Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYB 100 Teaching Effectively-- snaptutorial.com

Similar presentations


Presentation on theme: "CYB 100 Teaching Effectively-- snaptutorial.com"— Presentation transcript:

1 CYB 100 Teaching Effectively-- snaptutorial.com

2 CYB 100 All Assignments For more classes visit www.snaptutorial.com CYB 100 Week 1 Organizational Data Flow CYB 100 Week 1 Protocols Lab CYB 100 Week 2 Individual Cyber security Laws CYB 100 Week 3 Assignment Conflict CYB 100 Week 3 Individual Geopolitics In Key Nations CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard

3 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Assignment Week 1 Defining the Cyber Domain For more classes visit www.snaptutorial.com Individual: Defining the Cyber Domain Instructions: The Chief Information Officer (CIO) of the organization you chose in the Week 1 discussion, "Key Components of an Information System as Related to the Cyber Domain," is looking for more information on the cyber domain in hopes of determining the organization's cybersecurity needs. As a cyber-security consultant, you believe you can provide the CIO with the information he needs.

4 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Assignment Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain For more classes visit www.snaptutorial.com Individual: Legal, Ethical, and Privacy Issues in the Cyber Domain Instructions: The CIO of the organization you chose read your letter and would like to meet with you to discuss the legal, ethical, and privacy issues governing the cyber domain and directly impacting the organization. Research the legal, ethical, and privacy issues as they relate to your chosen organization and the broader cyber domain.

5 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Assignment Week 3 Security Planning and Risk Management For more classes visit www.snaptutorial.com Individual: Security Planning and Risk Management Instructions: Resource: Security Planning and Risk Management Template The CIO of the organization you chose is ready for you to take a look at the organization's potential vulnerabilities and threats. Complete the 1.5- to 2-page Security Planning and Risk Management Template. Include the following:

6 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Assignment Week 4 Intrusion Detection For more classes visit www.snaptutorial.com Individual: Intrusion Detection Instructions: After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide justification for adding intrusion detection software (IDS), as well. Research various IDS that would benefit the company.

7 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Assignment Week 5 Roles in the Cyber Domain For more classes visit www.snaptutorial.com Individual: Roles in the Cyber Domain Instructions: The presentation was a success, and the CIO of the organization you choose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning:

8 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 1 Organizational Data Flow For more classes visit www.snaptutorial.com You have recently been hired as a Cybersecurity Intern with a medium- sized company that is growing very rapidly. The Chief Information Officer (CIO) is trying to understand the importance of the Cyber Domain that the Chief Information Security Officer (CISO) keeps talking about when they discuss expanding the business. The CISO has asked you to write an email to the CIO that explains the scope of the Cyber Domain, common assets of the Cyber Domain, and important milestones in its development. Write a 350-to 700-word email using Microsoft® Word to the CIO explaining the following: Clearly define the term "Cyber Domain"

9 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 1 Protocols Lab For more classes visit www.snaptutorial.com Cyberspace and the Internet (the Web) are closely related. The term "Internet" refers to a series of protocols which represent actual methods of access and transfer of digital assets. Most internet users are familiar with the protocol of HTTP and the multimedia part of the Web called the World Wide Web (WWW). Other protocols are included in the TCP/IP protocol suite. IT and Web specialists are aware of these other protocols and their uses. Knowledge of these protocols is important to recognizing risks in cyberspace.

10 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 2 Individual Cyber security Laws For more classes visit www.snaptutorial.com The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information. Write a 2-page paper using Microsoft® Word t

11 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 3 Assignment Conflict For more classes visit www.snaptutorial.com Research a current domestic or international conflict in the cyber domain. As a way of checking for your understanding of the nature of conflict as described in the video,write a 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following: Identify the reason for the conflict and the opposing forces

12 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 3 Individual Geopolitics In Key Nations For more classes visit www.snaptutorial.com Create a 1-page 4 row by 3 column table in Microsoft® Word that depicts laws for the U.S. and two other key nations in the strategic, tactical, and operational areas of cybersecurity. Provide a brief description of the law for each category of cybersecurity provided. The table column headings could be U.S., Russia, and China, for instance (or two other key nations of your choice). The row labels are Strategical, Tactical, and Operational.

13 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 4 Individual Final Project Part 1 Paper And Storyboard For more classes visit www.snaptutorial.com Write a 350-word FAQ document using Microsoft® Word in response to the following: Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare a FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace, and cloud technology. The U.S.-based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following:

14 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 5 Cloud Storage-as-a-Service Resource Lab For more classes visit www.snaptutorial.com Write a 1-page informal paper using Microsoft® Word that answers the following questions: Accurately define Cloud Storage-as-a-Service Accurately describe how to get to OneDrive® from a web browser Describe in a set-by-step manner how to sync files What is a guest link? List three ways you can control access in OneDrive®

15 CYB 100 Teaching Effectively-- snaptutorial.com CYB 100 Week 5 Final part 2 Cloud Storage as a Service Provider For more classes visit www.snaptutorial.com Create a Microsoft® PowerPoint® presentation containing eight slides, including Introduction, Conclusion, and Reference slides. Include detailed speaker notes with each slide. Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries.

16 CYB 100 Teaching Effectively-- snaptutorial.com


Download ppt "CYB 100 Teaching Effectively-- snaptutorial.com"

Similar presentations


Ads by Google