CYB 205 Improved tutorial / newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 205 Improved tutorial / newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com CYB 205 Week 1 Discussion Vulnerabilities CYB 205 Week 2 Discussion Threats CYB 205 Week 3 Discussion Cryptography CYB 205 Week 4 Discussion Technical Controls – PowerPoint PPT presentation

Number of Views:7
Slides: 15
Provided by: king1611

less

Transcript and Presenter's Notes

Title: CYB 205 Improved tutorial / newtonhelp.com


1
CYB 205 Improved tutorial / newtonhelp.com
2
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 All Discussion
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 1 Discussion Vulnerabilities
  • CYB 205 Week 2 Discussion Threats
  • CYB 205 Week 3 Discussion Cryptography
  • CYB 205 Week 4 Discussion Technical Controls

3
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Entire Course
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 1 Individual Inventory Assets on
    Network and Identify Vulnerabilities
  •  
  • CYB 205 Week 2 Individual AntiVirus and NMAP
    Scans
  •  
  • CYB 205 Week 3 Individual Access Control and PKI
  •  
  • CYB 205 Week 4 Individual Audit Logs
  •  

4
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 1 Discussion Vulnerabilities
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Vulnerabilities can exist in both a business'
    software and hardware. 
  •  
  • Discuss the differences between software and
    hardware vulnerabilities. How might these
    vulnerabilities impact a business
  •  

5
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 1 Individual Inventory Assets on
    Network and Identify Vulnerabilities
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 1 Individual Inventory Assets on
    Network and Identify Vulnerabilities
  •  
  • Complete the Practice Lab titled Inventory
    Assets on Network and Identify Vulnerabilities.
  •  

6
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 2 Discussion Threats
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Today's datacenters are populated with not only
    physical hardware but systems hosting virtual
    machines and containers. These systems
    communicate locally and around the globe over
    networks. 
  •  
  • Discuss two different examples of threats to
    various parts of heterogeneous architectures and
    how they might manifest. Do not forget about the
    hardware, operating systems, applications,
    networks, and other integral parts. Discuss the
    threats in your classmates' posts.

7
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 2 Individual AntiVirus and NMAP
    Scans
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 2 Individual AntiVirus and NMAP
    Scans
  •  
  • Complete the Practice Lab titled AntiVirus and
    NMAP Scans.
  •  
  •  
  • Capture screenshots taken during the lab in a
    Microsoft Word document as specified within the
    lab instructions.
  •  
  •  
  • At the end of the lab, you will be asked to
    respond to the following in a 2- to 2.5-page
    response at the end of your Microsoft Word
    document

8
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 3 Discussion Cryptography
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Cryptography has been around for millennia.
    Modern digital crypto systems are more robust
    than ever before. 
  • Explain?cryptography. Discuss how a modern
    encryption system is used to protect data and
    data use.

9
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 3 Individual Access Control and PKI
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 3 Individual Access Control and PKI
  •  
  • Identity and access management is extremely
    important, and doing it incorrectly can leave
    critical data exposed.
  •  
  •  
  • Complete the Practice Lab Access Control and
    PKI.

10
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 4 Discussion Technical Controls
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Controls are countermeasures used to treat risks.
    Within the categories of administrative or
    technical controls, there can be preventative,
    detective, and responsive types of controls. 
  • Research?a specific control, and?discuss?how it
    differs from the other technical controls. 
  • Example An appropriate use policy could be an
    administrative preventative control.

11
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 4 Individual Audit Logs
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 4 Individual Audit Logs
  •  
  • Properly configuring and collecting audit logs
    requires meticulous care.
  •  

12
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 5 Discussion Cloud-based Systems
    Support
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • Respond to the following in a minimum of 175
    words 
  •  
  • Cloud-based systems and services are often ideal
    options for critical parts of a Business
    Continuity (BC) or Disaster Recovery Plan (DRP). 
  • Research?some of the ways this is being done
    today. 
  • Discuss?how cloud-based systems support business
    continuity. How can potential risks be
    transferred to cloud providers? 

13
CYB 205 Improved tutorial / newtonhelp.com
  • CYB 205 Week 5 Individual Business Continuity
    and the Cloud
  • For more course tutorials visit
  • www.newtonhelp.com
  •  
  •  
  • CYB 205 Week 5 Individual Business Continuity
    and the Cloud
  •  
  • The CEO of your company is concerned that a
    natural disaster could make your companys
    information systems unavailable long enough to
    significantly impact business. Currently,
    critical systems like file servers, e-mail
    services, and applications, such as HR, Payroll,
    Billing, and Customer Relationship Management
    (CRM), are hosted in a local datacenter. Your job
    is to educate the board on the benefits and risks
    associated with using cloud services for business
    continuity and disaster recovery in order to aid
    their decision on whether to move to a
    cloud-based service or continue working from a
    local datacenter.

14
CYB 205 Improved tutorial / newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com