Presentation is loading. Please wait.

Presentation is loading. Please wait.

CIS 333 RANK Lessons in Excellence-- cis333rank.com.

Similar presentations


Presentation on theme: "CIS 333 RANK Lessons in Excellence-- cis333rank.com."— Presentation transcript:

1 CIS 333 RANK Lessons in Excellence-- cis333rank.com

2 CIS 333 Entire Course (check details in description) FOR MORE CLASSES VISIT www.cis333rank.com PLEASE CHECK ALL INCLUDED PRODUCTS IN THIS TUTORIAL AS SOME QUIZ MAY BE MISSING CIS 333 Week 1 Discussion Providing Security Over Data CIS 333 Week 2 Discussion Risk Management and Malicious Attacks CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools CIS 333 RANK Lessons in Excellence-- cis333rank.com

3 CIS 333 Final Exam (3 Sets) FOR MORE CLASSES VISIT www.cis333rank.com This Tutorial contains 3 Set of Finals Question 1 SIP is a ___________ protocol used to support real-time communications. Question 2 What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place? CIS 333 RANK Lessons in Excellence-- cis333rank.com

4 CIS 333 Week 1 Discussion Providing Security Over Data FOR MORE CLASSES VISIT www.cis333rank.com "Providing Security Over Data" Please respond to the following: The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the primary means in which each of the three (3) tenets are addressed to mitigate risk and enhance security in your chosen environment. CIS 333 RANK Lessons in Excellence-- cis333rank.com

5 CIS 333 Week 1-11 Discussion FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 1 Discussion Providing Security Over Data CIS 333 Week 2 Discussion Risk Management and Malicious Attacks CIS 333 Week 3 Discussion CIS 333 RANK Lessons in Excellence-- cis333rank.com

6 CIS 333 Week 2 Discussion Risk Management and Malicious Attacks FOR MORE CLASSES VISIT www.cis333rank.com "Risk Management and Malicious Attacks" Please respond to the following: With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these responses. CIS 333 RANK Lessons in Excellence-- cis333rank.com

7 CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools CIS 333 RANK Lessons in Excellence-- cis333rank.com

8 CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD) FOR MORE CLASSES VISIT www.cis333rank.com Case Study 1: Bring Your Own Device (BYOD) Due Week 3 and worth 60 points Read the following articles located in the course shell: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes. CIS 333 RANK Lessons in Excellence-- cis333rank.com

9 CIS 333 Week 3 Discussion Security Administration and Access Control FOR MORE CLASSES VISIT www.cis333rank.com "Security Administration and Access Control" Please respond to the following: From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability. CIS 333 RANK Lessons in Excellence-- cis333rank.com

10 CIS 333 Week 3 Lab 2 FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 3 Lab 2 Performing a Vulnerability Assessment Case Study 1 Bring Your Own Device (BYOD) CIS 333 RANK Lessons in Excellence-- cis333rank.com

11 CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities (2 Papers) FOR MORE CLASSES VISIT www.cis333rank.com This Tutorial contains 2 Papers Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities Due Week 4 and worth 75 points You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains: 1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC) CIS 333 RANK Lessons in Excellence-- cis333rank.com

12 CIS 333 Week 4 Discussion Security Monitoring FOR MORE CLASSES VISIT www.cis333rank.com "Security Monitoring" Please respond to the following: Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment. CIS 333 RANK Lessons in Excellence-- cis333rank.com

13 CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls CIS 333 RANK Lessons in Excellence-- cis333rank.com

14 CIS 333 Week 5 Discussion Business Impact Analysis (BIA) and Risk Management FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 5 Discussion "Business Impact Analysis (BIA) and Risk Management" Please respond to the following: According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples to support your response. CIS 333 RANK Lessons in Excellence-- cis333rank.com

15 CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control CIS 333 RANK Lessons in Excellence-- cis333rank.com

16 CIS 333 Week 6 Case Study 2 Public Key Infrastructure (2 Papers) FOR MORE CLASSES VISIT www.cis333rank.com This Tutorial contains 2 Papers Case Study 2: Public Key Infrastructure Due Week 6 and worth 60 points Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. CIS 333 RANK Lessons in Excellence-- cis333rank.com

17 CIS 333 Week 6 Discussion Cryptography FOR MORE CLASSES VISIT www.cis333rank.com "Cryptography" Please respond to the following: Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution. If you had to select one (1) of the two (2) encryption options over the other, justify the one that you would choose, and explain your reasoning. CIS 333 RANK Lessons in Excellence-- cis333rank.com

18 CIS 333 Week 6 Lab 5 Performing Packet Capture and Traffic Analysis FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 6 Lab 5 Performing Packet Capture and Traffic Analysis CIS 333 RANK Lessons in Excellence-- cis333rank.com

19 CIS 333 Week 7 Discussion Network Security FOR MORE CLASSES VISIT www.cis333rank.com "Network Security" Please respond to the following: From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security. Select the two (2) most important and / or unique features of the chosen firewall, and explain the primary reasons why those features make the firewall a viable option in enterprises today. Justify your answer. CIS 333 RANK Lessons in Excellence-- cis333rank.com

20 CIS 333 Week 7 Lab 6 Using Encryption to Enhance Confidentiality and Integrity FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 7 Lab 7 Using Encryption to Enhance Confidentiality and Integrity CIS 333 RANK Lessons in Excellence-- cis333rank.com

21 CIS 333 Week 8 Assignment 2 Identifying Potential Risk, Response, and Recovery FOR MORE CLASSES VISIT www.cis333rank.com Assignment 2: Identifying Potential Risk, Response, and Recovery Due Week 8 and worth 75 points In Assignment 1, a videogame development company recently hired you as an Information Security Engineer. After viewing a growing number of reports detailing malicious activity, the CIO requested that you draft a report in which you identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization. CIS 333 RANK Lessons in Excellence-- cis333rank.com

22 CIS 333 Week 8 Discussion The Impact of Malware FOR MORE CLASSES VISIT www.cis333rank.com "The Impact of Malware" Please respond to the following: From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals. CIS 333 RANK Lessons in Excellence-- cis333rank.com

23 CIS 333 Week 8 Lab 7 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 8 Lab 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities CIS 333 RANK Lessons in Excellence-- cis333rank.com

24 CIS 333 Week 9 Discussion FOR MORE CLASSES VISIT www.cis333rank.com "Security Standards" Please respond to the following: A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security. Provide a rationale for your response. CIS 333 RANK Lessons in Excellence-- cis333rank.com

25 CIS 333 Week 9 Lab 8 Eliminating Threats with a Layered Security Approach FOR MORE CLASSES VISIT www.cis333rank.com CIS 333 Week 9 Lab 9 Eliminating Threats with a Layered Security Approach CIS 333 RANK Lessons in Excellence-- cis333rank.com

26 CIS 333 Week 10 Discussion FOR MORE CLASSES VISIT www.cis333rank.com Describe one (1) IT position that you currently hold or would like to hold in the future. Next, explain whether or not you believe obtaining certifications would help you in the position in question. If so, determine the certifications that you believe would prove to be helpful. Provide a rationale for your response. CIS 333 RANK Lessons in Excellence-- cis333rank.com

27 CIS 333 Week 10 Technical Project Paper Information Systems Security FOR MORE CLASSES VISIT www.cis333rank.com Technical Project Paper: Information Systems Security Due Week 10 and worth 150 points Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared toward protecting medication and funds located on the premises, as well as the customers’ personally identifiable information and protected health information that resides on your system. CIS 333 RANK Lessons in Excellence-- cis333rank.com

28 CIS 333 Week 11 Discussion 1 Course Takeaway FOR MORE CLASSES VISIT www.cis333rank.com "Course Takeaway" Please respond to the following: Share two new insights about networking security fundamentals you have discovered from this course. Explain how this type of course is essential for every network security professional. CIS 333 RANK Lessons in Excellence-- cis333rank.com

29 CIS 333 Week 11 Discussion 2 Course Wrap up FOR MORE CLASSES VISIT www.cis333rank.com "Course Wrap-up" Please respond to the following: Explain five or more key topics discussed during this course that you would like to teach a friend who has a minimal level of information systems security knowledge. Discuss how you can apply the learning outcomes of this course to your professional and personal life. CIS 333 RANK Lessons in Excellence-- cis333rank.com

30


Download ppt "CIS 333 RANK Lessons in Excellence-- cis333rank.com."

Similar presentations


Ads by Google