1 / 11

CYB 140 Education for Service--tutorialrank.com

For more course tutorials visit<br>www.tutorialrank.com<br><br>CYB 140 Week 1 Discussion Physical Security<br><br> <br><br> <br><br>CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server<br><br> <br><br> <br><br>CYB 140 Week 3 Discussion A Firewall Can't Do it All<br><br> <br><br> <br><br>CYB 140 Week 4 Discussion Intrusion Detection Systems<br><br> <br>

Download Presentation

CYB 140 Education for Service--tutorialrank.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYB 140 All DQs For more course tutorials visit www.tutorialrank.com CYB 140 Week 1 Discussion Physical Security CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 3 Discussion A Firewall Can't Do it All

  2. CYB 140 Week 4 Discussion Intrusion Detection Systems CYB 140 Week 5 Discussion VPN vs SSL ============================================== CYB 140 Entire Course For more course tutorials visit www.tutorialrank.com CYB 140 Week 1 Discussion Physical Security

  3. CYB 140 Week 1 Assignment Security Control Evaluation CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 2 Assignment Monitoring Servers CYB 140 Week 2 Assignment Install OS Updates and Configure Security Policy CYB 140 Week 2 Assignment Application Data Establish Host Security

  4. CYB 140 Week 3 Discussion A Firewall Can't Do it All CYB 140 Week 3 Assignment Firewall Configuration CYB 140 Week 4 Discussion Intrusion Detection Systems CYB 140 Week 4 Assignment Network Fundamentals Understanding IPSec

  5. CYB 140 Week 4 Assignment Understanding IDS Firewall Evasion and Honeypot CYB 140 Week 4 Assignment IDS vs. IPS Presentation CYB 140 Week 5 Discussion VPN vs SSL CYB 140 Week 5 Assignment Configuring VPNs CYB 140 Week 5 VPN Configuration Plan ==============================================

  6. CYB 140 Week 1 Discussion Physical Security For more course tutorials visit www.tutorialrank.com Respond to the following in a minimum of 175 words: After watching the Lynda.com® video "Physical Security Control Types," explain the various types of security controls, how they relate to the security controls specified in the Reading for NIST SP-800-53A, and how their implementation protect a company's assets, including the facilities, IT infrastructure, and network. ============================================== CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server For more course tutorials visit

  7. www.tutorialrank.com Respond to the following in a minimum of 175 words: After watching the Lynda.com® videos "Virtualization" and "Virtualization Security," describe the security challenges that a virtualized environment, such as virtual servers, present. How are they different from the security issues of physical servers? ============================================== CYB 140 Week 3 Discussion A Firewall Can't Do it All For more course tutorials visit www.tutorialrank.com Respond to the following in a minimum of 175 words:

  8. You have been learning how firewalls use Access Control Lists (ACLs) to block traffic from specified IP addresses. Firewalls can also block ports, however firewalls do not provide complete security. Research five types of firewalls. Discuss the basic limitations of a typical firewall's security. What does a firewall not do for protection? ============================================== CYB 140 Week 4 Discussion Intrusion Detection Systems For more course tutorials visit www.tutorialrank.com Respond to the following in a minimum of 175 words:

  9. After watching the Lynda.com® video "Network Intrusion Detection and Prevention," discuss techniques used to evade Intrusion Detection Systems (IDS) as if you were a hacker. ============================================== CYB 140 Week 5 Assignment Configuring VPNs For more course tutorials visit www.tutorialrank.com Complete the following exercise from Practice Lab "N10-005 - Network+: Configuring VPNs": Exercise 1 - "Configure Remote Access" Exercise 2 - "Configure Network Access Protection" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document.

  10. Write a 1- to 2-page reflection on the purpose and results of the lab explaining obstacles you encountered and how you overcame them. Submit your screenshots and reflection. ============================================== CYB 140 Week 5 Discussion VPN vs SSL For more course tutorials visit www.tutorialrank.com Respond to the following in a minimum of 175 words: You are an information security professional within your organization. Your boss comes into your office and asks you to explain the difference

  11. between a VPN and SSL connection. The company uses both, but your boss is confused on what each is used for. Discuss how you would explain the difference between a VPN and SSL connection. What advantages or disadvantages do they each offer? ==============================================

More Related