CST 630 Enhance teaching / snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CST 630 Enhance teaching / snaptutorial.com

Description:

For more classes visit www.snaptutorial.com Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool – PowerPoint PPT presentation

Number of Views:3
Slides: 8
Provided by: Bailey240

less

Transcript and Presenter's Notes

Title: CST 630 Enhance teaching / snaptutorial.com


1
CST 630 Enhance teaching / snaptutorial.com
2
CST 630 Enhance teaching / snaptutorial.com
CST 630 Project 1Risk, Threat, and Vulnerability
Management   For more classes visit www.snaptutori
al.com   Project 1 Step 1 Conduct a Security
Analysis Baseline In the first step of the
project, you will conduct a security analysis
baseline of the IT systems, which will include a
data-flow diagram of connections and endpoints,
and all types of access points, including
wireless. The baseline report will be part of the
overall security assessment report (SAR).
3
CST 630 Enhance teaching / snaptutorial.com
CST 630 Project 2 Incident Response   For more
classes visit www.snaptutorial.com   Project
2 Step 1 Develop a Wireless and BYOD Security
Plan Since the company you work for has
instituted a bring your own device (BYOD) policy,
security attitudes have been lax and all sorts of
devices, authorized and unauthorized, have been
found connected to the company's wireless
infrastructure. In this first step, you will
develop a wireless and BYOD security plan for the
company.
4
CST 630 Enhance teaching / snaptutorial.com
CST 630 Project 3 Enterprise Network
Security   For more classes visit www.snaptutorial
.com   Project 3 Step 1 Conduct a Policy Gap
Analysis As you begin Step 1 of your system
security report on cybersecurity for mergers and
acquisitions, keep in mind that the networks of
companies going through an MA can be subject to
cyberattack. As you work through this step and
the others, keep these questions in mind
5
CST 630 Enhance teaching / snaptutorial.com
CST 630 Project 4Secure Videoconferencing
Communications   For more classes
visit www.snaptutorial.com   Project 4 Step 1
Develop Functional Requirements for
Videoconferencing   The first step in your
proposal for a secure videoconferencing system is
to develop a set of functional requirements for
videoconferencing that you believe the media
company will nee based on its geographic
dispersion and business needs.
6
CST 630 Enhance teaching / snaptutorial.com
CST 630 Project 5 Data Loss Prevention (21 Pages
10 slides lab report)   For more classes
visit www.snaptutorial.com   CST 630 Project
5 Data Loss Prevention (21 Pages 10 slides
lab report)
7
CST 630 Enhance teaching / snaptutorial.com
aa
Write a Comment
User Comments (0)
About PowerShow.com