230 likes | 238 Views
CMGT 245 Week 1 Individual Assessing Risk (2 PPT)<br>CMGT 245 Week 2 Individual Information Security Policy Executive Summary (2 Paper)<br>CMGT 245 Week 2 Individual Understand and Support Forensic Investigations (1 Paper and 1 PPT)<br>CMG<br>
E N D
CMGT 245 All Assignments (2 Set) For more classes visit www.snaptutorial.com CMGT 245 Week 1 Individual Assessing Risk (2 PPT) CMGT 245 Week 2 Individual Information Security Policy Executive Summary (2 Paper) CMGT 245 Week 2 Individual Understand and Support Forensic Investigations (1 Paper and 1 PPT) CMGT 245 Week 3 Individual Physical Security Policy (2 Paper) CMGT 245 Week 3 Individual Creating Secure Networks (2 Paper) CMGT 245 Week 4 Individual Understand and Apply Fundamental Concepts of Cryptography (2 Paper) CMGT 245 Week 4 Individual Information Security Policy Access Control Policy (2 Paper) CMGT 245 Week 5 Individual Information Security Policy Network Security Policy (2 Paper) CMGT 245 Week 5 Individual Systems and Application Security (2 PPT) *******************************************
CMGT 245 Assignment Week 1 Individual Lab Reflection For more classes visit www.snaptutorial.com CMGT 245 Assignment Week 1 Individual Lab Reflection ******************************************* CMGT 245 Assignment Week 1 Network Vulnerabilities Lab and Summary For more classes visit
www.snaptutorial.com CMGT 245 Assignment Week 1 Network Vulnerabilities Lab ******************************************* CMGT 245 Assignment Week 2 Risk Assessment Presentation For more classes visit www.snaptutorial.com Individual: Risk Assessment Presentation Considering the Assignment Week Two Learning Team collaborative discussion, "Data Types and Risks," you had with your team, create a PowerPoint®presentation for Ben. The 8- to 10-slide media-rich Microsoft®PowerPoint®with speaker notes should include: The main uses for an IT system in Ben's business The most common risks associated with this system A prioritized list of the risks identified
Mitigations to handle the risks Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio. Note: This assignment contributes to your final project in Assignment Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint®presentation slides from each Assignment Week 's individual assignment to create your final presentation. Submit your assignment using the Assignment Files tab. ******************************************* CMGT 245 Assignment Week 2 Scanning Remediating Vulnerabilities with Open VAS and introduction to digital forensic For more classes visit www.snaptutorial.com
CMGT 245 Assignment Week 2 Scanning Remediating Vulnerabilities with Open VAS and introduction to digital forensic CMGT 245 Week 2 Individual: Scanning and Remediating Vulnerabilities with OpenVAS & Introduction to Digital Forensics Complete the following labs in the Practice Labs course CompTIA Security+: • "Scanning and Remediating Vulnerabilities with OpenVAS" • "Introduction to Digital Forensics" Capture screenshots during the final step of each lab and place in a Microsoft® Word document. After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them. Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable: • Any issues you encountered while completing the labs • What you learned, and what you will watch out for in the future • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks • A description of the screenshots from each lab and what was done Submit your assignment using the Assignment Files tab. The report must be submitted with full citations and using proper APA formating for all references. I fully expect that you will reference any materials that are used in preparation of this assignment. *******************************************
CMGT 245 Assignment Week 3 Backup and Recovery For more classes visit www.snaptutorial.com CMGT 245 Assignment Week 3 Backup and Recovery Complete the lab "Backup and Recovery" in the Practice Labs course CompTIA Security+. Capture screenshots during the final step of each lab and place in a Microsoft® Word document. After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them. Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable: • Any issues you encountered while completing the lab • What you learned, and what you will watch out for in the future • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks • A description of the screenshots from each lab and what was done Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab. ******************************************* CMGT 245 Assignment Week 3 Individual Security Risk Review Contingency Plan For more classes visit www.snaptutorial.com Scenario: Information Security Risk Review/ Assessment and Business Continuity This Assignment Week your team needs to look at the Risk Review/Assessment for Ben’s organization. This document provides the basis for which security risks will be addressed and in what order of priority. It also outlines a plan for business continuity in the event of a natural disaster. Within your team, discuss the process for assessing risk within Ben’s organization. Risk can include threats to information security and business continuity. Take the top three significant risks to be mitigated by priority. In addition, discuss the following: (Answer the following to incorporate the info in the PPT)
List the types of natural and man-made disasters that could lead to an interruption of business services Come to a consensus on a plan to ensure business recovery following a flood Discuss how to implement the plan MAIN INSTRUCTIONS FOR PPT (Use information from chapter 12 attached, to use as one of the references) Ben’s business is located in an area that is prone to floods and power disruptions. Leveraging your Assignment Week Three Learning Team collaborative discussion, “Information Security Risk Review/ Assessment and Business Continuity,” create a 10- to 12-slide media- rich Microsoft® PowerPoint® presentation with speaker notes that explains the following: The key elements to include in a plan that will help ensure that Ben will be able to continue to service his customers following a flood The key items to consider when creating a contingency plan in the event the offsite data backup becomes unavailable The key aspects of implementing such a plan Note: This assignment contributes to your final project in Assignment Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each Assignment Week ’s individual assignment to create your final presentation. *******************************************
CMGT 245 Assignment Week 4 Cryptographic and Hashing For more classes visit www.snaptutorial.com CMGT 245 Assignment Week 4 Cryptographic and Hashing ******************************************* CMGT 245 Assignment Week 4 Data Encryption For more classes visit
www.snaptutorial.com CMGT 245 Assignment Week 4 Data Encryption ******************************************* CMGT 245 Assignment Week 4 Information Security Policy Access Controls, Authorization, And Authentication For more classes visit www.snaptutorial.com Scenario: Answers the following questions to incorporate into the information needed for the PPT Access Control & Data Protection:Ben employs a number of part time high school students interested in graphics.As you consider the components of a business continuity/recovery plan, discuss with your team the following:
What sort of access controls might be needed in the office? How can data be protected using authentication and authorization? Does this use of temporary employees create situations which makes data vulnerable to social attacks? Main instructions for the PPTBased on your Assignment Week Four Learning Team collaborative discussion, “Access Control & Data Protection,” create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following (Sue the chapter attached as one on the eferences for the PPT): The benefits of implementing access controls for Ben’s office The ways you can use authorization and authentication to protect the company’s data How the use of temporary employees can make data vulnerable to social engineering attacks Methods to mitigate social engineering threats and damage This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio. ******************************************* CMGT 245 Assignment Week 4 Practice Lab Bitlocker and Hashing For more classes visit
www.snaptutorial.com CMGT 245 Assignment Week 4 Practice Lab Bitlocker and Hashing ******************************************* CMGT 245 Assignment Week 4 Social Engineering Reconnaissance For more classes visit www.snaptutorial.com CMGT 245 Assignment Week 4 Social Engineering Reconnaissance *******************************************
CMGT 245 Assignment Week 5 Information Security Policy Presentation For more classes visit www.snaptutorial.com Collaborate with your team on the components of a policy that will help manage the services provided by a vendor, including cloud services that deliver both applications and data storage. Discuss a set of policies that can be used to control security provided by outside organizations. Use Ben's graphics business as a focal point of the conversation. Part 1: Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company's productivity. Leveraging your Assignment Week Five Learning Team collaborative discussion, "Security Control Policies," create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy. Include considerations for controlling
outside service provider risks, including cloud services. Be sure to explain the following: 1. Potential issues related to wireless security 2. The advantages and disadvantages of cloud technologies 3. The risks and ways to reduce them Part 2: Compile all sections of the Information Security Policy presentation (I compiled them, except the part has you have to add when finished with part 1 of this assignment). This should include all parts of the policy from Assignment Week s Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices. The total presentation should be 30 to 35 slides. (I included 26 slides already) Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation. Note: All references need to adhere to APA citation guidelines. ******************************************* CMGT 245 Week 1 Individual Assessing Risk (2 PPT)
For more classes visit www.snaptutorial.com CMGT 245 Week 1 Individual Assessing Risk Complete the module entitled, “Assessing Risk” of the Risk Management Pluralsight course. Take a screenshot showing your completed course in Pluralsight. Paste the screenshot into a Microsoft® Word document. Create a 5- to 6-slide presentation showing the importance of understanding risk related concepts and how this can be applied to your future IT career. Submit your assignment and screenshot to the Assignment Files tab. ******************************************* CMGT 245 Week 2 Individual Information Security Policy Executive Summary (2 Paper) For more classes visit www.snaptutorial.com
CMGT 245 Week 2 Individual Information Security Policy – Executive Summary Based on your Week Two Learning Team Collaborative discussion, draft the Executive Summary for the Security Policy. Include the following: § An overview of the company chosen § The company’s security requirements § The security goals to be achieved Format according to APA guidelines. Submit your assignment using the Assignment Files tab. ******************************************* CMGT 245 Week 2 Individual Understand and Support Forensic Investigations (1 Paper and 1 PPT) For more classes visit www.snaptutorial.com
CMGT 245 Week 2 Individual Understand and Support Forensic Investigations Complete the module entitled, “Understand and Support Forensic Investigations” of the SSCP®: Incident Response and Recovery Pluralsight course. Take a screenshot showing your completed course in Pluralsight. Paste the screenshot into a Microsoft® Word document. Create a 5-minute audio podcast tutorial explaining the importance of understanding and supporting forensic investigations. Submit your audio podcast assignment and screenshot to the Assignment Files tab. ******************************************* CMGT 245 Week 3 Individual Creating Secure Networks (2 Paper) For more classes visit www.snaptutorial.com CMGT 245 Week 3 Individual Creating Secure Networks Choose one of the following lesson sections in Pluralsight to complete
§ “Hardening a Network – Hardware” of the Network Security for CompTIA Network+ (N10-006) Pluralsight course. § “Hardening a Network – Software” of the Network Security for CompTIA Network+ (N10-006) Pluralsight course. § “Identifying Network Vulnerabilities” of the Network Security for CompTIA Network+ (N10-006) Pluralsight course. Create a quality 5-minute video tutorial of the completed Pluralsight lesson including key points taken from the lesson. Take a screenshot showing your completed course in Pluralsight. Paste the screenshot into a Microsoft® Word document. Submit your video tutorial assignment and screenshot to the Assignment Files tab. ******************************************* CMGT 245 Week 3 Individual Physical Security Policy (2 Paper) For more classes visit www.snaptutorial.com CMGT 245 Week 3 Individual Physical Security Policy
Based on your Week Three Learning Team Collaborative discussion, draft the Physical Security Policy section of the Information Security Policy. Include the following: § Security of the facilities: § Physical entry controls § Security offices, rooms, and facilities § Isolated delivery and loading areas § Security of information systems: § Workplace protection § Unused posts and cabling § Network or server equipment § Equipment maintenance § Security of laptops or roaming equipment Format according to APA guidelines. Submit your assignment using the Assignment Files tab. ******************************************* CMGT 245 Week 4 Individual Information Security Policy Access Control Policy (2 Paper) For more classes visit www.snaptutorial.com
CMGT 245 Week 4 Individual Information Security Policy Access Control Policy Based on your team’s Week Four Learning Team Collaborative discussion, write the Access Control Policy section of the Information Security Policy. Include the following: § User enrollment § Identification § Authentication § Privileged and special account access § Remote access Format according to APA guidelines. Submit your assignment to the Assignment Files tab. ******************************************* CMGT 245 Week 4 Individual Understand and Apply Fundamental Concepts of Cryptography (2 Paper) For more classes visit
www.snaptutorial.com CMGT 245 Week 4 Individual Understand and Apply Fundamental Concepts of Cryptography Complete “Understand and Apply Fundamental Concepts of Cryptography” of the SSCP®: Cryptography Pluralsight course. Create a 5-minute infomercial script showing your knowledge and expertise of cryptography to a potential buyer of your services. Use the Pluralsight lesson as your source including key points taken from the lesson. Take a screenshot showing your completed course in Pluralsight. Paste the screenshot into a Microsoft® Word document. Submit your infomercial and screenshot to the Assignment Files tab. ******************************************* CMGT 245 Week 5 Individual Information Security Policy Network Security Policy (2 Paper) For more classes visit www.snaptutorial.com
CMGT 245 Week 5 Individual: Information Security Policy – Network Security Policy Based on your team’s Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: § Network security control devices § Threat monitoring and protection § Threat identification and remediation Compile all sections of Information Security Policy. This should include all parts of the policy from Weeks Two through Five. Write the conclusion for your Security Policy. Format according to APA guidelines. Submit your assignment to the Assignment Files tab. ******************************************* CMGT 245 Week 5 Individual Systems and Application Security (2 PPT) For more classes visit www.snaptutorial.com
CMGT 245 Week 5 Individual: Systems and Application Security Choose one of the following lessons in Pluralsight to complete: § “Operate and Configure Cloud Security” of the SSCP®: Systems and Application Security Pluralsight course. § “Implement and Operate Endpoint Device Security” of the SSCP®: Systems and Application Security Pluralsight course. Create a 5-minute slide presentation including speaker notes showing decision makers of your organization methods for systems and application security. Use the completed Pluralsight lesson as your source including key points taken from the lesson. Take a screenshot showing your completed course in Pluralsight. Paste the screenshot into a Microsoft® Word document. Submit your presentation and screenshot to the Assignment Files tab. *******************************************