1 / 10

IT 244 Phoenix Course Tutorial/uophelps

IT 244 Entire Course

abcd11
Download Presentation

IT 244 Phoenix Course Tutorial/uophelps

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT 244 Phoenix Course Tutorial For more course tutorials visit www.uophelp.com

  2. IT 244 Phoenix Course Tutorial IT 244 Entire Course IT 244 Week 1 Assignment Introduction to the Information Security Policy Paper •Explain, in a 350- to 700-word paper, each of the 12 principles ofinformation security and how eachcan be applied to real-life situations. Include an explanation of the fourtypes of security policies. Include at least one reference. • IT 244 Week 1 Assignment: Principles of Security Paper • IT 244 Week 1 CheckPoint: Job Title and Description Match • IT 244 Week 2 DQs • IT 244 Week 3 Assignment: Disaster Recovery Plan Paper • IT 244 Week 3 CheckPoint: Business Continuity Plan • IT 244 Week 4 CheckPoint: Technical Analogy

  3. IT 244 Phoenix Course Tutorial IT 244 Week 1 Assignment Principles of Security Paper IT 244 Week 1 Checkpoint SmartScenario Information SecuritySecurity Policies Complete this week’s Toolwire® Smart Scenario found on the student website. Save a copy of your assessment. Post your Word document as an attachment. Click the Assignment Files tab to submit your assignment • •Explain, in a 350- to 700-word paper, each of the 12 principles ofinformation security and how eachcan be applied to real-life situations. Include an explanation of the fourtypes of security policies. • Include at least one reference

  4. IT 244 Phoenix Course Tutorial IT 244 Week 2 Checkpoint Smart Scenario Trusted Computing Base IT 244 Week 3 Assignment Disaster Recovery Plan Paper Write a 350- to 700-word paper addressing the following questions:What is the purpose of a Disaster Recovery Plan (DRP)?What are the key elements of a DRP?What are the five methods of testing a DRP?Why does a DRP require testing? • Complete this week’s Toolwire® Smart Scenario found on the student website. • Save a copy of your assessment. • Post your Word document as an attachment. • Click the Assignment Files tab to submit your assignment

  5. IT 244 Phoenix Course Tutorial IT 244 Week 3 Smart Scenario Business Continuity Disaster Recovery (New) IT 244 Week 4 ToolwireSmartScenario Cyber Crime Complete this week’s Toolwire® Smart Scenario found on the student website. Save a copy of your assessment. Post your Word document as an attachment. Click the Assignment Files tab to submit your assignment. • Complete this week’s Toolwire® Smart Scenario found on the student website. • Save a copy of your assessment. • Post your Word document as an attachment. • Click the Assignment Files tab to submit your assignment

  6. IT 244 Phoenix Course Tutorial IT 244 Week 5 Assignment Physical Security Policy IT 244 Week 5 Toolwire Smart Scenario Security and Threats Complete this week’s Toolwire® Smart Scenario found on the student website. Save a copy of your assessment. Post your Word document as an attachment. Click the Assignment Files tab to submit your assignment • Complete the Physical Security Policy portion of the Information Security Policy. Include the following: • Security of the facilities • Physical entry controls • Security offices, rooms, and facilities • Isolated delivery and loading areas

  7. IT 244 Phoenix Course Tutorial IT 244 Week 6 ToolwireSmartScenario Least Privilege Separation of Duties IT 244 Week 7 Assignment Access Control Policy Complete the Access Control Policy portion of the Information Security Policy. Include the following: User enrollment Identification Authentication Privileged and special account access Remote access • Complete this week’s Toolwire® Smart Scenario found on the student website. • Save a copy of your assessment. • Post your Word document as an attachment. • Click the Assignment Files tab to submit your assignment.

  8. IT 244 Phoenix Course Tutorial IT 244 Week 7 ToolwireSmart Scenario IT 244 Week 8 ToolwireSmart Scenario Intrusion Complete this week’s Toolwire® Smart Scenario found on the student website. Save a copy of your assessment. Post your Word document as an attachment. Click the Assignment Files tab to submit your assignment. • Due Date: Day 3 [Main forum] • Post your response to the following: How has your perception of WAN technology changed as a result of what you have studied in this course?

  9. IT 244 Phoenix Course Tutorial IT 242 Capstone Discussion Question IT 242 Entire Course IT 242 Week 1 CheckPoint: OSI Model IT 242 Week 1 DQs IT 242 Week 2 CheckPoint: Signals IT 242 Week 2 Assignment: VoIP IT 242 Week 3 DQs IT 242 Week 4 CheckPoint: Ethernet or Token Ring IT 242 Week 4 Assignment: VLAN • Due Date: Day 3 [Main forum] • Post your response to the following: How has your perception of WAN technology changed as a result of what you have studied in this course?

  10. IT 244 Phoenix Course Tutorial For more course tutorials visit www.uophelp.com

More Related