CIS 333 RANK Education Redefined/cis333rank.com - PowerPoint PPT Presentation

About This Presentation
Title:

CIS 333 RANK Education Redefined/cis333rank.com

Description:

CIS 333 RANK course is a grassroots open education project with a model for lifelong learning. – PowerPoint PPT presentation

Number of Views:5
Slides: 31
Provided by: vnnnnn80

less

Transcript and Presenter's Notes

Title: CIS 333 RANK Education Redefined/cis333rank.com


1
CIS 333 RANK Education Redefined/cis333rank.com
2
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Entire Course (check details in
description) FOR MORE CLASSES VISIT
www.cis333rank.com   PLEASE CHECK ALL INCLUDED
PRODUCTS IN THIS TUTORIAL AS SOME QUIZ MAY BE
MISSING CIS 333 Week 1 Discussion Providing
Security Over Data CIS 333 Week 2 Discussion Risk
Management and Malicious Attacks CIS 333 Week 2
Lab 1 Performing Reconnaissance and Probing Using
Common Tools CIS 333 Week 3 Discussion 
3
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Final Exam (3 Sets) FOR MORE CLASSES
VISIT www.cis333rank.com   This Tutorial
contains 3 Set of Finals  Question 1 SIP is a
___________ protocol used to support real-time
communications. Question 2  What name is given
to a U.S. federal law that requires U.S.
government agencies to protect citizens private
data and have proper security controls in
place?  Question 3 This security appliance
examines IP data streams for common attack and
malicious intent patterns.  
4
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 1 Discussion Providing Security Over
Data FOR MORE CLASSES VISIT www.cis333rank.com  
"Providing Security Over Data"  Please respond
to the following The CIA triad
(confidentiality, integrity, and availability)
offers three (3) security tenets that allow data
owners the framework to secure data. Considering
your place of employment or your home computing
environment, discuss in detail the primary means
in which each of the three (3) tenets are
addressed to mitigate risk and enhance security
in your chosen environment.
5
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 1-11 Discussion FOR MORE CLASSES
VISIT www.cis333rank.com   CIS 333 Week 1
Discussion Providing Security Over Data CIS 333
Week 2 Discussion Risk Management and Malicious
Attacks CIS 333 Week 3 Discussion CIS 333 Week 4
Discussion Security Monitoring trol CIS 333 Week
5 Discussion Business Impact Analysis (BIA) and
Risk Management
6
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 2 Discussion Risk Management and
Malicious Attacks FOR MORE CLASSES VISIT
www.cis333rank.com   "Risk Management and
Malicious Attacks"  Please respond to the
following With regards to risk-response
planning, there are four (4) responses to
negative risks that an organization may pursue
avoid, transfer, mitigate, and accept. Develop an
original and unique scenario to describe and
contrast each of these responses. 
7
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 2 Lab 1 Performing Reconnaissance
and Probing Using Common Tools FOR MORE CLASSES
VISIT www.cis333rank.com   CIS 333 Week 2 Lab 1
Performing Reconnaissance and Probing Using
Common Tools
8
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 3 Case Study 1 Bring Your Own Device
(BYOD) FOR MORE CLASSES VISIT www.cis333rank.com
  Case Study 1 Bring Your Own Device (BYOD) Due
Week 3 and worth 60 points  Read the following
articles located in the course shell The dark
side of BYOD from TechRepublic and BYOD As We
Know It Is Dead from Forbes. Write a two to
three (2-3) page paper in which you
9
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 3 Discussion Security Administration
and Access Control FOR MORE CLASSES VISIT
www.cis333rank.com   "Security Administration
and Access Control"  Please respond to the
following From the e-Activity, summarize the
ethical dilemma, and develop a plan in which you
would mitigate the vulnerability. 
10
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 3 Lab 2 FOR MORE CLASSES VISIT
www.cis333rank.com   CIS 333 Week 3 Lab 2
Performing a Vulnerability Assessment Case Study
1 Bring Your Own Device (BYOD) 
11
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 4 Assignment 1 Identifying Potential
Malicious Attacks, Threats, and Vulnerabilities
(2 Papers) FOR MORE CLASSES VISIT
www.cis333rank.com   This Tutorial contains 2
Papers Assignment 1 Identifying Potential
Malicious Attacks, Threats, and
Vulnerabilities Due Week 4 and worth 75
points  You have just been hired as an
Information Security Engineer for a videogame
development company. The organization network
structure is identified in the below network
diagram and specifically contains
12
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 4 Discussion Security Monitoring
FOR MORE CLASSES VISIT www.cis333rank.com   "Sec
urity Monitoring"  Please respond to the
following Considering your place of employment
or your home computing environment, discuss in
detail the way in which in-depth (or layered)
defense is employed to enhance security in your
chosen environment. According to the textbook,
Intrusion Detection Systems (IDS), which can be
categorized as Host IDS
13
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 4 Lab 3 Enabling Windows Active
Directory and User Access Controls FOR MORE
CLASSES VISIT www.cis333rank.com   CIS 333 Week
4 Lab 3 Enabling Windows Active Directory and
User Access Controls  
14
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 5 Discussion Business Impact
Analysis (BIA) and Risk Management FOR MORE
CLASSES VISIT www.cis333rank.com   CIS 333 Week
5 Discussion "Business Impact Analysis (BIA) and
Risk Management"  Please respond to the
following According to the text, a BIA
determines the extent of the impact that a
particular incident would have on business
operation over time. Determine the major ways in
which people, systems, data, and
15
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 5 Lab 4 Using Group Policy Objects
and Microsoft Baseline Security Analyzer for
Change Control FOR MORE CLASSES VISIT
www.cis333rank.com   CIS 333 Week 5 Lab 4 Using
Group Policy Objects and Microsoft Baseline
Security Analyzer for Change Control 
16
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 6 Case Study 2 Public Key
Infrastructure (2 Papers) FOR MORE CLASSES VISIT
www.cis333rank.com   This Tutorial contains 2
Papers  Case Study 2 Public Key
Infrastructure Due Week 6 and worth 60
points  Suppose you are the Information Security
Director at a small software company. The
organization currently utilizes a Microsoft
Server 2012 Active Directory domain administered
by your information security team. Mostly
software developers and a relatively small number
of administrative personnel
17
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 6 Discussion Cryptography FOR MORE
CLASSES VISIT www.cis333rank.com   "Cryptography"
 Please respond to the following Considering
that, due to its extremely sensitive nature,
shared data that organizations transmit through
collaboration must be kept confidential at all
costs, formulate a possible solution that
utilizes symmetric or asymmetric cryptography,
and describe the advantages and disadvantages of
the selected solution. If you had to select one
(1) of the two (2) encryption options over the
other, justify the one that you would choose, and
explain your reasoning. From the e-Activity and
your own research, give your opinion of the two
(2) most important ways that
18
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 6 Lab 5 Performing Packet Capture
and Traffic Analysis FOR MORE CLASSES VISIT
www.cis333rank.com   CIS 333 Week 6 Lab 5
Performing Packet Capture and Traffic Analysis 
19
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 7 Discussion Network Security FOR
MORE CLASSES VISIT www.cis333rank.com   "Network
Security"  Please respond to the following
From the first e-Activity, discuss your rationale
for choosing the specific firewall in question,
and determine the primary way in which a company
could incorporate it into an enterprise network
in order to enhance security. Select the two (2)
most important and / or unique features of the
chosen firewall, and explain the primary reasons
why those features make the firewall a viable
option in enterprises today. Justify your answer.
20
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 7 Lab 6 Using Encryption to Enhance
Confidentiality and Integrity FOR MORE CLASSES
VISIT www.cis333rank.com   CIS 333 Week 7 Lab 7
Using Encryption to Enhance Confidentiality and
Integrity 
21
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 8 Assignment 2 Identifying Potential
Risk, Response, and Recovery FOR MORE CLASSES
VISIT www.cis333rank.com   Assignment 2
Identifying Potential Risk, Response, and
Recovery Due Week 8 and worth 75 points In
Assignment 1, a videogame development company
recently hired you as an Information Security
Engineer. After viewing a growing number of
reports detailing malicious activity, the CIO
requested that you draft a report in which you
identify potential malicious attacks and threats
specific to your organization. She asked you to
include a brief explanation of each item and the
potential impact it could have on the
organization.
22
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 8 Discussion The Impact of Malware
FOR MORE CLASSES VISIT www.cis333rank.com   "The
Impact of Malware"  Please respond to the
following From the first e-Activity, analyze
the selected two (2) resources that are available
for security professionals to find information
about threats and / or malware active today.
Justify your belief these resources are helpful
for security professionals.
23
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 8 Lab 7 Performing a Web Site and
Database Attack by Exploiting Identified
Vulnerabilities FOR MORE CLASSES VISIT
www.cis333rank.com   CIS 333 Week 8 Lab 8
Performing a Web Site and Database Attack by
Exploiting Identified Vulnerabilities 
24
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 9 Discussion FOR MORE CLASSES VISIT
www.cis333rank.com   "Security Standards"
 Please respond to the following A number of
organizations exist to define information
security standards. Explain the importance of
standards organizations with regard to both
information systems and information systems
security. Provide a rationale for your response.
25
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 9 Lab 8 Eliminating Threats with a
Layered Security Approach FOR MORE CLASSES VISIT
www.cis333rank.com   CIS 333 Week 9 Lab 9
Eliminating Threats with a Layered Security
Approach 
26
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 10 Discussion FOR MORE CLASSES
VISIT www.cis333rank.com   Describe one (1) IT
position that you currently hold or would like to
hold in the future. Next, explain whether or not
you believe obtaining certifications would help
you in the position in question. If so, determine
the certifications that you believe would prove
to be helpful. Provide a rationale for your
response. 
27
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 10 Technical Project Paper
Information Systems Security FOR MORE CLASSES
VISIT www.cis333rank.com   Technical Project
Paper Information Systems Security Due Week 10
and worth 150 points  Suppose you are the IT
professional in charge of security for a small
pharmacy that has recently opened within a
shopping mall. The daily operation of a pharmacy
is a unique business that requires a
28
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 11 Discussion 1 Course Takeaway FOR
MORE CLASSES VISIT www.cis333rank.com   "Course
Takeaway" Please respond to the following Share
two new insights about networking security
fundamentals you have discovered from this
course. Explain how this type of course is
essential for every network security professional.
29
CJA 234 MART The power of possibility/cja234martd
otcom
CIS 333 RANK Education Redefined/cis333rank.com
CIS 333 Week 11 Discussion 2 Course Wrap up FOR
MORE CLASSES VISIT www.cis333rank.com   "Course
Wrap-up" Please respond to the following Explain
five or more key topics discussed during this
course that you would like to teach a friend who
has a minimal level of information systems
security knowledge.  Discuss how you can apply
the learning outcomes of this course to your
professional and personal life.
30
CIS 333 RANK Education Redefined/cis333rank.com
Write a Comment
User Comments (0)
About PowerShow.com