Overview

Introduction

The Managing Web Browsers module provides you with the instructions and devices to develop your hands on skills in the following topics.

  • Install and Manage Web Browsers
  • Configuring Internet Connection
  • Managing Security Zones in a Web Browser

Lab Objectives

The following exam objectives are covered in this lab.

-IC3-GS5: Internet navigation and Common functionality

Exercise 1 - Install and Manage Web Browsers

The Internet is a global collection of interconnected computer networks that connects billions of computing devices with government agencies, educational institutions, private corporations/companies into one massive network. The Internet use Transmission Control Protocol/Internet Protocol (TCP/IP) -- a network protocol that controsl how devices and applications transmit and receive information over a network that spans geographical locations.

Most information in the Internet can be accessed via World Wide Web or WWW--an application protocol that publish information via interlinked web pages using web browsers such as Internet Explorer, Google Chrome among others.

Exercise 2 - Configuring Internet Connection

Internet access in a corporate network is normally provided to employees in an organization in a controlled environment. This is made possible with the use of network firewalls where system administrators set down the rules and policies as to which web sites can be visited during work hours.

Hardware and software vendors provide different implementations on how to share a single Internet connection to corporate users at any given time. This exercise will demonstrate how the lab devices use a proxy server to connect to the public Internet. Discussion on technical details of a proxy server is beyond the scope of this lab exercise.

Exercise 3 - Managing Security Zones in a Web Browser

In this exercise, you will learn to configure security zones in a web browser for intranet and the Internet. Security settings your web browser helps minimize the risk of malware being downloaded unintentionally when visiting compromised web sites.

Restrictive security zones when paired with anti-malware tools and operating system updates will greatly help to fend off different types of malicious software from compromising your computer.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.