100 likes | 106 Views
http://www.tutorialrank.com/CYB/CYB-360/product-28393-CYB-360-Week-1-Wireless-Network-Needs-and-Requirement<br>For more course tutorials visit<br>www.tutorialrank.com<br><br>Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following: <br><br>Design requirements that must be addressed <br>Justification to use different frequencies, channels, and antennae in the installation <br>Regulatory requirements to consider in implementation<br>
E N D
CYB 360 education changes / tutorialrank.com CYB 360 Week 1 Wireless Network Needs and Requirement http://www.tutorialrank.com/CYB/CYB-360/product-28393-CYB-360-Week-1-Wireless-Network-Needs-and-Requirement Write a 1- to 2-page report for the Director of IT describing the requirements you are considering as your team implements the wireless network. Include the following: Design requirements that must be addressed Justification to use different frequencies, channels, and antennae in the installation Regulatory requirements to consider in implementation
CYB 360 education changes / tutorialrank.com CYB 360 Week 2 Wireless Site Survey http://www.tutorialrank.com/CYB/CYB-360/product-28395-CYB-360-Week-2-Wireless-Site-Survey Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business). Identify the following: · Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer) · Possible sources of interference · Existing wireless infrastructure · Potential access point placement · Potential antenna placement · Potential equipment and supporting equipment
CYB 360 education changes / tutorialrank.com CYB 360 Week 3 Configuring a Secure Wireless Network Part 1 http://www.tutorialrank.com/CYB/CYB-360/product-28397-CYB-360-Week-3-Configuring-a-Secure-Wireless-Network-Part-1 Your office has implemented a WLAN and needs you to configure the WLAN environment with three Cisco Meraki™ MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important at this time. WAP Placement: The Visio® diagram provided, "Office Wireless Network," shows the placement of each WAP within the building.
CYB 360 education changes / tutorialrank.com CYB 360 Week 3 Team Technical Specification Document http://www.tutorialrank.com/CYB/CYB-360/product-28401-CYB-360-Week-3-Team-Technical-Specification-Document CYB 360 Week 3 Team Technical Specification Document
CYB 360 education changes / tutorialrank.com CYB 360 Week 4 Configuring a Secure Wireless Network Part 2 http://www.tutorialrank.com/CYB/CYB-360/product-28399-CYB-360-Week-4-Configuring-a-Secure-Wireless-Network-Part-2 An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit. Using the configurations and topology you added to the "WLAN Configuration Design Template" in Week Three, add security and segregate internal traffic. Secure the network to: Minimize the risk of intrusions Identify attempted intrusions Limit visibility of HR traffic on the network
CYB 360 education changes / tutorialrank.com CYB 360 Week 4 Team Encryption and WIPS/WIDS Implementation http://www.tutorialrank.com/CYB/CYB-360/product-28402-CYB-360-Week-4-Team-Encryption-and-WIPS-WIDS-Implementation This week your team is presenting recommendations to your director on implementing, securing, and monitoring the network for data security assurance. Create a 6- to 8-slide PowerPoint® presentation for your director. The presentation should include: Recommended encryption type Recommended Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion Detection System (WIDS) deployed and where
CYB 360 education changes / tutorialrank.com CYB 360 Week 5 Attack Vectors and Wireless Network Hardening http://www.tutorialrank.com/CYB/CYB-360/product-28403-CYB-360-Week-5-Attack-Vectors-and-Wireless-Network-Hardening This week you are reporting possible security threats to your network, how the network is hardened against such threats, and recommendations to harden the network further. As a team, discuss likely threats against the network and decide on recommendations to harden the network. Create a 1-page table listing possible security threats. Include attack vectors, how this network has been hardened against such attacks, and/or recommendations for further steps to take.
CYB 360 education changes / tutorialrank.com CYB 360 Week 5 Packet Capture Analysis http://www.tutorialrank.com/CYB/CYB-360/product-28404-CYB-360-Week-5-Packet-Capture-Analysis You are analyzing packet captures from a wireless network to assess if the captures pose a threat, what risks, if any. For this assignment, analyze the packet captures provided by Wireshark by doing the following: Go to the Wireshark Sample Captures site, and download the following: · wpa-Induction.pcap.gz Wi-Fi 802.11 WPA traffic