Security 11th Edition
ST
UV
INSTRUCTOR’S
IA
MANUAL
?_
AP
Raymond R. Panko
Julia L. Panko
PR
Comprehensive Instructor’s Manual for
OV
Instructors and Students
ED
© Raymond R. Panko & Julia L. Panko. All rights reserved. Reproduction or distribution
without permission is prohibited.
??
©MEDCONNOISSEUR
, Table of Contents
Instructors’ Manual for Business Data Networks and Security (11th Edition)
Authors: Raymond R. Panko, Julia L. Panko
ISBN: 9780134817125
ST
Chapter 1: Core Network Concepts and Terminology
UV
Chapter 2: Network Standards
Chapter 3: Network Management
Chapter 3a: Hands-On: Microsoft Office Visio
Chapter 4: Network Security
Chapter 5: Ethernet (802.3) Switched LANs
IA
Chapter 6: Wireless LANs I
Chapter 7: Wireless LANs II
Chapter 9: TCP/IP Internetworking II
?_
Chapter 10: Carrier Wide Area Networks (WANs)
Chapter 11: Networked Applications
AP
PR
OV
ED
??
©MEDCONNOISSEUR
, PANKO & PANKO: BUSINESS DATA NETWORKS AND SECURITY
COPYRIGHT 2019 PEARSON
Business Data Networks and Security, 11th
ST
Edition
Panko and Panko
UV
INSTRUCTORS’ MANUAL
IA
CONTENTS
?_
I Broad Matters
Why Networking and Security?
Concepts and Principles; then Applications to Technology
Teaching Individual Chapters
AP
Pedagogy
PowerPoint Presentations
Study Figures
Hands-On Chapters
Online Resources for Teachers
Student Pedagogy of the Book
PR
II and III Chapter Support
Chapter II Link to Teaching III Link to Test-Your-
Suggestions Understanding Question
Answers and Multiple-
Choice Questions
OV
Chapter 1: Core Network Concepts and Terminology Link Link
Chapter 2: Network Standards Link Link
Chapter 3: Network Management Link Link
Chapter 4: Network Security Link Link
Chapter 5: Ethernet (802.3) Wired Switched LANs Link Link
Chapter 6: Wireless LANs I Link Link
ED
Chapter 7: Wireless LANs II Link Link
Chapter 8: TCP/IP Internetworking I Link Link
Chapter 9: TCP/IP Internetworking II Link Link
Chapter 10: Carrier Wide Area Networks (WANs) Link Link
Chapter 11: Networked Applications Link Link
??
Appendix Managing the Security Process Link Link
Online Modules Link
Page 1 of 373
, PANKO & PANKO: BUSINESS DATA NETWORKS AND SECURITY
COPYRIGHT 2019 PEARSON
PART I: BROAD MATTERS
ST
This instructor’s manual has three parts.
✓ Broad Matters has key information about the book and using it in your course.
✓ Chapter Information gives information for teaching individual chapters.
UV
✓ Answer Keys and Multiple-Choice Questions are tied to individual Test-Your-Understanding
(TYU) questions in each chapter.
Why Networking and Security?
IA
The preface for adopters has more detail on why the book is right for courses. Here’s the short version:
✓ It’s right for a pure business data networking course because security is a huge part of todays’
networking profession. General security courses do not cover many relevant network security
concepts. Cover the 11 chapters plus some hands-on “a” chapters.
?_
✓ Its also right for the growing number of schools that combine introductory networking and
security courses. The Appendix adds additional information on planning and response that
balance the protection information in other chapters. It is good to cover the Appendix after
AP
Chapter 4, which is the security overview. It is also a fun way to end the term.
Concepts and Principles; Then Applications to Technologies
As noted in the Preface for Instructors, businesses want graduates who can approach technologies like
Wi-Fi, Ethernet, and applications holistically—how standards, management, and technology apply to
PR
each because that is how networking and security are done in organizations. This learn-and-apply
approach to networking and security concepts and principles also helps burn them into students’ mental
ROM by applying them to different situations.
✓ First Concepts and Principles. The first four chapters discuss general concepts, standards,
OV
network management, and security. (Security, as you might expect, also weaves through the
first three.) In a combined introductory networking and security course, I teach the Appendix
right after Chapter 4.
✓ Then Applying Concepts and Principles Holistically. The rest of the book applies these concepts
and principles to a series of technologies: Ethernet (Chapter 5), Wi-Fi (Chapters 6 and 7), the
ED
Internet of Things devices (Chapter 7), the Internet (Chapters 8 and 9), WANs (Chapter 10), and
applications, including cloud computing (Chapter 11). Figure P-1 shows how this works for
802.11 Wi-Fi.
??
Page 2 of 373