CYB 610 Education Begins/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 610 Education Begins/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 610 Project 1 Information Systems and Identity Management CYB 610 Project 2 Operating Systems Vulnerabilities (Windows and Linux) – PowerPoint PPT presentation

Number of Views:2
Slides: 10
Provided by: abcdf308

less

Transcript and Presenter's Notes

Title: CYB 610 Education Begins/newtonhelp.com


1
CYB 610 Education Begins/newtonhelp.com
2
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 All Project (Project 1-6)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 610 Project 1 Information Systems and
    Identity Management
  •  
  • CYB 610 Project 2 Operating Systems
    Vulnerabilities (Windows and Linux)
  •  

3
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 1 Information Systems and
    Identity Management
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Project 1 Information Systems and Identity
    Management
  •  
  • Video transcript
  • CYB 610 Project 1 You are a systems administrator 
    in the IT department of a major metropolitan
    hospital. Your duties are to ensure the confidenti
    ality, availability, and integrity of patient
    records, as well as the other files and databases 
    used throughout the hospital. Your
    work affects several departments, including Human
    Resources, Finance, Billing, Accounting, and
    Scheduling. You also apply security controls on
    passwords for user accounts.

4
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 2 Operating Systems
    Vulnerabilities (Windows and Linux)
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 610 Project 2 Congratulations, you are the
    newly appointed lead cybersecurity engineer with
    your company in the oil and natural gas sector.
    This is a seniorlevel position. You were hired
    two months ago based on your successful
    cybersecurity experience with a
    previous employer. Your technical knowledge of
    cybersecurity is solid. However, you have a lot
    to learn about this company's culture, processes,
    and IT funding decisions, which are made
    by higher

5
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 3 Assessing Information System
    Vulnerabilities and Risk
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Project 3 Assessing Information System
    Vulnerabilities and Risk
  • CYB 610 Project 3 You are an Information Assurance
    Management Officer, IAMO, at an organization of
    your choosing. One morning, as you're getting
    ready for work, you see an email from Karen, your
    manager. She asks you to come to

6
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 4 Threat Analysis and
    Exploitation
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Project 4 Threat Analysis and ExploitationBottom
    of Form
  • CYB610 Project 4 You are part of a collaborative
    team that was created to address cyber
    threats and exploitation of US financial systems c
    ritical infrastructure. Your team has been
    assembled by the White House Cyber National securi
    ty staff to provide situational awareness about a
    current network breach and cyber attack against
    several financial service institutions.
    Your team consists of four roles, a
    representative from the financial

7
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 5 Cryptography
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Project 5 Cryptography 
  • CYB610 Project 5 You are an enterprise security ar
    chitect for a company in a semiconductor
    manufacturing industry where maintaining
    competitive advantage and protecting intellectual
    property is vital. You're in charge of security op
    erations and strategic security planning. Your
    responsibilities include devising the security pro
    tocols for identification, access, and
    authorization management. You recently implemented
    cryptography algorithms to protect the
    information organization. Leadership is pleased wi
    th your efforts and would like you to take
    protection methods even further. They've asked you
    to study cyberattacks against different

8
CYB 610 Education Begins/newtonhelp.com
  • CYB 610 Project 6 Digital Forensics Analysis
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Project 6 Digital Forensics Analysis
  • Project 6 Start Here
  • This project will provide an introduction to
    digital forensic analysis.
  • Digital forensic analysis is used to review and
    investigate data collected through digital
    communications and computer networks. The
    National Institute for Standards and Technology
    (NIST) has defined four fundamental phases for
    forensic analysis collection, examination,
    analysis, and reporting. You will learn more
    about these concepts as you navigate throughout
    the steps of this project and read the literature
    and links found in each step.
  • There are four steps that will lead you through
    this project. Begin with Step 1 Methodology.
    The deliverables for this project are as follows

9
CYB 610 Education Begins/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com