CYB 140 Become Exceptional / newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 140 Become Exceptional / newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 140 Week 1 Discussion Physical Security CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 3 Discussion A Firewall Can't Do it All CYB 140 Week 4 Discussion Intrusion Detection Systems – PowerPoint PPT presentation

Number of Views:2
Slides: 20
Provided by: king422

less

Transcript and Presenter's Notes

Title: CYB 140 Become Exceptional / newtonhelp.com


1
CYB 140 Become Exceptional / newtonhelp.com
2
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 All DQs
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 1 Discussion Physical Security
  •   
  • CYB 140 Week 2 Discussion Virtualized Server vs.
    Physical Server
  •  
  •  CYB 140 Week 3 Discussion A Firewall Can't Do it
    All

3
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Entire Course
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 1 Discussion Physical Security
  •  
  • CYB 140 Week 1 Assignment Security Control
    Evaluation
  •  
  • CYB 140 Week 2 Discussion Virtualized Server vs.
    Physical Server
  •  
  • CYB 140 Week 2 Assignment Monitoring Servers
  • CYB 140 Week 2 Assignment Install OS Updates and
    Configure Security Policy
  •  
  • CYB 140 Week 2 Assignment Application Data
    Establish Host Security
  •  
  • CYB 140 Week 3 Discussion A Firewall Can't Do it
    All

4
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 1 Discussion Physical Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  • Respond to the following in a minimum of 175
    words
  •  
  • After watching the Lynda.com video "Physical
    Security Control Types," explain the various
    types of security controls, how they relate to
    the security controls specified in the Reading
    for NIST SP-800-53A, and how their implementation
    protect a company's assets, including the
    facilities, IT infrastructure, and network.

5
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 1 Individual Assignment Individual
    Security Control Evaluation
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 1 Individual Assignment Individual
    Security Control Evaluation
  •  
  •  
  •  
  •  
  • Instructions Read "Safeguarding the Ultra-Dense
    Networks with the Aid of Physical Layer Security
    A Review and a Case Study" by Ying Wang. Write a
    2- to 3-page analysis of the case study in which
    you examine the security controls that were
    compromised, determine what could have been done
    to prevent the compromise, and compile a list of
    future security controls that will need to be put
    in place to prevent other attacks. Submit your
    assignment using the Assignment Files tab.

6
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 2 Discussion Virtualized Server vs.
    Physical Server
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words
  •  
  • After watching the Lynda.com videos
    "Virtualization" and "Virtualization
    Security," describe the security challenges that
    a virtualized environment, such as virtual
    servers, present. How are they different from the
    security issues of physical servers?
  •  

7
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 2 Individual Assignment Individual
    Application Data Establish Host Security
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 2 Individual Assignment Individual
    Application Data Establish Host Security
  •  
  •  
  •  
  •  
  • Instructions Complete the following exercise
    from Practice Lab "SY0-401 CompTIA Security
    Application Data - Establish Host Security"
  •  
  •  
  • Exercise 1 - "Anti-Virus Programs" Capture
    screenshots for each task while completing the
    exercise. Paste screenshots in a Word document.
    Submit your screenshots using the Assignment
    Files tab.

8
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 2 Individual Assignment Individual
    Install OS Updates and Configure Security Policy
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 2 Individual Assignment Individual
    Install OS Updates and Configure Security Policy
  •  
  •  
  •  
  •  
  • Instructions Complete the following exercises
    from Practice Lab "N10-006-CompTIA Network
    Install OS Updates and Configure Security
    Policy"
  •  
  •  
  • Exercise 1 - "Configure and Run Windows Update"

9
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 2 Learning Team Assignment
    Individual Monitoring Servers
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 2 Learning Team Assignment
    Individual Monitoring Servers
  •  
  •  
  •  
  •  
  • Instructions Complete the following exercises
    from Practice Lab "CS0-001CompTIA Cybersecurity
    Analyst (CSA) - Monitoring Servers"
  •  

10
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 3 Discussion A Firewall Can't Do it
    All
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words
  •  
  • You have been learning how firewalls use Access
    Control Lists (ACLs) to block traffic from
    specified IP addresses. Firewalls can also block
    ports, however firewalls do not provide complete
    security.
  • Research five types of firewalls.
  • Discuss the basic limitations of a typical
    firewall's security. What does a firewall not do
    for protection?

11
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 3 Individual Assignment Individual
    Firewall Configuration
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 3 Individual Assignment Individual
    Firewall Configuration
  •  
  • Instructions Complete the following exercises
    from Practice Lab "SY0-401 CompTIA Security
    Network Security - Firewall Rule Based
    Management"
  •  

12
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 4 Discussion Intrusion Detection
    Systems
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words
  •  

13
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 4 Individual Assignment Individual
    IDS vs. IPS
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 4 Individual Assignment Individual
    IDS vs. IPS
  •  
  •  
  • Instructions Research IDS and IPS. Create a
    table comparing IDS and IPS, including types,
    placement, and features. Create a 6- to 8-slide
    PowerPoint presentation to the CIO of a company
    in which you analyze and justify which IDS and
    IPS types would be most useful to them and how an
    IDS uses rules and signatures to identify
    potentially harmful traffic. Submit your
    assignment using the Assignment Files tab.

14
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 4 Individual Assignment Individual
    Network Fundamentals Understanding IPSec
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 4 Individual Assignment Individual
    Network Fundamentals Understanding IPSec
  •  
  •  
  • Instructions Complete the following exercise
    from Practice Lab "N10-006 - CompTIA Network
    Understanding How IPSec Works"
  •  

15
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 4 Individual Assignment Individual
    Understanding IDS Firewall Evasion and Honeypots
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 4 Individual Assignment Individual
    Understanding IDS Firewall Evasion and Honeypots
  •  
  •  
  •  
  •  
  • Instructions Complete the following exercise
    from Practice Lab "SY0-401 CompTIA Security
    Understanding IDS Firewall Evasion and
    Honeypots"
  •  

16
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 5 Assignment Configuring VPNs
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Complete the following exercise from Practice Lab
    "N10-005 - Network Configuring VPNs"
  • Exercise 1 - "Configure Remote Access"
  • Exercise 2 - "Configure Network Access Protection"

17
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 5 Discussion VPN vs SSL
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words
  •  
  • You are an information security professional
    within your organization. Your boss comes into
    your office and asks you to explain the
    difference between a VPN and SSL connection. The
    company uses both, but your boss is confused on
    what each is used for.

18
CYB 140 Become Exceptional / newtonhelp.com
  • CYB 140 Week 5 Individual Assignment Individual
    VPN Configuration Plan
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 140 Week 5 Individual Assignment Individual
    VPN Configuration Plan
  •  
  •  
  • Instructions Review the "Real-World Security
    Incident" activity and incorporate your findings
    in this assignment. Research vulnerabilities that
    may have contributed to security incidents with
    respect to VPN/SSL as discussed in Weeks Three
    and Five.

19
CYB 140 Become Exceptional / newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com