CIS 333 Possible Is Everything--snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 333 Possible Is Everything--snaptutorial.com

Description:

PLEASE CHECK ALL INCLUDED PRODUCTS IN THIS TUTORIAL AS SOME QUIZ MAY BE MISSING CIS 333 Week 1 Discussion Providing Security Over Data CIS 333 Week 2 Discussion Risk Management and Malicious Attacks CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools CIS 333 Week 3 Discussion Security Administration and Access Control CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD) CIS 333 Week 3 Lab 2 CIS 333 Week 4 Discussion Security Monitoring – PowerPoint PPT presentation

Number of Views:8
Slides: 23
Provided by: RoseJohn06
Category:

less

Transcript and Presenter's Notes

Title: CIS 333 Possible Is Everything--snaptutorial.com


1
CIS 333 Possible Is Everything/snaptutorial.com
2
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Entire Course For more classes
visit www.snaptutorial.com   PLEASE CHECK ALL
INCLUDED PRODUCTS IN THIS TUTORIAL AS SOME QUIZ
MAY BE MISSING CIS 333 Week 1 Discussion
Providing Security Over Data CIS 333 Week 2
Discussion Risk Management and Malicious Attacks
3
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Final Exam (3 Sets) For more classes
visit www.snaptutorial.com   This Tutorial
contains 3 Set of Finals Question 1 SIP is a
___________ protocol used to support real-time
communications.
Question 2 What name is given to a U.S.
federal law that requires U.S. government
agencies to protect citizens private data and
have proper security controls in place?

4
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 1 Discussion Providing Security Over
Data For more classes visit www.snaptutorial.com
  "Providing Security Over Data" Please
respond to the following
The CIA triad (confidentiality, integrity, and
availability) offers three (3) security tenets
that allow data owners the framework to secure
data. Considering your place of employment or
your home computing environment, discuss in
detail the primary means in which each of the
three (3) tenets are addressed to mitigate risk
and enhance security in your chosen environment.
5
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 1-11 Discussion For more classes
visit www.snaptutorial.com   CIS 333 Week 1
Discussion Providing Security Over Data CIS 333
Week 2 Discussion Risk Management and Malicious
Attacks CIS 333 Week 3 Discussion CIS 333 Week 4
Discussion Security Monitoring trol CIS 333 Week
5 Discussion Business Impact Analysis (BIA) and
Risk Management CIS 333 Week 6 Discussion
Cryptography CIS 333 Week 7 Discussion Network
Security
6
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 2 Discussion Risk Management and
Malicious Attacks For more classes
visit www.snaptutorial.com   "Risk Management and
Malicious Attacks" Please respond to the
following With regards to
risk-response planning, there are four (4)
responses to negative risks that an organization
may pursue avoid, transfer, mitigate, and
accept. Develop an original and unique scenario
to describe and contrast each of these responses.
7
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 3 Case Study 1 Bring Your Own
Device (BYOD) For more classes
visit www.snaptutorial.com   Case Study 1 Bring
Your Own Device (BYOD) Due Week 3 and worth 60
points Read the following articles located in
the course shell The dark side of BYOD from
TechRepublic and BYOD As We Know It Is Dead
from Forbes. Write a two to three (2-3) page
paper in which you
8
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 3 Lab 2 For more classes
visit www.snaptutorial.com   CIS 333 Week 3 Lab 2
Performing a Vulnerability Assessment Case Study
1 Bring Your Own Device (BYOD)    
9
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 4 Assignment 1 Identifying
Potential Malicious Attacks, Threats, and
Vulnerabilities For more classes
visit www.snaptutorial.com   This Tutorial
contains 2 Papers Assignment 1 Identifying
Potential Malicious Attacks, Threats, and
Vulnerabilities Due Week 4 and worth 75 points
You have just been hired as an Information
Security Engineer for a videogame development
company. The organization network structure is
identified in the below network diagram and
specifically contains 1) 2 Firewalls 5) 2
Windows Server 2012 Active Directory Domain
Controllers (DC)
10
CIS 333 Possible Is Everything/snaptutorial.com
  CIS 333 Week 4 Discussion Security Monitoring
For more classes visit www.snaptutorial.com   "Se
curity Monitoring" Please respond to the
following Considering your place of
employment or your home computing environment,
discuss in detail the way in which in-depth (or
layered) defense is employed to enhance security
in your chosen environment.
11
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 4 Lab 3 Enabling Windows Active
Directory and User Access Controls For more
classes visit www.snaptutorial.com   CIS 333 Week
4 Lab 3 Enabling Windows Active Directory and
User Access Controls    
12
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 6 Case Study 2 Public Key
Infrastructure For more classes
visit www.snaptutorial.com   This Tutorial
contains 2 Papers Case Study 2 Public Key
Infrastructure Due Week 6 and worth 60 points
Suppose you are the Information Security
Director at a small software company. The
organization currently utilizes a Microsoft
Server 2012 Active Directory domain .
13
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 6 Discussion Cryptography For more
classes visit www.snaptutorial.com   "Cryptography
" Please respond to the following
Considering that, due to its extremely sensitive
nature, shared data that organizations transmit
through collaboration must be kept confidential
at all costs, formulate a possible solution that
utilizes symmetric or asymmetric cryptography,
and describe the advantages and disadvantages of
the selected solution. If you had to select one
(1) of the two (2) encryption options over the
other, justify the one that you would choose, and
explain your reasoning.
14
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 6 Lab 5 Performing Packet Capture
and Traffic Analysis For more classes
visit www.snaptutorial.com   CIS 333 Week 6 Lab 5
Performing Packet Capture and Traffic Analysis  
15
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 8 Assignment 2 Identifying
Potential Risk, Response, and Recovery For more
classes visit www.snaptutorial.com   Assignment
2 Identifying Potential Risk, Response, and
Recovery Due Week 8 and worth 75 points In
Assignment 1, a videogame development company
recently hired you as an Information Security
Engineer. After viewing a growing number of
reports detailing malicious activity, the CIO
requested that you draft a report in which you
identify potential malicious attacks and threats
specific to your organization. She asked you to
include a brief explanation of each item and the
potential impact it could have on the
organization.
16
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 9 Lab 8 Eliminating Threats with a
Layered Security Approach For more classes
visit www.snaptutorial.com   CIS 333 Week 9 Lab 9
Eliminating Threats with a Layered Security
Approach  
17
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 10 Discussion For more classes
visit www.snaptutorial.com   Describe one
(1) IT position that you currently hold or would
like to hold in the future. Next, explain whether
or not you believe obtaining certifications would
help you in the position in question. If so,
determine the certifications that you believe
would prove to be helpful. Provide a rationale
for your response.
18
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 10 Technical Project Paper
Information Systems Security For more classes
visit www.snaptutorial.com   Technical Project
Paper Information Systems Security Due Week 10
and worth 150 points Suppose you are the IT
professional in charge of security for a small
pharmacy that has recently opened within a
shopping mall. The daily operation of a pharmacy
is a unique business that requires a combination
of both physical and logical access
19
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 11 Discussion 1 Course Takeaway
For more classes visit www.snaptutorial.com   "Co
urse Takeaway" Please respond to the
following Share two new insights about
networking security fundamentals you have
discovered from this course. Explain how this
type of course is essential for every network
security professional.
20
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 11 Discussion 2 Course Wrap up For
more classes visit www.snaptutorial.com   "Course
Wrap-up" Please respond to the following
Explain five or more key topics discussed during
this course that you would like to teach a friend
who has a minimal level of information systems
security knowledge. Discuss how you can apply
the learning outcomes of this course to your
professional and personal life.  
21
CIS 333 Possible Is Everything/snaptutorial.com
CIS 333 Week 11 Exam For more classes
visit www.snaptutorial.com   Question
1 The world needs
people who understand computer-systems ________
and who can protect computers and networks from
criminals and terrorists.

Question 2
22
CIS 333 Possible Is Everything/snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com