CYB 120 CYB120 cyb 120 Best Tutorials Guide - onlinehelp123.com

Page 1

CYB 120 Wk 1 - Practice: Kaplan® Flashcards

Use the Kaplan® Flashcards Access link to access this week's flashcards.

Complete the Flashcards from Kaplan Learn to review key ideas from the CND Certification Exam.

Note: Customize your questions to review the concepts this week. To do this, choose: Customize Background Computer Network Defense Fundamentals

Submit a screenshot of your results to receive points for this assignment.

CYB 120 Wk 1 - Apply: Identifying and Mitigating Risks

You have been learning about various vulnerabilities and their associated risks this week. Keep in mind that companies are not always able to fix all their discovered vulnerabilities.

Select an organization of your choice and research 5 of their most common vulnerabilities, threats, and risks.

Write a 2 - to 3-page recommendation on the steps the organization should take to remediate or mitigate these vulnerabilities, threats, and risks.

CYB/120 Computer Network Defense Part 1 The Latest Version A+ Study Guide ********************************************** CYB 120 Entire Course Link https://www.onlinehelp123.com/cyb-120 **********************************************

If you found actual examples of an organization’s vulnerabilities, risks, or threats, describe how the organization approached remediation and/or mitigation. Annotate those that were fixed or unable to be fixed.

Include impacts to the organization in terms of people, network, data, or reputation.

Cite references as necessary to support your assignment.

Format your citations according to APA guidelines.

Assignment checklist:

1. Title Page

2. The total paper must be 700 – 1050 words (about 2-3 pages but I will be looking at word count)

3. Use the bullets or key points in the instructions and create corresponding heading and subheaders. This way it will be obvious that you hit the key points

4. Include at least one references that are properly cited

5. Any images must have a caption and reference in the paper.

6. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points

7. Follow APA format (fonts, etc) - For details on the formatting see the UOP library tab.

8. All assignments will be in MS Word format unless otherwise noted.

Submit your assignment.

CYB 120 Wk 2 - Practice: Kaplan® Flashcards

Use the Kaplan® Flashcards Access link to access this week's flashcards.

Complete the Flashcards from Kaplan Learn to review key ideas from the CND Certification Exam.

Note: Customize your questions to review the concepts this week. To do this, choose: Customize Background Network Security Concerns

Network Security Controls

Submit a screenshot of your results to receive points for this assignment.

CYB 120 Wk 2 - Apply: Challenges for Fixing Vulnerabilities

Create a table with 11 rows with 5 column headings: Incident, Description, Vulnerability, Detection and Resolution. Complete the first two columns in the table, Incident and Description, identifying and describing 10 actual real-world security incidents the occurred to a company.

Complete the other fields in the table, Vulnerability, Detection and Resolution for at least 3 of the incidents in the table which will describe:

What vulnerabilities allowed the attack to happen?

How did the company detect the incident?

How steps were taken to resolve the incident?

Write a 1- to 2-page narrative explaining trends you see based on your research and information shown from the table.

Submit your assignment.

CYB 120 Wk 2 Team Discussion - OSI and TCP/IP

Research OSI and TCP/IP and how they relate to network security.

Discuss how each aid in network security. Does either provide more effective security? Explain.

Respond to at least 2 classmates’ answers.

Grading will be the same as class participation: 3 posts spread across at least 2 days, a minimum of 175 words and meeting criteria for substantive in the Course Guidelines. If your group is not active, you can also post 3 responses to the original question (all different comments) for full credit.

CYB 120 Wk 3 - Practice: Kaplan® Flashcards

Use the Kaplan® Flashcards Access link to access this week's flashcards.

Complete the Flashcards from Kaplan Learn to review key ideas from the CND Certification Exam.

Note: Customize your questions to review the concepts this week. To do this, choose: Customize Protection Physical Security Host Security

Submit a screenshot of your results to receive points for this assignment.

CYB 120 Wk 3 - Apply: DDOS

Imagine you are on a specialized team tasked with exploring network vulnerabilities in your company. The CEO of the company has read about similar companies being subjected to a distributed denial of service (DDOS) and is very concerned.

Research the definition of a DDOS attack and how it can be prevented. If it cannot be prevented, describe the steps that may be required to remediate the DDOS attack, along with the potential business impacts caused by a DDOS attack.

Prepare a 10- to 12-slide multimedia-rich Microsoft® PowerPoint® boardroom presentation for the CEO. Include the following in your presentation:

Title slide

Definition of a DDOS attack

At least 2 methods (attack vectors) of DDOS attacks to include the threat agents’ (hackers) motivation for conducting a DDOS attack

Common prevention tools and/or processes to block a DDOS

Common detection tools to detect if a DDOS is occurring or has occurred

Recommended methods for containing or eradicating the DDOS attack

Recommended methods for bringing the affected systems back online from a successful DDOS attack

Reference slide

Cite references to support your presentation.

Format your citations according to APA guidelines.

Presentation Checklist

1. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points

2. Consistent fonts and font sizes throughout the presentation

3. Use colors and background. No black and white presentations.

4. Include at least one references that are properly cited

5. Follow APA format (fonts, etc) - For details on the formatting see the UOP library tab.

6. Include speaker notes for every slide except the title and reference pages. Speaker Notes in PowerPoint and How to Use Them

A good example on the universities web site

Submit your assignment.

CYB 120 Wk 4 - Practice: Kaplan® Flashcards

Use the Kaplan® Flashcards Access link to access this week's flashcards.

Complete the Flashcards from Kaplan Learn to review key ideas from the CND Certification Exam.

Note: Customize your questions to review the concepts this week. To do this, choose: Customize Procedures/Methodologies Firewall Management

Submit a screenshot of your results to receive points for this assignment.

CYB 120 Wk 4 - Apply: Controls, Protocols, and Threats

Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.

Create an 8- to 10-slide multimedia-rich Microsoft® PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:

What do they protect against?

What is their purpose?

Write a 2- to 3-page analysis of your findings, answering the following questions:

How are controls or protocols implemented to defend against attacks and to limit risk?

What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?

What controls and protocols would you find in a security policy?

Two part assignment!!!

WARNING - There are two assignments in one for this week, the presentation and the written assignment. Please submit them as two separate documents 1) PowerPoint and 2) MS Word.

1. Presentation Checklist

2. Use the bullets or key points in the instructions and create corresponding heading and subheaders. This way it will be obvious that you hit the key points

3. Consistent fonts and font sizes throughout the presentation

4. Use colors and background. No black and white presentations.

5. Include at least one references that are properly cited

6. Follow APA format (fonts, etc) - For details on the formatting see the UOP library tab.

7. Include speaker notes for every slide except the title and reference pages. Speaker Notes in PowerPoint and How to Use Them

8. A good example on the universities web site:

9. In addition to the points above, I will be looking for speaker notes and be sure to include references. If you have not used speaker notes please research them on the Internet.

Assignment checklist:

1. The reflection must be 700 - 1050 words (about 2-3 pages but I will be looking at word count)

2. Use the bullets or key points in the instructions and create corresponding heading and subheaders. This way it will be obvious that you hit the key points

3. Include at least one references that are properly cited

4. Any images must have a caption and reference in the paper.

5. Follow APA format (fonts, etc) - For details on the formatting see the UOP library tab.

6. All assignments will be in MS Word format unless otherwise noted.

Submit your assignment.

CYB 120 Wk 5 - Practice: Kaplan® Flashcards

Use the Kaplan® Flashcards Access link to access this week's flashcards.

Complete the Flashcards from Kaplan Learn to review key ideas from the CND Certification Exam.

Note: Customize your questions to review the concepts this week. To do this, choose: Customize Procedures/Methodologies VPN Management

Submit a screenshot of your results to receive points for this assignment.

CYB 120 Wk 5 - Apply: Policies Review

Many information security policies cross the entire spectrum of an organization.

Module 04, “Network Security Policy Design and Implementation,” of EC Council CND Courseware provides an extensive list of information security policies.

Choose 5 information security policies.

Find an example of each policy on the Internet. Academic institutions and federal government agencies tend to publish their information security policies that are open to public view.

Write a 2- to 3-page summary of the policies and examples you found in a Microsoft® Word document. Include the following for each of the policies:

Purpose of the policy

Owner of the policy

The audience of the policy Co-dependencies with other policies

A link to the policy example

Cite references to support your summary.

Format your citations according to APA guidelines.

Assignment checklist:

1. The reflection must be 700 – 1050 words (about 2-3 pages but I will be looking at word count)

2. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points

3. Include at least one references that are properly cited

4. Any images must have a caption and referenced in the paper.

5. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points

6. Follow APA format (fonts, etc) - For details on the formatting see the UOP library tab.

7. All assignments will be in MS Word format unless otherwise noted.

Submit your assignment.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.