CYB 110 Motivated Minds/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Motivated Minds/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA CYB 110 Week 2 Individual Securing an Operating System CYB 110 Week 2 Individual Configuring Anti-Virus Software – PowerPoint PPT presentation

Number of Views:1
Slides: 17
Provided by: begoniabellflo261

less

Transcript and Presenter's Notes

Title: CYB 110 Motivated Minds/newtonhelp.com


1
CYB 110 Motivated Minds/newtonhelp.com
2
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 All Assignments
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •   
  • CYB 110 Week 1 Individual Protecting Data
  • CYB 110 Week 1 Individual Security Policies
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA

3
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 1 Individual Protecting Data
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CYB 110 Week 1 Individual Protecting Data
  • There are many different threats to the
    confidentiality, integrity, and availability of
    data-at-rest. Some threats affect one of these
    security risks (like confidentiality only), and
    some threats affect more than one or even all of
    these risks.

4
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Individual Risk Management Framework and CIA
  • In Ch. 1, "Introduction to Information Security,"
    of Elementary Information Security, you read
    about National Institute of Standards and
    Technology

5
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 1 Individual Security Policies
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 110 Week 1 Individual Security Policies
  • You have been hired as a security specialist by a
    company to provide methods and recommendations to
    create a more secure environment for company data.

6
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • figuring Anti-Virus Software
  • You are a security analyst at a large Security
    Operations Center (SOC). Malware infections have
    noticeably increased, and all the impacted
    machines did

7
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 2 Individual Run/Playbook Part 1
    Malware
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Run/Playbook Part 1 Malware
  • Create the first section of your Playbook/Runbook.

8
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 2 Individual Securing an Operating
    System
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • You are a security administrator responsible for
    providing secure configuration requirements for
    new laptop deployments. After reading Module 2 of
    Certified Secure Computer User v2exercises, apply
    the configuration settings below on your Windows
    or Mac computer and take screenshots of each

9
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 3 Individual Playbook/Runbook Part 2
    Social Network Security
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Playbook/Runbook Part 2 Social Network
    Security
  • Add a 1- to 2-page section to your
    Playbook/Runbook that includes the following
  • List of information and data employees
    are not to place online

10
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 3 Individual Social Network Security
    Configuring a Social Network
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • CYB 110 Week 3 Individual Social Network
    Security Configuring a Social Network
  • Your company encourages its employees to interact
    with the corporate Facebook

11
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 4 Individual Configuring Security on
    Mobile Devices
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • CYB 110 Week 4 Individual Configuring Security
    on Mobile Devices
  • Management approved a pilot program in which a
    controlled group of users can access certain
    company data from personally-owned mobile devices

12
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • Individual Runbook/Playbook Part 3 Network,
    Mobile Device, and Cloud Services Guidelines

13
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 5 Individual Configure Backup
    Settings
  • For more course tutorials visit
  • www.newtonhelp.com
  •  Individual Configure Backup Settings
  • You want to ensure your personal computer is set
    to save data on a daily basis. Using OneDrive
    configure a personal computer to save and
    maintain data.
  • Configure backup settings as described below,
    taking screenshots to demonstrate your knowledge

14
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 5 Individual Disaster Recovery and
    Business Continuity Plan
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  •  
  • Individual Disaster Recovery and Business
    Continuity Plan
  • You work for a multi-state company with three
    sites in three different

15
CYB 110 Motivated Minds/newtonhelp.com
  • CYB 110 Week 5 Individual Playbook/Runbook Part 4
    Secure Data Backup Guidelines
  •  
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Playbook/Runbook Part 4 Secure Data
    Backup Guidelines
  • NOTE Only Part 4 is Included - Part 1, 2, 3
    Not Included.

16
CYB 110 Motivated Minds/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com