CYB 140 All DQs
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 1 Discussion Physical Security CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 3 Discussion A Firewall Can't Do it All CYB 140 Week 4 Discussion Intrusion Detection Systems CYB 140 Week 5 Discussion VPN vs SSL -----------------------------------------------------------
CYB 140 Entire Course
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 1 Discussion Physical Security CYB 140 Week 1 Assignment Security Control Evaluation CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 2 Assignment Monitoring Servers CYB 140 Week 2 Assignment Install OS Updates and Configure Security Policy CYB 140 Week 2 Assignment Application Data Establish Host Security CYB 140 Week 3 Discussion A Firewall Can't Do it All CYB 140 Week 3 Assignment Firewall Configuration CYB 140 Week 4 Discussion Intrusion Detection Systems CYB 140 Week 4 Assignment Network Fundamentals Understanding IPSec CYB 140 Week 4 Assignment Understanding IDS Firewall Evasion and Honeypot CYB 140 Week 4 Assignment IDS vs. IPS Presentation CYB 140 Week 5 Discussion VPN vs SSL CYB 140 Week 5 Assignment Configuring VPNs CYB 140 Week 5 VPN Configuration Plan
-----------------------------------------------------------
CYB 140 Week 1 Discussion Physical Security
For more course tutorials visit www.newtonhelp.com Respond to the following in a minimum of 175 words: After watching the Lynda.comÂŽ video "Physical Security Control Types," explain the various types of security controls, how they relate to the security controls specified in the Reading for NIST SP-800-53A, and how their implementation protect a company's assets, including the facilities, IT infrastructure, and network. -----------------------------------------------------------
CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation Instructions: Read "Safeguarding the Ultra-Dense Networks with the Aid of Physical Layer Security: A Review and a Case Study" by Ying Wang. Write a 2- to 3-page analysis of the case study in which you examine the security controls that were compromised, determine what could have been done to prevent the compromise, and compile a list of future security controls that will need to be put in place to prevent other attacks. Submit your assignment using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words:
After watching the Lynda.com® videos "Virtualization" and "Virtualization Security," describe the security challenges that a virtualized environment, such as virtual servers, present. How are they different from the security issues of physical servers? -----------------------------------------------------------
CYB 140 Week 2 Individual Assignment Individual: Application Data – Establish Host Security
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 2 Individual Assignment Individual: Application Data – Establish Host Security
Instructions: Complete the following exercise from Practice Lab "SY0401 CompTIA Security+: Application Data - Establish Host Security":
Exercise 1 - "Anti-Virus Programs" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab.
Instructions: Read "Safeguarding the Ultra-Dense Networks with the Aid of Physical Layer Security: A Review and a Case Study" by Ying Wang. Write a 2- to 3-page analysis of the case study in which you examine the security controls that were compromised, determine what could have been done to prevent the compromise, and compile a list of future security controls that will need to be put in place to prevent other attacks. Submit your assignment using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 2 Individual Assignment Individual: Install OS Updates and Configure Security Policy
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 2 Individual Assignment Individual: Install OS Updates and Configure Security Policy
Instructions: Complete the following exercises from Practice Lab "N10006-CompTIA Network+: Install OS Updates and Configure Security Policy":
Exercise 1 - "Configure and Run Windows Update" Exercise 2 - "Configure Network Security Policy" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 2 Learning Team Assignment Individual: Monitoring Servers
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 2 Learning Team Assignment Individual: Monitoring Servers Instructions: Complete the following exercises from Practice Lab "CS0001CompTIA Cybersecurity Analyst (CSA+) - Monitoring Servers":
Exercise 1 - "Data Collector Sets" Exercise 2 - "Configuring Alerts for Data Collector Sets"
Exercise 3 - "Configure Event Subscription" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 3 Discussion A Firewall Can't Do it All
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words: You have been learning how firewalls use Access Control Lists (ACLs) to block traffic from specified IP addresses. Firewalls can also block ports, however firewalls do not provide complete security. Research five types of firewalls. Discuss the basic limitations of a typical firewall's security. What does a firewall not do for protection? -----------------------------------------------------------
CYB 140 Week 3 Individual Assignment Individual: Firewall Configuration
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 3 Individual Assignment Individual: Firewall Configuration
Instructions: Complete the following exercises from Practice Lab "SY0401 CompTIA Security+: Network Security - Firewall Rule Based Management":
Exercise 1 - "Configuring Firewall Rules Using Windows Firewall" Exercise 2 - "Configuring Firewall Rules Using Windows Firewall with Advanced Security" Exercise 3 - "Configuring Firewall Rules Using Remote Desktop" Exercise 4 - "Configuring Firewall Rules from the Command Line Interface" Capture screenshots for each task while completing each exercise. Paste screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab, examining how the security posture changed, and how exposure has been mitigated or limited from free public information. Submit your screenshots and reflection using the Assignment Files tab.
-----------------------------------------------------------
CYB 140 Week 4 Discussion Intrusion Detection Systems
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words:
After watching the Lynda.comÂŽ video "Network Intrusion Detection and Prevention," discuss techniques used to evade Intrusion Detection Systems (IDS) as if you were a hacker. -----------------------------------------------------------
CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS
Instructions: Research IDS and IPS. Create a table comparing IDS and IPS, including types, placement, and features. Create a 6- to 8-slide PowerPointÂŽ presentation to the CIO of a company in which you analyze and justify which IDS and IPS types would be most useful to them and how an IDS uses rules and signatures to identify potentially harmful traffic. Submit your assignment using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 4 Individual Assignment Individual: Network Fundamentals: Understanding IPSec
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual: Network Fundamentals: Understanding IPSec
Instructions: Complete the following exercise from Practice Lab "N10006 - CompTIA Network+: Understanding How IPSec Works":
Exercise 1 - "Internet Protocol Security - IPSec" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab, issues you had and how you overcame them, and explain how network monitoring ties into IDS/IPS configuration. Submit your screenshots and reflection using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 4 Individual Assignment Individual: Understanding IDS Firewall Evasion and Honeypots
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 4 Individual Assignment Individual: Understanding IDS Firewall Evasion and Honeypots
Instructions: Complete the following exercise from Practice Lab "SY0401 CompTIA Security+: Understanding IDS Firewall Evasion and Honeypots":
Exercise 1 - "Install and Configure ZoneAlarm Firewall" Exercise 2 - "Install and Configure Snort"" Exercise 3 - "Using Anonymous Proxy Sites" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab. -----------------------------------------------------------
CYB 140 Week 5 Assignment Configuring VPNs
For more course tutorials visit www.newtonhelp.com
Complete the following exercise from Practice Lab "N10-005 Network+: Configuring VPNs":  
Exercise 1 - "Configure Remote Access" Exercise 2 - "Configure Network Access Protection"
Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab explaining obstacles you encountered and how you overcame them. Submit your screenshots and reflection. -----------------------------------------------------------
CYB 140 Week 5 Discussion VPN vs SSL
For more course tutorials visit www.newtonhelp.com
Respond to the following in a minimum of 175 words:
You are an information security professional within your organization. Your boss comes into your office and asks you to explain the difference between a VPN and SSL connection. The company uses both, but your boss is confused on what each is used for. Discuss how you would explain the difference between a VPN and SSL connection. What advantages or disadvantages do they each offer? -----------------------------------------------------------
CYB 140 Week 5 Individual Assignment Individual: VPN Configuration Plan
For more course tutorials visit www.newtonhelp.com
CYB 140 Week 5 Individual Assignment Individual: VPN Configuration Plan
Instructions: Review the "Real-World Security Incident" activity and incorporate your findings in this assignment. Research vulnerabilities that may have contributed to security incidents with respect to VPN/SSL as discussed in Weeks Three and Five. Create a table comparing the vulnerabilities, threats, and risks for the real world security incident discussed by the class, along with related vulnerabilities that may have contributed to the security incident. Create a 4- to 6-slide multimedia rich PowerPointÂŽ presentation that you will present to a group of CIOs,
displaying the vulnerabilities, threats, and risks from least significance to greatest significance and how each would negatively impact the company. Submit your assignment using the Assignment Files tab. -----------------------------------------------------------