Refer a friend and get % off! They'll get % off too.

CMGT 245 Entire Course

CMGT 245 Entire Course

IS SECURITY CONCEPTS

 

The Latest Version A+ Study Guide

 


 
CMGT 245 Wee 1 Lab Reflection
 

Assignment Content

窗体顶端

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following:

 

 

 

Any issues you encountered while completing the labs
 

 

What you learned, and what you will watch out for in the future
 

 

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
 

 

A description of the screenshots from each lab and what was done
 

 

 

Submit your assignment.

窗体底端

 

 

 

CMGT 245 Wee 1 Network Vulnerabilities
 

Complete the following labs in the Practice Labs course CompTIA Security+:

 

 

 

“Network Vulnerabilities Part 1”
 

 

“Network Vulnerabilities Part 2”
 

 

 

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

Submit your assignment.

 

 

CMGT 245 Week 2 Individual: Scanning and Remediating Vulnerabilities with OpenVAS & Introduction to Digital Forensics
 

Complete the following labs in the Practice Labs course CompTIA Security+:

 

 

 

“Scanning and Remediating Vulnerabilities with OpenVAS”
 

 

“Introduction to Digital Forensics”
 

 

 

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

 

 

 

Any issues you encountered while completing the labs
 

 

What you learned, and what you will watch out for in the future
 

 

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
 

 

A description of the screenshots from each lab and what was done
 

 

 

Submit your assignment using the Assignment Files tab.  The report must be submitted with full citations and using proper APA formating for all references.  I fully expect that you will reference any materials that are used in preparation of this assignment.

 

 
 

 

 

CMGT 245 Week 2 Risk Assessment Presentation
 

Assignment Content

Resource: Center for Writing Excellence: Tutorials & Guides

Considering the Week Two Learning Team collaborative discussion, “Data Types and Risks,” you had with your team, create a PowerPoint® presentation for Ben.

The 8- to 10-slide media-rich Microsoft® PowerPoint® with speaker notes should include:

 

 

 

The main uses for an IT system in Ben’s business
 

 

The most common risks associated with this system
 

 

A prioritized list of the risks identified
 

 

Mitigations to handle the risks
 

 

 

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your assignment.

 

 

 

 

CMGT 245 Week 3 Individual: Backup and Recovery
 

Complete the lab “Backup and Recovery” in the Practice Labs course CompTIA Security+.

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

 

 

 

Any issues you encountered while completing the lab
 

 

What you learned, and what you will watch out for in the future
 

 

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
 

 

A description of the screenshots from each lab and what was done
 

 

 

Note: All references need to adhere to APA citation guidelines.

Submit your assignment using the Assignment Files tab.

 

 
 

 

 

CMGT 245 Week 3 Individual: Security Risk Review/Contingency Plan
 

Ben’s business is located in an area that is prone to floods and power disruptions.

Leveraging your Week Three Learning Team collaborative discussion, “Information Security Risk Review/ Assessment and Business Continuity,” create a 10- to 12-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:

 

 

 

The key elements to include in a plan that will help ensure that Ben will be able to continue to service his customers following a flood
 

 

The key items to consider when creating a contingency plan in the event the offsite data backup becomes unavailable
 

 

The key aspects of implementing such a plan
 

 

 

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your presentation using the Assignment Files tab.

 

 
 

 

 

CMGT 245 Week 4 Individual: Information Security Policy – Access Controls, Authorization, and Authentication
 

Based on your Week Four Learning Team collaborative discussion, “Access Control & Data Protection,” create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:

 

 

 

The benefits of implementing access controls for Ben’s office
 

 

The ways you can use authorization and authentication to protect the company’s data
 

 

How the use of temporary employees can make data vulnerable to social engineering attacks
 

 

Methods to mitigate social engineering threats and damage
 

 

 

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your assignment using the Assignment Files tab.

 

 

 

CMGT 245 Week 4 Encryption and Hashing, Social Engineering Reconnaissance, Data Encryption
 

Assignment Content

窗体顶端

Complete the following labs in the Practice Labs course CompTIA Security+:

 

 

 

“Encryption and Hashing”
 

 

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Encryption and Hashing
 

 

“Social Engineering Reconnaissance”
 

 

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Social Engineering Reconnaissance
 

 

“Data Encryption”
 

 

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Data Encryption
 

 

 

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

 

 

 

Any issues you encountered while completing the labs
 

 

What you learned, and what you will watch out for in the future
 

 

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
 

 

A description of the screenshots from each lab and what was done
 

 

 

Note: All references need to adhere to APA citation guidelines.

Submit your assignment.

窗体底端

 

 

 

 

CMGT 245 Week 5 Individual: Security Policy Presentation: Final Project
 

Part 1:

Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company’s productivity.

Leveraging your Week Five Learning Team collaborative discussion, “Security Control Policies,” create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:

 

 

 

Potential issues related to wireless security
 

 

The advantages and disadvantages of cloud technologies
 

 

The risks and ways to reduce them
 

 

 

Part 2:

Compile all sections of the Information Security Policy presentation. This should include all parts of the policy from Weeks Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices. The total presentation should be 30 to 35 slides.

Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.

Note: All references need to adhere to APA citation guidelines.

Submit your assignment using the Assignment Files tab.

You will get a ZIP (16MB) file

$ 39.00

$ 39.00

Buy Now

Discount has been applied.

Added to cart
or
Add to Cart
Adding ...