CIS 333 Invent Youself/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 333 Invent Youself/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com PLEASE CHECK ALL INCLUDED PRODUCTS IN THIS TUTORIAL AS SOME QUIZ MAY BE MISSING CIS 333 Week 1 Discussion Providing Security Over Data CIS 333 Week 2 Discussion Risk Management and Malicious Attacks CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools CIS 333 Week 3 Discussion Security Administration and Access Control CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD) – PowerPoint PPT presentation

Number of Views:3
Slides: 31
Provided by: chekuuuuu58

less

Transcript and Presenter's Notes

Title: CIS 333 Invent Youself/newtonhelp.com


1
CIS 333 Invent Youself /newtonhelp.com
2
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Entire Course (check details in
    description)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • PLEASE CHECK ALL INCLUDED PRODUCTS IN THIS
    TUTORIAL AS SOME QUIZ MAY BE MISSING
  • CIS 333 Week 1 Discussion Providing Security Over
    Data
  • CIS 333 Week 2 Discussion Risk Management and
    Malicious Attacks
  • CIS 333 Week 2 Lab 1 Performing Reconnaissance
    and Probing Using Common Tools

3
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Final Exam (3 Sets)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • This Tutorial contains 3 Set of Finals
  • Question 1 SIP is a ___________ protocol used to
    support real-time communications.
  • Question 2 What name is given to a U.S. federal
    law that requires U.S. government agencies to
    protect citizens private data and have proper
    security controls in place?
  • Question 3 This security appliance examines IP
    data streams for common attack and malicious
    intent patterns.

4
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 1 Discussion Providing Security Over
    Data
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Providing Security Over Data" Please respond
    to the following
  • The CIA triad (confidentiality, integrity,
    and availability) offers three (3) security
    tenets that allow data owners the framework to
    secure data. Considering your place of employment
    or your home computing environment, discuss in
    detail the primary means in which each of the
    three (3) tenets are addressed to mitigate risk
    and enhance security in your chosen environment.

5
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 1-11 Discussion
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 1 Discussion Providing Security Over
    Data
  • CIS 333 Week 2 Discussion Risk Management and
    Malicious Attacks
  • CIS 333 Week 3 Discussion
  • CIS 333 Week 4 Discussion Security Monitoring trol

6
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 2 Discussion Risk Management and
    Malicious Attacks
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Risk Management and Malicious Attacks" Please
    respond to the following
  • With regards to risk-response planning, there
    are four (4) responses to negative risks that an
    organization may pursue avoid, transfer,
    mitigate, and accept. Develop an original and
    unique scenario to describe and contrast each of
    these responses.
  • From the selected e-Activity article, describe
    in detail the way in which the malware was
    utilized to steal data or gain privileged remote
    access to a computer or network. Suppose you were
    an IT Security professional working at

7
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 2 Lab 1 Performing Reconnaissance
    and Probing Using Common Tools
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 2 Lab 1 Performing Reconnaissance
    and Probing Using Common Tools

8
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 3 Case Study 1 Bring Your Own Device
    (BYOD)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Case Study 1 Bring Your Own Device (BYOD)
  • Due Week 3 and worth 60 points
  • Read the following articles located in the
    course shell The dark side of BYOD from
    TechRepublic and BYOD As We Know It Is Dead
    from Forbes.
  • Write a two to three (2-3) page paper in which
    you
  • 1. Identify the primary benefits of BYOD in
    organizations, and determine the key ways in
    which its concepts can

9
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 3 Discussion Security Administration
    and Access Control
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Security Administration and Access Control"
    Please respond to the following
  • From the e-Activity, summarize the ethical
    dilemma, and develop a plan in which you would
    mitigate the vulnerability.

10
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 3 Lab 2
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 3 Lab 2 Performing a Vulnerability
    Assessment Case Study 1 Bring Your Own Device
    (BYOD)

11
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 4 Assignment 1 Identifying Potential
    Malicious Attacks, Threats, and Vulnerabilities
    (2 Papers)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • This Tutorial contains 2 Papers
  • Assignment 1 Identifying Potential Malicious
    Attacks, Threats, and Vulnerabilities
  • Due Week 4 and worth 75 points
  • You have just been hired as an Information
    Security Engineer for a videogame development
    company. The organization network structure is
    identified in the below network diagram and
    specifically contains

12
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 4 Discussion Security Monitoring
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Security Monitoring" Please respond to the
    following
  • Considering your place of employment or your
    home computing environment, discuss in detail the
    way in which in-depth (or layered) defense is
    employed to enhance security in your chosen
    environment.
  • According to the textbook, Intrusion Detection
    Systems (IDS), which can be categorized as Host
    IDS (HIDS)

13
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 4 Lab 3 Enabling Windows Active
    Directory and User Access Controls
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 4 Lab 3 Enabling Windows Active
    Directory and User Access Controls

14
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 5 Discussion Business Impact
    Analysis (BIA) and Risk Management
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 5 Discussion
  • "Business Impact Analysis (BIA) and Risk
    Management" Please respond to the following
  • According to the text, a BIA determines the
    extent of the impact that a particular incident
    would have on business operation over time.
    Determine the major ways in which people,
    systems, data, and property will impact

15
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 5 Lab 4 Using Group Policy Objects
    and Microsoft Baseline Security Analyzer for
    Change Control
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 5 Lab 4 Using Group Policy Objects
    and Microsoft Baseline Security Analyzer for
    Change Control

16
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 6 Case Study 2 Public Key
    Infrastructure (2 Papers)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • This Tutorial contains 2 Papers
  • Case Study 2 Public Key Infrastructure
  • Due Week 6 and worth 60 points
  • Suppose you are the Information Security
    Director at a small software company. The
    organization currently utilizes a Microsoft
    Server 2012 Active Directory domain administered
    by your information security team.

17
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 6 Discussion Cryptography
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Cryptography" Please respond to the following
  • Considering that, due to its extremely
    sensitive nature, shared data that organizations
    transmit through collaboration must be kept
    confidential at all costs, formulate a possible
    solution that utilizes symmetric or

18
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 6 Lab 5 Performing Packet Capture
    and Traffic Analysis
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 6 Lab 5 Performing Packet Capture
    and Traffic Analysis

19
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 7 Discussion Network Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Network Security" Please respond to the
    following
  • From the first e-Activity, discuss your
    rationale for choosing the specific firewall in
    question, and determine the primary way in which
    a company could incorporate it into an enterprise
    network in order to enhance security.

20
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 7 Lab 6 Using Encryption to Enhance
    Confidentiality and Integrity
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 7 Lab 7 Using Encryption to Enhance
    Confidentiality and Integrity

21
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 8 Assignment 2 Identifying Potential
    Risk, Response, and Recovery
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Assignment 2 Identifying Potential Risk,
    Response, and Recovery
  • Due Week 8 and worth 75 points
  • In Assignment 1, a videogame development company
    recently hired you as an Information Security
    Engineer.

22
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 8 Discussion The Impact of Malware
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "The Impact of Malware" Please respond to the
    following
  • From the first e-Activity, analyze the selected
    two (2) resources that are available for security
    professionals to find information about threats
    and / or malware active today. Justify your
    belief these resources are helpful for security
    professionals.

23
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 8 Lab 7 Performing a Web Site and
    Database Attack by Exploiting Identified
    Vulnerabilities
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 8 Lab 8 Performing a Web Site and
    Database Attack by Exploiting Identified
    Vulnerabilities

24
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 9 Discussion
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Security Standards" Please respond to the
    following
  • A number of organizations exist to
    define information security standards. Explain
    the importance of standards organizations with
    regard to both information systems and
    information systems security. Provide a rationale
    for your response.
  • From the e-Activity, determine two
    (2) specific concerns that you believe exist for
    cloud deployments, and ascertain whether or not
    data breaches, such as the Snowden Incident have
    heightened concerns. Justify your

25
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 9 Lab 8 Eliminating Threats with a
    Layered Security Approach
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CIS 333 Week 9 Lab 9 Eliminating Threats with a
    Layered Security Approach

26
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 10 Discussion
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Describe one (1) IT position that you currently
    hold or would like to hold in the future. Next,
    explain whether or not you believe obtaining
    certifications would help you in the position in
    question. If so, determine the certifications
    that you believe would prove to be helpful.
    Provide a rationale for your response.

27
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 10 Technical Project Paper
    Information Systems Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Technical Project Paper Information Systems
    Security
  • Due Week 10 and worth 150 points
  • Suppose you are the IT professional in charge of
    security for a small pharmacy that has recently
    opened within a shopping mall. The daily
    operation of a pharmacy is a unique business that
    requires a combination of both physical and
    logical access controls geared tow

28
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 11 Discussion 1 Course Takeaway
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Course Takeaway" Please respond to the
    following
  • Share two new insights about networking security
    fundamentals you have discovered from this
    course. Explain how this type of course is
    essential for every network security professional.

29
CIS 333 Invent Youself/newtonhelp.com
  • CIS 333 Week 11 Discussion 2 Course Wrap up
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • "Course Wrap-up" Please respond to the following
  • Explain five or more key topics discussed during
    this course that you would like to teach a friend
    who has a minimal level of information systems
    security knowledge. Discuss how you can apply
    the learning outcomes of this course to your
    professional and personal life.

30
CIS 333 Invent Youself/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com