Page 1

CYB 140 Entire Course

For more course tutorials visit www.newtonhelp.com

CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation CYB 140 Week 2 Learning Team Assignment Individual: Monitoring Servers CYB 140 Week 2 Individual Assignment Individual: Install OS Updates and Configure Security Policy CYB 140 Week 2 Individual Assignment Individual: Application Data – Establish Host Security CYB 140 Week 3 Individual Assignment Individual: Firewall Configuration CYB 140 Week 4 Individual Assignment Individual: Network Fundamentals: Understanding IPSec CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS CYB 140 Week 4 Individual Assignment Individual: Understanding IDS Firewall Evasion and Honeypots


CYB 140 Week 5 Individual Assignment Individual: VPN Configuration Plan -------------------------------------------------------------------------------------------

CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation

For more course tutorials visit www.newtonhelp.com

CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation Instructions: Read "Safeguarding the Ultra-Dense Networks with the Aid of Physical Layer Security: A Review and a Case Study" by Ying Wang. Write a 2- to 3-page analysis of the case study in which you examine the security controls that were compromised, determine what could have been done to prevent the compromise, and compile a list of future security controls that will need to be put in place to prevent other attacks. Submit your assignment using the Assignment Files tab. -------------------------------------------------------------------------------------------

CYB 140 Week 2 Individual Assignment Individual: Application Data – Establish Host Security


For more course tutorials visit www.newtonhelp.com

CYB 140 Week 2 Individual Assignment Individual: Application Data – Establish Host Security Instructions: Complete the following exercise from Practice Lab "SY0401 CompTIA Security+: Application Data - Establish Host Security":

Exercise 1 - "Anti-Virus Programs" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab.

Instructions: Read "Safeguarding the Ultra-Dense Networks with the Aid of Physical Layer Security: A Review and a Case Study" by Ying Wang. Write a 2- to 3-page analysis of the case study in which you examine the security controls that were compromised, determine what could have been done to prevent the compromise, and compile a list of future security controls that will need to be put in place to prevent other attacks. Submit your assignment using the Assignment Files tab. -------------------------------------------------------------------------------------------


CYB 140 Week 2 Individual Assignment Individual: Install OS Updates and Configure Security Policy

For more course tutorials visit www.newtonhelp.com

CYB 140 Week 2 Individual Assignment Individual: Install OS Updates and Configure Security Policy

Instructions: Complete the following exercises from Practice Lab "N10006-CompTIA Network+: Install OS Updates and Configure Security Policy":

Exercise 1 - "Configure and Run Windows Update" Exercise 2 - "Configure Network Security Policy" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab. -------------------------------------------------------------------------------------------


CYB 140 Week 2 Learning Team Assignment Individual: Monitoring Servers

For more course tutorials visit www.newtonhelp.com

CYB 140 Week 2 Learning Team Assignment Individual: Monitoring Servers

Instructions: Complete the following exercises from Practice Lab "CS0001CompTIA Cybersecurity Analyst (CSA+) - Monitoring Servers":

Exercise 1 - "Data Collector Sets" Exercise 2 - "Configuring Alerts for Data Collector Sets" Exercise 3 - "Configure Event Subscription" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab.


-------------------------------------------------------------------------------------------

CYB 140 Week 3 Individual Assignment Individual: Firewall Configuration

For more course tutorials visit www.newtonhelp.com CYB 140 Week 3 Individual Assignment Individual: Firewall Configuration

Instructions: Complete the following exercises from Practice Lab "SY0401 CompTIA Security+: Network Security - Firewall Rule Based Management":

Exercise 1 - "Configuring Firewall Rules Using Windows Firewall" Exercise 2 - "Configuring Firewall Rules Using Windows Firewall with Advanced Security" Exercise 3 - "Configuring Firewall Rules Using Remote Desktop" Exercise 4 - "Configuring Firewall Rules from the Command Line Interface" Capture screenshots for each task while completing each exercise. Paste screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab, examining how the


security posture changed, and how exposure has been mitigated or limited from free public information. Submit your screenshots and reflection using the Assignment Files tab. -------------------------------------------------------------------------------------------

CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS

For more course tutorials visit www.newtonhelp.com CYB 140 Week 4 Individual Assignment Individual: IDS vs. IPS Instructions: Research IDS and IPS. Create a table comparing IDS and IPS, including types, placement, and features. Create a 6- to 8-slide PowerPointÂŽ presentation to the CIO of a company in which you analyze and justify which IDS and IPS types would be most useful to them and how an IDS uses rules and signatures to identify potentially harmful traffic. Submit your assignment using the Assignment Files tab. -------------------------------------------------------------------------------------------

CYB 140 Week 4 Individual Assignment Individual: Network Fundamentals: Understanding IPSec

For more course tutorials visit


www.newtonhelp.com

CYB 140 Week 4 Individual Assignment Individual: Network Fundamentals: Understanding IPSec

Instructions: Complete the following exercise from Practice Lab "N10006 - CompTIA Network+: Understanding How IPSec Works":

Exercise 1 - "Internet Protocol Security - IPSec" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Write a 1- to 2-page reflection on the purpose and results of the lab, issues you had and how you overcame them, and explain how network monitoring ties into IDS/IPS configuration. Submit your screenshots and reflection using the Assignment Files tab. -------------------------------------------------------------------------------------------

CYB 140 Week 4 Individual Assignment Individual: Understanding IDS Firewall Evasion and Honeypots

For more course tutorials visit www.newtonhelp.com


CYB 140 Week 4 Individual Assignment Individual: Understanding IDS Firewall Evasion and Honeypots Instructions: Complete the following exercise from Practice Lab "SY0401 CompTIA Security+: Understanding IDS Firewall Evasion and Honeypots": Exercise 1 - "Install and Configure ZoneAlarm Firewall" Exercise 2 - "Install and Configure Snort"" Exercise 3 - "Using Anonymous Proxy Sites" Capture screenshots for each task while completing the exercise. Paste screenshots in a Word document. Submit your screenshots using the Assignment Files tab. -------------------------------------------------------------------------------------------

CYB 140 Week 5 Individual Assignment Individual: VPN Configuration Plan

For more course tutorials visit www.newtonhelp.com


CYB 140 Week 5 Individual Assignment Individual: VPN Configuration Plan

Instructions: Review the "Real-World Security Incident" activity and incorporate your findings in this assignment. Research vulnerabilities that may have contributed to security incidents with respect to VPN/SSL as discussed in Weeks Three and Five. Create a table comparing the vulnerabilities, threats, and risks for the real world security incident discussed by the class, along with related vulnerabilities that may have contributed to the security incident. Create a 4- to 6-slide multimedia rich PowerPointÂŽ presentation that you will present to a group of CIOs, displaying the vulnerabilities, threats, and risks from least significance to greatest significance and how each would negatively impact the company. Submit your assignment using the Assignment Files tab. -------------------------------------------------------------------------------------------

Profile for amaranthbe.goniabellfl.owerbel

CYB 140 Extraordinary Success/newtonhelp.com  

For more course tutorials visit www.newtonhelp.com CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation CYB 140 W...

CYB 140 Extraordinary Success/newtonhelp.com  

For more course tutorials visit www.newtonhelp.com CYB 140 Week 1 Individual Assignment Individual: Security Control Evaluation CYB 140 W...

Advertisement