CYB 205 Enhance teaching - snaptutorial.com

Page 1

CYB 205 Entire Course

For more classes visit www.snaptutorial.com CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities CYB 205 Week 2 Individual: AntiVirus and NMAP Scans CYB 205 Week 3 Individual: Access Control and PKI CYB 205 Week 4 Individual: Audit Logs CYB 205 Week 5 Individual: Business Continuity and the Cloud

CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities

For more classes visit www.snaptutorial.com


CYB 205 Week 1 Individual: Inventory Assets on Network and Identify Vulnerabilities Complete the Practice Lab titled “Inventory Assets on Network and Identify Vulnerabilities.”

Capture screenshots and place in a Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoft® Word document:

Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores. Are the results of default scans different than the credentialed scan? Why might that be? What types of vulnerabilities might an attacker without any credentials be able to identify and exploit? This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN? Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud? Submit your assignment using the Assignment Files tab.


CYB 205 Week 2 Individual: AntiVirus and NMAP Scans

For more classes visit www.snaptutorial.com CYB 205 Week 2 Individual: AntiVirus and NMAP Scans Complete the Practice Lab titled “AntiVirus and NMAP Scans.”

Capture screenshots taken during the lab in a Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document:

Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network. This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?


Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack? Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment. Submit your assignment using the Assignment Files tab.

CYB 205 Week 3 Individual: Access Control and PKI

For more classes visit www.snaptutorial.com CYB 205 Week 3 Individual: Access Control and PKI Identity and access management is extremely important, and doing it incorrectly can leave critical data exposed.

Complete the Practice Lab “Access Control and PKI.”

Capture screenshots taken during the lab in your Microsoft® Word document as specified within the lab instructions.


At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document:

Explain the types of information that can be stored in an Active Directory user record. What are some of the additional tabs which are available in the Active Directory Users and Computers “Advanced Features” mode? What are some of the specific challenges and risks associated with account management in a large infrastructure? How can inadequate access controls or access management leave critical information vulnerable? What protections does encryption offer and how important is key management to keeping any encryption system secured? Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many users accessing these systems from all over the world. What advantages or challenges might there be managing these identities and associated keys? Finally, conclude this week’s assignment with a page explaining how the tools and processes demonstrated in the lab might be used by an infrastructure administrator to help secure an environment. Submit your assignment using the Assignment Files tab.

CYB 205 Week 4 Individual: Audit Logs

For more classes visit


www.snaptutorial.com CYB 205 Week 4 Individual: Audit Logs Properly configuring and collecting audit logs requires meticulous care.

Complete the Practice Lab titled “Audit Logs.”

Capture screenshots taken during the lab in your Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document:

Describe what information was contained in the logs and what value they might have in a security investigation. Think about the challenges of getting all of the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings? What are the risks associated with logging too little data or not auditing the correct events? What are the risks associated with logging too many events? When the default configuration is to create audit logs, what impact can this have on security incident investigations?


This was just a single domain with two systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN? Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment? Finally, conclude this week’s assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment. Submit your assignment using the Assignment Files tab.

CYB 205 Week 5 Individual: Business Continuity and the Cloud

For more classes visit www.snaptutorial.com CYB 205 Week 5 Individual: Business Continuity and the Cloud The CEO of your company is concerned that a natural disaster could make your company’s information systems unavailable long enough to significantly impact business. Currently, critical systems like file servers, e-mail services, and applications, such as HR, Payroll, Billing, and Customer Relationship Management (CRM), are hosted in a local datacenter. Your job is to educate the board on the benefits and risks associated with using cloud services for business continuity


and disaster recovery in order to aid their decision on whether to move to a cloud-based service or continue working from a local datacenter.

Prepare a 4- to 5-page MicrosoftÂŽ Word document discussing the use of cloud services for business continuity and disaster recovery. Include the following:

Cloud Services for Business Continuity and Disaster Recovery: Define business continuity and disaster recovery in the context of the cloud services Show the importance of disaster continuity and disaster recovery to the function of the business Risk Assessment: Identify which risks can be transferred to the cloud provider based on the functions of the business Explain new risks associated with using cloud services based on the functions of the business Cost/Benefit Analysis: Show the costs associated with a cloud-based solution for the business Outline the benefits associated with a cloud-based solution for the business Conclusion: Relate the risk assessment and cost/benefit analysis to the business continuity and disaster recovery for the needs the business Submit your assignment using the Assignment Files tab.



Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.