CYB 120 Extraordinary Success/newtonhelp.com

Page 1

CYB 120 Week 1 Individual Mitigation and Deterrent Techniques

For more course tutorials visit www.newtonhelp.com

CYB 120 Week 1 Individual Mitigation and Deterrent Techniques Complete the following exercises in Practice Lab “CUS-EH – Ethical Hacker: Mitigation and Deterrent Techniques”:   

Exercise 1 – “Disabling Unnecessary Services” Exercise 2 – “Protecting Management Interfaces and Applications” Exercise 3 – “Renaming Unnecessary Accounts”

Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab and explain how you are defending your network. Submit your assignment using the Assignment Files tab. ---------------------------------------------------------------------------------------------------------

CYB 120 Week 2 Individual Challenges for Fixing Vulnerabilities

For more course tutorials visit


www.newtonhelp.com CYB 120 Week 2 Individual Challenges for Fixing Vulnerabilities Review the “Challenges for Fixing Vulnerabilities” activity. Create a table comparing ten of the vulnerabilities, threats, and risks for the real world security incident discussed by the class, along with related vulnerabilities that may have contributed to the security incident. Include the following as at least 3 of the comparisons used in the table.   

How was the vulnerability detected? What protocol was attacked? How steps were taken to resolve the vulnerability?

Write a 175- to 350-word narrative explaining trends shown from the table. Submit your assignment using the Assignment Files tab. ---------------------------------------------------------------------------------------------------------

CYB 120 Week 3 Individual Threats – Trojans and Malware Protection

For more course tutorials visit www.newtonhelp.com CYB 120 Week 3 Individual Threats – Trojans and Malware Protection


Complete the following exercises in Practice Labs “SY0-401 – CompTIA Security+: Threats – Trojans and Malware Protection”:   

Exercise 1 – “Activating a Trojan” Exercise 2 – “Testing Network Services with netcat” Exercise 3 – “Deploying Malware Protection”

Capture screenshots for each task while completing each exercise. Paste your screenshots in a Word document. Submit your assignment using the Assignment Files tab. ---------------------------------------------------------------------------------------------------------

CYB 120 Week 4 Individual Controls, Protocols, and Threats

For more course tutorials visit www.newtonhelp.com CYB 120 Week 4 Individual Controls, Protocols, and Threats You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurityavailable, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs. Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:  

What do they protect against? What is their purpose?


Write a 1- to 2-page analysis of your findings answering the following questions.   

How are they implemented to defend against attacks and to limit risk? What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection? What controls and protocols would you find in a security policy?

Submit your assignment using the Assignment Files tab. ---------------------------------------------------------------------------------------------------------

CYB 120 Week 5 Individual Compliance – User Rights and Permissions

For more course tutorials visit www.newtonhelp.com CYB 120 Week 4 Individual Controls, Protocols, and Threats You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurityavailable, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs. Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:  

What do they protect against? What is their purpose?


Write a 1- to 2-page analysis of your findings answering the following questions.   

How are they implemented to defend against attacks and to limit risk? What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection? What controls and protocols would you find in a security policy?

Submit your assignment using the Assignment Files tab. ---------------------------------------------------------------------------------------------------------


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.