User:Prakash Timilsina/Real Teaching Lesson Plan27: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
 
Line 9: Line 9:


== Specific Objectives: ==
== Specific Objectives: ==
At the end of the class, students will be able to
# Understand the concept of storing and revoking keys.
# Explain related key with storing and revoking keys.


== Teaching Learning Materials: ==
== Teaching Learning Materials: ==
Daily usage Materials, Laptop, PowerPoint slide, multimedia


== Teaching Learning Activities: ==
== Teaching Learning Activities: ==
After entering the class, I will revise previous lesson Public Key Infrastructure. Then I will inform today's topic storing and revoking keys. I will tell them the concept of storing key it should be stored securely to prevent unauthorized access, use secure storage solutions like hardware security or encrypted database. I will explain revoking keys if the employee leaves organization the data must be updated or need new employee to access.


== Evaluation: ==
== Evaluation: ==
# Define revoking key with its importance?
# Is storing key useful to prevent unauthorized access?

Latest revision as of 11:41, 16 May 2024

Class: BEDICT 6th Semester

Subject: Network Security

Teaching Topic: Storing and revoking keys

Period Duration: 50 min

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to

  1. Understand the concept of storing and revoking keys.
  2. Explain related key with storing and revoking keys.

Teaching Learning Materials:[edit | edit source]

Daily usage Materials, Laptop, PowerPoint slide, multimedia

Teaching Learning Activities:[edit | edit source]

After entering the class, I will revise previous lesson Public Key Infrastructure. Then I will inform today's topic storing and revoking keys. I will tell them the concept of storing key it should be stored securely to prevent unauthorized access, use secure storage solutions like hardware security or encrypted database. I will explain revoking keys if the employee leaves organization the data must be updated or need new employee to access.

Evaluation:[edit | edit source]

  1. Define revoking key with its importance?
  2. Is storing key useful to prevent unauthorized access?