized access to the computer. Small to medium-sized organizations can use passwords to secure the network. When user data is accessible from any location or device, it makes sense to adopt stringent measures to ensure that only authorized persons have access to corporate assets.

This exercise will illustrate the use of passwords with the adoption of a restrictive password policy.

Learning Outcomes

After completing this exercise, you will be able to:

  • Modify password policy
  • Verify application of password policy
Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.