CIS 333 Course Marvelous learning / tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 333 Course Marvelous learning / tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com CIS 333 Week 1 Discussion Providing Security Over Data CIS 333 Week 2 Discussion Risk Management and Malicious Attacks – PowerPoint PPT presentation

Number of Views:6
Slides: 31
Provided by: huntrobertson33

less

Transcript and Presenter's Notes

Title: CIS 333 Course Marvelous learning / tutorialrank.com


1
CIS 333 Course Marvelous learning/
tutorialrank.com
The Best way to predict the Future is to create
it.....To Best way....
www.tutorialrank.com
2
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Entire Course (check details in
description) For more course tutorials
visit www.tutorialrank.com   CIS 333 Week 1
Discussion Providing Security Over Data CIS 333
Week 2 Discussion Risk Management and Malicious
Attacks CIS 333 Week 2 Lab 1 Performing
Reconnaissance and Probing Using Common Tools
CIS 333 Week 3 Discussion
3
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Final Exam (3 Sets) For more course
tutorials visit www.tutorialrank.com Question 1
SIP is a ___________ protocol used to support
real-time communications. Question 2 What
name is given to a U.S. federal law that requires
U.S. government agencies to protect citizens
private data and have proper security controls in
place?
4
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 1 Discussion Providing Security Over
Data For more course tutorials
visit www.tutorialrank.com   "Providing
Security Over Data" Please respond to the
following The CIA triad (confidentiality,
integrity, and availability) offers three (3)
security tenets that allow data owners the
framework to secure data. Considering your place
of employment or your home computing environment,
5
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 1-11 Discussion For more course
tutorials visit www.tutorialrank.com   CIS 333
Week 1 Discussion Providing Security Over Data
CIS 333 Week 2 Discussion Risk Management and
Malicious Attacks CIS 333 Week 3 Discussion
6
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 2 Discussion Risk Management and
Malicious Attacks For more course tutorials
visit www.tutorialrank.com     "Risk Management
and Malicious Attacks" Please respond to the
following With regards to risk-response
planning, there are four (4) responses to
negative risks that an organization may pursue
avoid, transfer, mitigate, and accept. Develop an
original and unique scenario to describe and
contrast each of these responses.
7
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 2 Lab 1 Performing Reconnaissance
and Probing Using Common Tools For more course
tutorials visit www.tutorialrank.com     CIS 333
Week 2 Lab 1 Performing Reconnaissance and
Probing Using Common Tools
8
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 3 Case Study 1 Bring Your Own Device
(BYOD) For more course tutorials
visit www.tutorialrank.com     Case Study 1
Bring Your Own Device (BYOD) Due Week 3 and worth
60 points Read the following articles located in
the course shell The dark side of BYOD from
TechRepublic and BYOD As We Know It Is Dead
from Forbes.
9
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 3 Discussion Security Administration
and Access Control For more course tutorials
visit www.tutorialrank.com     "Security
Administration and Access Control" Please
respond to the following From the e-Activity,
summarize the ethical dilemma, and develop a plan
in which you would mitigate the vulnerability.
10
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 3 Lab 2 For more course tutorials
visit www.tutorialrank.com     CIS 333 Week 3 Lab
2 Performing a Vulnerability Assessment Case
Study 1 Bring Your Own Device (BYOD)
11
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 4 Assignment 1 Identifying Potential
Malicious Attacks, Threats, and Vulnerabilities
(2 Papers) For more course tutorials
visit www.tutorialrank.com     This Tutorial
contains 2 Papers Assignment 1 Identifying
Potential Malicious Attacks, Threats, and
Vulnerabilities Due Week 4 and worth 75 points
You have just been hired as an Information
Security Engineer for a videogame development
company. The organization network structure is
identified in the below network diagram and
specifically contains
12
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 4 Discussion Security Monitoring
For more course tutorials visit www.tutorialrank.
com     "Security Monitoring" Please respond to
the following Considering your place of
employment or your home computing environment,
discuss in detail the way in which in-depth (or
layered) defense is employed to enhance security
in your chosen environment.
13
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 4 Lab 3 Enabling Windows Active
Directory and User Access Controls For more
course tutorials visit www.tutorialrank.com     CI
S 333 Week 4 Lab 3 Enabling Windows Active
Directory and User Access Controls
14
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 5 Discussion Business Impact
Analysis (BIA) and Risk Management For more
course tutorials visit www.tutorialrank.com     CI
S 333 Week 5 Discussion "Business Impact Analysis
(BIA) and Risk Management" Please respond to the
following According to the text, a BIA
determines the extent of the impact that a
particular incident would have on business
operation over time. Determine the major ways in
which people, systems, data, and property will
impact a BIA. Provide specific examples to
support your response.
15
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 5 Lab 4 Using Group Policy Objects
and Microsoft Baseline Security Analyzer for
Change Control For more course tutorials
visit www.tutorialrank.com     CIS 333 Week 5 Lab
4 Using Group Policy Objects and Microsoft
Baseline Security Analyzer for Change Control
16
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 6 Case Study 2 Public Key
Infrastructure (2 Papers) For more course
tutorials visit www.tutorialrank.com     Case
Study 2 Public Key Infrastructure Due Week 6 and
worth 60 points Suppose you are the Information
Security Director at a small software company.
The organization currently utilizes a Microsoft
Server 2012 Active Directory domain
17
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 6 Discussion Cryptography For more
course tutorials visit www.tutorialrank.com     "C
ryptography" Please respond to the following
Considering that, due to its extremely sensitive
nature, shared data that organizations transmit
through collaboration must be kept confidential
at all costs, formulate
18
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 6 Lab 5 Performing Packet Capture
and Traffic Analysis For more course tutorials
visit www.tutorialrank.com     CIS 333 Week 6 Lab
5 Performing Packet Capture and Traffic Analysis
19
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 7 Discussion Network Security For
more course tutorials visit www.tutorialrank.com  
  "Network Security" Please respond to the
following From the first e-Activity, discuss
your rationale for choosing the specific firewall
in question, and determine the primary way in
which a company could incorporate
20
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 7 Lab 6 Using Encryption to Enhance
Confidentiality and Integrity For more course
tutorials visit www.tutorialrank.com     CIS 333
Week 7 Lab 7 Using Encryption to Enhance
Confidentiality and Integrity
21
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 8 Assignment 2 Identifying Potential
Risk, Response, and Recovery For more course
tutorials visit www.tutorialrank.com     Assignmen
t 2 Identifying Potential Risk, Response, and
Recovery Due Week 8 and worth 75 points In
Assignment 1, a videogame development company
recently hired you as an Information Security
Engineer. After viewing a growing number of
reports detailing malicious activity,
22
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 8 Discussion The Impact of Malware
For more course tutorials visit www.tutorialrank.
com     "The Impact of Malware" Please respond
to the following From the first e-Activity,
analyze the selected two (2) resources that are
available for security professionals to find
information about threats and / or malware active
today. Justify your belief these resources are
helpful for security professionals.
23
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 8 Lab 7 Performing a Web Site and
Database Attack by Exploiting Identified
Vulnerabilities For more course tutorials
visit www.tutorialrank.com     CIS 333 Week 8 Lab
8 Performing a Web Site and Database Attack by
Exploiting Identified Vulnerabilities
24
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 9 Discussion For more course
tutorials visit www.tutorialrank.com   "Security
Standards" Please respond to the following A
number of organizations exist to define
information security standards. Explain the
importance of standards organizations with regard
to both information systems and information
systems security. Provide a rationale for your
response.
25
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 9 Lab 8 Eliminating Threats with a
Layered Security Approach For more course
tutorials visit www.tutorialrank.com     CIS 333
Week 9 Lab 9 Eliminating Threats with a Layered
Security Approach
26
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 10 Discussion For more course
tutorials visit www.tutorialrank.com   Describe
one (1) IT position that you currently hold or
would like to hold in the future. Next, explain
whether or not you believe obtaining
certifications would help you in the position in
question. If so, determine the certifications
that you believe would prove to be helpful.
Provide a rationale for your response.
27
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 10 Technical Project Paper
Information Systems Security For more course
tutorials visit www.tutorialrank.com   Technical
Project Paper Information Systems Security Due
Week 10 and worth 150 points Suppose you are the
IT professional in charge of security for a small
pharmacy that has recently opened within a
shopping mall. The daily operation of a pharmacy
28
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 11 Discussion 1 Course Takeaway
For more course tutorials visit www.tutorialrank.
com   "Course Takeaway" Please respond to the
following Share two new insights about
networking security fundamentals you have
discovered from this course. Explain how this
type of course is essential for every network
security professional.
29
CIS 333 Course Marvelous learning/
tutorialrank.com
CIS 333 Week 11 Discussion 2 Course Wrap up For
more course tutorials visit www.tutorialrank.com  
  "Course Wrap-up" Please respond to the
following Explain five or more key topics
discussed during this course that you would like
to teach a friend who has a minimal level of
information systems security knowledge. Discuss
how you can apply the learning outcomes of this
course to your professional and personal life.
30
CIS 333 Course Marvelous learning/
tutorialrank.com
The Best way to predict the Future is to create
it.....To Best way....
www.tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com