Title: CYB 110 Teaching Effectively--tutorialrank.com
1CYB 110 Teaching Effectively--tutorialrank.com
2CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 All Assignments For more course tutorials
visit www.tutorialrank.com CYB 110 Week 1
Individual Protecting Data CYB 110 Week 1
Individual Security Policies CYB 110 Week 1
Individual Risk Management Framework and
CIA CYB 110 Week 2 Individual Securing an
Operating System CYB 110 Week 2 Individual
Configuring Anti-Virus Software
3CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 1 Individual Protecting Data For
more course tutorials visit www.tutorialrank.com
CYB 110 Week 1 Individual Protecting Data There
are many different threats to the
confidentiality, integrity, and availability of
data-at-rest. Some threats affect one of these
security risks (like confidentiality only), and
some threats affect more than one or even all of
these risks. Create a 1-page table in Microsoft
Word or Excel lis
4CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 1 Individual Risk Management
Framework and CIA For more course tutorials
visit www.tutorialrank.com Individual Risk
Management Framework and CIA In Ch. 1,
"Introduction to Information Security," of
Elementary Information Security, you read about
National Institute of Standards and Technology
(NIST) Risk Management Framework (RMF) and how it
expands on the CIA concepts.
5CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 1 Individual Security Policies For
more course tutorials visit www.tutorialrank.com
CYB 110 Week 1 Individual Security Policies You
have been hired as a security specialist by a
company to provide methods and recommendations to
create a more secure environment for company
data. Write a 1- to 2-page recommendation paper
outlining methods the company should consider to
protect access to data, including recommendations
for policies to be en
6CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 2 Individual Configuring Anti-Virus
Software For more course tutorials
visit www.tutorialrank.com CYB 110 Week 2
Individual Configuring Anti-Virus Software You
are a security analyst at a large Security
Operations Center (SOC). Malware infections have
noticeably increased, and all the impacted
machines did not have updated anti-virus
signatures. Your task is to set the anti-virus
software to secure your companys computers.
7CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware For more course tutorials
visit www.tutorialrank.com Individual
Run/Playbook Part 1 Malware Create the first
section of your Playbook/Runbook. This week you
researched malware, attack vectors, and how they
are related to cybersecurity. Write a 1- to
2-page scenario in which a malware attack occurs.
Include the following
8CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 2 Individual Securing an Operating
System For more course tutorials
visit www.tutorialrank.com CYB 110 Week 2
Individual Securing an Operating System You are a
security administrator responsible for providing
secure configuration requirements for new laptop
deployments. After reading Module 2 of Certified
Secure Computer User v2exercises, apply the
configuration settings below on your Windows or
Mac computer and take screenshots of each step
9CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security For more course tutorials
visit www.tutorialrank.com Individual
Playbook/Runbook Part 2 Social Network
Security Add a 1- to 2-page section to your
Playbook/Runbook that includes the following
List of information and data employees are
not to place online Guidelines for
interacting online
10CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network For more course
tutorials visit www.tutorialrank.com CYB 110
Week 3 Individual Social Network Security
Configuring a Social Network Your company
encourages its employees to interact with the
corporate Facebook page as a way to promote brand
awareness and customer engagement. Your company
wants employees to verify that their social media
accounts are secure before engaging with a public
corporate Facebook page that has thousands of
users. Your task is to create a reference
document demonstrating appropriate secure
settings for Facebook.
11CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices For more course tutorials
visit www.tutorialrank.com CYB 110 Week 4
Individual Configuring Security on Mobile
Devices Management approved a pilot program in
which a controlled group of users can access
certain company data from personally-owned mobile
devices instead of purchasing corporate mobile
devices for employees and contractors. As the
Security Architect, you must provide Bring Your
Own Device (BYOD) security best practice
guidelines for employees to secure any personal
mobile device used in the pilot program. Your
task is to create a document demonstrating
appropriate security settings.
12CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines For more course tutorials
visit www.tutorialrank.com Individual
Runbook/Playbook Part 3 Network, Mobile Device,
and Cloud Services Guidelines Add a 1- to 2-page
section to your Playbook/Runbook. Create a
prescriptive section of your Playbook providing
guidelines to secure each of these areas
Network connections
13CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 5 Individual Configure Backup
Settings For more course tutorials
visit www.tutorialrank.com Individual Configure
Backup Settings You want to ensure your personal
computer is set to save data on a daily basis.
Using OneDrive configure a personal computer to
save and maintain data. Configure backup settings
as described below, taking screenshots to
demonstrate your knowledge Schedule a
daily backup to an external physical storage
device
14CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan For more course
tutorials visit www.tutorialrank.com Individual
Disaster Recovery and Business Continuity
Plan You work for a multi-state company with
three sites in three different states, 1,000
employees, an ERP application with a backend
database, and two datacenters.
15CYB 110 Teaching Effectively--tutorialrank.com
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines For more course
tutorials visit www.tutorialrank.com Individual
Playbook/Runbook Part 4 Secure Data Backup
Guidelines NOTE Only Part 4 is Included - Part
1, 2, 3 Not Included.
16CYB 110 Teaching Effectively--tutorialrank.com