CYB 140 Extraordinary Life/newtonhelp.com   - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 140 Extraordinary Life/newtonhelp.com  

Description:

For more course tutorials visit www.newtonhelp.com CYB 140 Week 1 Discussion Physical Security CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 3 Discussion A Firewall Can't Do it All – PowerPoint PPT presentation

Number of Views:4
Slides: 20
Provided by: frangipanimag16

less

Transcript and Presenter's Notes

Title: CYB 140 Extraordinary Life/newtonhelp.com  


1
CYB 140 Extraordinary Life/newtonhelp.com
2
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Entire Course For more course tutorials
visit www.newtonhelp.com     CYB 140 Week 1
Discussion Physical Security   CYB 140 Week 1
Assignment Security Control Evaluation   CYB 140
Week 2 Discussion Virtualized Server vs. Physical
Server
3
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 All DQs   For more course tutorials
visit www.newtonhelp.com     CYB 140 Week 1
Discussion Physical Security CYB 140 Week 2
Discussion Virtualized Server vs. Physical
Server  CYB 140 Week 3 Discussion A Firewall
Can't Do it All  CYB 140 Week 4 Discussion
Intrusion Detection Systems   
4
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 1 Discussion Physical Security   For
more course tutorials visit www.newtonhelp.com   R
espond to the following in a minimum of 175
words   After watching the Lynda.com video
"Physical Security Control Types," explain the
various types of security controls, how they
relate to the security controls specified in the
Reading for NIST SP-800-53A, and how their
5
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 1 Individual Assignment Individual
Security Control Evaluation   For more course
tutorials visit www.newtonhelp.com   CYB 140 Week
1 Individual Assignment Individual Security
Control Evaluation Instructions Read
"Safeguarding the Ultra-Dense Networks with the
Aid of Physical Layer Security A Review and a
Case Study" by Ying Wang. Write a 2- to 3-page
analysis of the case study in which you examine
the security
6
CYB 140 Extraordinary Life/newtonhelp.com
  CYB 140 Week 2 Discussion Virtualized Server
vs. Physical Server   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words After
watching the Lynda.com videos "Virtualization"
and "Virtualization Security," describe the
security challenges that a virtualized
environment, such as virtual servers, present.
How are they different from the security issues
of physical servers
7
CYB 140 Extraordinary Life/newtonhelp.com
  CYB 140 Week 2 Individual Assignment
Individual Application Data Establish Host
Security For more course tutorials
visit www.newtonhelp.com     CYB 140 Week 2
Individual Assignment Individual Application
Data Establish Host Security  Instructions
Complete the following exercise from Practice Lab
"SY0-401 CompTIA Security Application Data -
Establish Host Security"  
8
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 2 Individual Assignment Individual
Install OS Updates and Configure Security
Policy   For more course tutorials
visit www.newtonhelp.com     CYB 140 Week 2
Individual Assignment Individual Install OS
Updates and Configure Security Policy Instructions
Complete the following exercises from Practice
Lab "N10-006-CompTIA Network Install OS Updates
and Configure Security Policy"    
9
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 2 Learning Team Assignment
Individual Monitoring Servers For more course
tutorials visit www.newtonhelp.com     CYB 140
Week 2 Learning Team Assignment Individual
Monitoring Servers Instructions Complete the
following exercises from Practice Lab
"CS0-001CompTIA Cybersecurity Analyst (CSA) -
Monitoring Servers" Exercise 1 - "Data Collector
Sets"  
10
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 3 Discussion A Firewall Can't Do it
All   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words   You have
been learning how firewalls use Access Control
Lists (ACLs) to block traffic from specified IP
addresses. Firewalls can also block ports,
however firewalls do not provide complete
security.
11
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 3 Individual Assignment Individual
Firewall Configuration   For more course
tutorials visit www.newtonhelp.com     CYB 140
Week 3 Individual Assignment Individual Firewall
Configuration  Instructions Complete the
following exercises from Practice Lab "SY0-401
CompTIA Security Network Security - Firewall
Rule Based Management"
12
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 4 Discussion Intrusion Detection
Systems   For more course tutorials
visit www.newtonhelp.com     Respond to the
following in a minimum of 175 words  After
watching the Lynda.com video "Network Intrusion
Detection and Prevention," discuss techniques
used to evade Intrusion Detection Systems (IDS)
as if you were a hacker.
13
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual
IDS vs. IPS For more course tutorials
visit www.newtonhelp.com     CYB 140 Week 4
Individual Assignment Individual IDS vs.
IPS   Instructions Research IDS and IPS. Create
a table comparing IDS and IPS, including types,
placement, and features. Create a 6- to 8-slide
PowerPoint presentation to the CIO of a company
in which you analyze and
14
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual
Network Fundamentals Understanding IPSec   For
more course tutorials visit www.newtonhelp.com    
CYB 140 Week 4 Individual Assignment Individual
Network Fundamentals Understanding
IPSec  Instructions Complete the following
exercise from Practice Lab "N10-006 - CompTIA
Network Understanding How IPSec Works"
15
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual
Understanding IDS Firewall Evasion and
Honeypots   For more course tutorials
visit www.newtonhelp.com   CYB 140 Week 4
Individual Assignment Individual Understanding
IDS Firewall Evasion and Honeypots  Instructions
Complete the following exercise from Practice Lab
"SY0-401 CompTIA Security Understanding IDS
Firewall Evasion and Honeypots"  
16
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 5 Assignment Configuring VPNs For
more course tutorials visit www.newtonhelp.com    
Complete the following exercise from Practice
Lab "N10-005 - Network Configuring
VPNs" Exercise 1 - "Configure Remote
Access" Exercise 2 - "Configure Network Access
Protection"
17
CYB 140 Extraordinary Life/newtonhelp.com
  CYB 140 Week 5 Discussion VPN vs SSL For more
course tutorials visit www.newtonhelp.com     Resp
ond to the following in a minimum of 175
words   You are an information security
professional within your organization. Your boss
comes into your office and asks you to explain
the difference between
18
CYB 140 Extraordinary Life/newtonhelp.com
CYB 140 Week 5 Individual Assignment Individual
VPN Configuration Plan For more course
tutorials visit www.newtonhelp.com     CYB 140
Week 5 Individual Assignment Individual VPN
Configuration Plan Instructions Review the
"Real-World Security Incident" activity and
incorporate your findings in this assignment.
Research vulnerabilities that may have
contributed to security incidents
19
CYB 140 Extraordinary Life/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com