CYB 110 Your Dreams Our Mission/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 110 Your Dreams Our Mission/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 110 Week 1 Individual Protecting Data CYB 110 Week 1 Individual Security Policies CYB 110 Week 1 Individual Risk Management Framework and CIA CYB 110 Week 2 Individual Securing an Operating System CYB 110 Week 2 Individual Configuring Anti-Virus Software – PowerPoint PPT presentation

Number of Views:2
Slides: 17
Provided by: matthewt096

less

Transcript and Presenter's Notes

Title: CYB 110 Your Dreams Our Mission/newtonhelp.com


1
CYB 110 Your Dreams Our Mission/newtonhelp.com
2
CYB 110 All Assignments
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 1 Individual Protecting Data
  • CYB 110 Week 1 Individual Security Policies
  • CYB 110 Week 1 Individual Risk Management
    Framework and CIA

3
CYB 110 Week 1 Individual Protecting Data
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 1 Individual Protecting Data
  • There are many different threats to the
    confidentiality, integrity, and availability of
    data-at-rest. Some threats affect one of these
    security risks (like confidentiality only), and
    some threats affect more than one or even all of
    these risks.

4
CYB 110 Week 1 Individual Risk Management
Framework and CIA
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Risk Management Framework and CIA
  • In Ch. 1, "Introduction to Information Security,"
    of Elementary Information Security, you read
    about National Institute of Standards and
    Technology (NIST) Risk Management Framework (RMF)
    and how it expands on the CIA concepts.

5
CYB 110 Week 1 Individual Security Policies
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 1 Individual Security Policies
  • You have been hired as a security specialist by a
    company to provide methods and recommendations to
    create a more secure environment for company data.

6
CYB 110 Week 2 Individual Configuring Anti-Virus
Software
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 2 Individual Configuring Anti-Virus
    Software
  • You are a security analyst at a large Security
    Operations Center (SOC). Malware infections have
    noticeably increased, and all the impacted
    machines did not have updated anti-virus
    signatures. Your task is to set the anti-virus
    software to secure your companys computers.

7
CYB 110 Week 2 Individual Run/Playbook Part 1
Malware
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Run/Playbook Part 1 Malware
  • Create the first section of your
    Playbook/Runbook.
  • This week you researched malware, attack vectors,
    and how they are related to cybersecurity.
  • Write a 1- to 2-page scenario in which a malware
    attack occurs. Include the following
  • Detail the particular malware, the
    exploited vulnerability, and its attack vector in

8
CYB 110 Week 2 Individual Securing an Operating
System
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 2 Individual Securing an Operating
    System
  • You are a security administrator responsible for
    providing secure configuration requirements for
    new laptop deployments. After reading Module 2 of
    Certified Secure Computer User v2exercises, apply
    the configuration settings below on your Windows
    or Mac computer and take screenshots of each
    step
  • Windows
  • 1. Lock system when not in use
  • 2. Create and change user account password

9
CYB 110 Week 3 Individual Playbook/Runbook Part 2
Social Network Security
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Playbook/Runbook Part 2 Social Network
    Security
  • Add a 1- to 2-page section to your
    Playbook/Runbook that includes the following
  • List of information and data employees
    are not to place online
  • Guidelines for interacting online
  • Guidelines for secure use of email

10
CYB 110 Week 3 Individual Social Network Security
Configuring a Social Network
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 3 Individual Social Network
    Security Configuring a Social Network
  • Your company encourages its employees to interact
    with the corporate Facebook page as a way to
    promote brand awareness and customer engagement.

11
CYB 110 Week 4 Individual Configuring Security on
Mobile Devices
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 4 Individual Configuring Security
    on Mobile Devices
  • Management approved a pilot program in which a
    controlled group of users can access certain
    company data from personally-owned mobile devices
    instead of purchasing corporate mobile devices
    for employees and contractors. As the Security
    Architect, you must provide Bring Your Own Device
    (BYOD) security

12
CYB 110 Week 4 Individual Runbook/Playbook Part 3
Network, Mobile Device, and Cloud Services
Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  • CYB 110 Week 4 Individual Runbook/Playbook Part 3
    Network, Mobile Device, and Cloud Services
    Guidelines
  • Individual Runbook/Playbook Part 3 Network,
    Mobile Device, and Cloud Services Guidelines
  • Add a 1- to 2-page section to your
    Playbook/Runbook.

13
CYB 110 Week 5 Individual Configure Backup
Settings
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Configure Backup Settings
  • You want to ensure your personal computer is set
    to save data on a daily basis. Using OneDrive
    configure a personal computer to save and
    maintain data.
  • Configure backup settings as described below,

14
CYB 110 Week 5 Individual Disaster Recovery and
Business Continuity Plan
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Disaster Recovery and Business
    Continuity Plan
  • You work for a multi-state company with three
    sites in three different
  • states, 1,000 employees, an ERP application with
    a backend database,
  • and two datacenters.

15
CYB 110 Week 5 Individual Playbook/Runbook Part 4
Secure Data Backup Guidelines
  • For more course tutorials visit
  • www.newtonhelp.com
  • Individual Playbook/Runbook Part 4 Secure Data
    Backup Guidelines
  • NOTE Only Part 4 is Included - Part 1, 2, 3
    Not Included.
  • Add a 1- to 2-page section to your
    Playbook/Runbook.

16
CYB 110 Your Dreams Our Mission/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com