CYB 110 Inspiring Innovation--snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Inspiring Innovation--snaptutorial.com

Description:

For more classes visit www.snaptutorial.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA – PowerPoint PPT presentation

Number of Views:5
Slides: 17
Provided by: jhonklintonew5

less

Transcript and Presenter's Notes

Title: CYB 110 Inspiring Innovation--snaptutorial.com


1
CYB 110 Inspiring Innovation--snaptutorial.com
2
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 All Assignments For more classes
visit www.snaptutorial.com     CYB 110 Week 1
Individual Protecting Data   CYB 110 Week 1
Individual Security Policies   CYB 110 Week 1
Individual Risk Management Framework and
CIA   CYB 110 Week 2 Individual Securing an
Operating System     
3
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 1 Individual Protecting Data For
more classes visit www.snaptutorial.com     CYB
110 Week 1 Individual Protecting Data There are
many different threats to the confidentiality,
integrity, and availability of data-at-rest. Some
threats affect one of these security risks (like
confidentiality only), and some threats affect
more than one or even all of these risks. Create
a 1-page table in Microsoft Word or Excel
listing a minimum of five threats using the
column headers Threat to Data-at-Rest,
Confidentiality/Integrity/Availability, and
Suggestion on Countering the Threat.     
4
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 1 Individual Risk Management
Framework and CIA For more classes
visit www.snaptutorial.com     Individual Risk
Management Framework and CIA In Ch. 1,
"Introduction to Information Security," of
Elementary Information Security, you read about
National Institute of Standards and Technology
(NIST) Risk Management Framework (RMF) and how it
expands on the CIA concepts. Assume that a
security model is needed for the protection of
information in your class.     
5
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 1 Individual Security Policies For
more classes visit www.snaptutorial.com     CYB
110 Week 1 Individual Security Policies You have
been hired as a security specialist by a company
to provide methods and recommendations to create
a more secure environment for company data. Write
a 1- to 2-page recommendation paper outlining
methods the company should consider to protect
access to data, including recommendations for
policies to be enacted that will increase data
security. Submit your assignment using the
Assignment Files tab.     
6
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 2 Individual Configuring Anti-Virus
Software For more classes visit www.snaptutorial
.com     CYB 110 Week 2 Individual Configuring
Anti-Virus Software You are a security analyst at
a large Security Operations Center (SOC). Malware
infections have noticeably increased, and all the
impacted machines did not have updated anti-virus
signatures. Your task is to set the anti-virus
software to secure your companys
computers. Note Module 3 of Certified Secure
Computer User details two options for anti-virus
protection, Kaspersky and Avast anti-virus
software.     
7
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware For more classes visit www.snaptutorial.
com     Individual Run/Playbook Part 1
Malware Create the first section of your
Playbook/Runbook. This week you researched
malware, attack vectors, and how they are related
to cybersecurity. Write a 1- to 2-page scenario
in which a malware attack occurs. Include the
following       Detail the particular malware,
the exploited vulnerability, and its attack
vector in   your scenario.     
8
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 2 Individual Securing an Operating
System For more classes visit www.snaptutorial.c
om     CYB 110 Week 2 Individual Securing an
Operating System You are a security administrator
responsible for providing secure configuration
requirements for new laptop deployments. After
reading Module 2 of Certified Secure Computer
User v2exercises, apply the configuration
settings below on your Windows or Mac computer
and take screenshots of each step Windows 1.
Lock system when not in use     
9
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security For more classes
visit www.snaptutorial.com     Individual
Playbook/Runbook Part 2 Social Network
Security Add a 1- to 2-page section to your
Playbook/Runbook that includes the following    
  List of information and data employees are
not to place online       Guidelines for
interacting online     
10
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network For more classes
visit www.snaptutorial.com     CYB 110 Week 3
Individual Social Network Security Configuring
a Social Network Your company encourages its
employees to interact with the corporate Facebook
page as a way to promote brand awareness and
customer engagement. Your company wants employees
to verify that their social media accounts are
secure before engaging with a public corporate
Facebook page that has thousands of users. Your
task is to create a reference document
demonstrating appropriate secure settings for
Facebook.     
11
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices For more classes
visit www.snaptutorial.com   CYB 110 Week 4
Individual Configuring Security on Mobile
Devices Management approved a pilot program in
which a controlled group of users can access
certain company data from personally-owned mobile
devices instead of purchasing corporate mobile
devices for employees and contractors. As the
Security Architect, you must provide Bring Your
Own Device (BYOD) security best practice
guidelines for employees to secure any personal
mobile device used in the pilot program. Your
task is to create a document demonstrating
appropriate security settings. Configure the
mobile device security settings as follows,
taking screenshots to demonstrate your
knowledge Android or Apple     
12
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines For more classes visit www.snaptutori
al.com   Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines Add a 1- to 2-page section to your
Playbook/Runbook. Create a prescriptive section
of your Playbook providing guidelines to secure
each of these areas     Network connections  
  Mobile devices     Cloud services Revise
your previous week's Playbook/Runbook based on
your facilitator's feedback and submit as a
    
13
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 5 Individual Configure Backup
Settings For more classes visit www.snaptutorial
.com   Individual Configure Backup Settings You
want to ensure your personal computer is set to
save data on a daily basis. Using OneDrive
configure a personal computer to save and
maintain data. Configure backup settings as
described below, taking screenshots to
demonstrate your knowledge       Schedule a
daily backup to an external physical storage
device.       Schedule a weekly backup to
Microsoft OneDrive.     
14
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 5 Individual Disaster Recovery For
more classes visit www.snaptutorial.com   Individu
al Disaster Recovery and Business Continuity
Plan You work for a multi-state company with
three sites in three different states, 1,000
employees, an ERP application with a backend
database, and two datacenters. Prepare a 2- to
2.5-page Disaster Recovery and Business
Continuity Plan in Microsoft Word for your
company. Include how you plan to Recover your
databases and telecommunications.     
15
CYB 110 Inspiring Innovation--snaptutorial.com
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines For more classes
visit www.snaptutorial.com   Individual 
Playbook/Runbook Part 4 Secure Data Backup
Guidelines NOTE Only Part 4 is Included - Part
1, 2, 3 Not Included.   Add a 1- to 2-page
section to your Playbook/Runbook. Outline
guideline policies and procedures to back up and
secure your company's data. Revise your previous
week's Playbook/Runbook based on your
facilitator's feedback and compile as a complete
document.     
16
CYB 110 Inspiring Innovation--snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com