Refer a friend and get % off! They'll get % off too.

CIS 297 Entire Course

CIS 297 Entire Course



The Latest Version A+ Study Guide

CIS 297 Week 1 Individual: Security Audit Checklist

You work at a small company with a single location. One of your responsibilities is to control and protect IT assets.

Create a security audit checklist used to ensure the physical security of the company’s IT assets.

Include the following in your checklist:




What to physically inspect


Which methods should be used to ensure assets remain in the building; e.g., Radio Frequency Identification (RFID)


The fundamental policies to be followed to minimize unauthorized access to assets


How you would check for compliance



Document your checklist using:




A 1- to 2-page Microsoft® Word document



Submit your assignment to the Assignment Files tab.




CIS 297 Week 1 Individual: Individual Security Vulnerability

You purchased a used computer from a friend. You want to ensure the computer, your network, and data are secure once you start using it.

Describe the actions you will take to identify and address any potential issues that could affect the security of your computer system, network, and data. For example, you may review what wireless access points are configured and update or remove those not within your network.

Document your plan in a 1-page Microsoft® Word document.

Submit your assignment to the Assignment Files tab.




CIS 297 Week 2 Individual: Troubleshooting Fishbone Diagram





“Fishbone Diagram” subsection of the “More Techniques in a Nutshell” section of the Creative Problem Solving and Decision Making Techniques Pluralsight course by Milena Pajic.


“How to Use the Fishbone Diagram” video in the® course Project Management Foundations: Leading Projects.


“Get to the Root of the Problem” article in Week One Electronic Reserve Readings.



You work in an IT support department. You receive a call with the following complaint:

“When I start up my system, I see the login screen, but before I can enter my username, the system shuts down.”

Create a fishbone diagram that identifies the steps you would use to identify and resolve the issue.

Use Microsoft® Visio®, PowerPoint® or Word to create your diagram.

Submit your assignment to the Assignment Files tab.



CIS 297 Week 2 Individual: NC Organization Security Recommendations





Account Permissions document



Define security recommendations for NC Organization that addresses the following:




The software and hardware that should be used to counter likely security threats


Account and user group definitions


Standard individual user and network system settings


Patch management suggestions


Encryption ideas



Present your recommendations using:




A 1- to 2-page paper using Microsoft® Word



Submit your assignment to the Assignment Files tab.



CIS 297 Week 3 Individual: Mobile Security Job Aid

NC Organization wants to provide information about maintaining device and data security to all employees who use personal and corporate-owned mobile devices.

Create a job aid that will provide employees with the following:




Best practices for maintaining physical security of the device


Best practices for maintaining information and data security when using the device


Ensuring device and app settings comply with organization standards


Guidelines for setting file encryption


Procedures to ensure data synchronization between device and corporate servers


Procedures to follow when a device is lost



Create your job aid as a chart, procedures document, or digital poster using Microsoft® Word or Microsoft® PowerPoint®.

Note: A digital poster is similar to a poster created on poster board, except it is digitally created. A digital poster can include a mix of elements such as narrative content, images, videos, and graphs.



CIS 297 Week 3 Individual: BYOD vs. CYOD





“Managing a Mobile Workforce” article in Week Three Electronic Reserve Readings



Compare the use of a bring-your-own-device (BYOD) policy and a choose-your-own-device (CYOD) policy in the work place.

Identify the advantages and disadvantages to the organization and individual employees.

Include accessibility and user permission considerations necessary to protect data on mobile devices.

Document your findings using:




A 1-page Microsoft® Word document



Submit your assignment to the Assignment Files tab.



CIS 297 Week 4 Individual: Protecting Digital Data

You discussed unauthorized access to NC Organization controlled data via lost and stolen devices in your Learning Team Collaboration. However, unauthorized data access can occur through numerous methods.

Research other manners in which unauthorized users could access NC Organization’s digital data.

Consider how access could occur through usage of electronic data, electronic data storage, transmission, and destruction.

Identify five methods in which unauthorized users could access data controlled by NC Organization.

For each method, define policy and best work practice recommendations to ensure inadvertent and malicious access does not occur.

Present your recommendations in:




A 1- to 2-page paper using Microsoft® Word



Submit your assignment to the Assignment Files tab.



CIS 297 Week 4 Individual: Hard Data and Hardware Destruction

Balancing environmental, safety, efficiency, and data security considerations can be difficult.

Review the following examples:




Allowing employees to take printer cover pages for their children’s art projects may seem benign. Consider, however, what if that printer header contained information that could be used to access the company’s network?


Donating outdated computers to community organizations is a common practice. However, what if data on hard drives is still present?


Having a central bin for materials to be shredded may be less expensive than having several smaller bins located around the office. However, what if employees are unable or unwilling to take the extra trip, where will hard copies end up?



Identify five methods in which an organization’s data could be accessed via hard copy or hardware. Include at least one of each type. For each method, describe the following:




Policies and best work practices to ensure inadvertent and malicious access does not occur


How this method addresses employee and environmental safety concerns



Present your findings and recommendations in:




A 2-page paper using Microsoft® Word



Submit your assignment to the Assignment Files tab.



CIS 297 Week 5 Individual: Hybrid Network Design

You have a meeting with NC Organization to discuss the design of its SOHO hybrid network.

Create a sample diagram of the network design. Include the following in the diagram:




Six workstations


Two printers


Six mobile devices



Describe the following either within the diagram or in a supplemental document:






Software versions and current patch levels


Connectivity requirements (e.g., wireless or direct connect)


Level of authentication required for mobile devices


Security elements



Use Microsoft® Visio® or Microsoft® PowerPoint® to create your diagram. You may use Microsoft® Word to provide supplemental text if needed.

Submit your assignment to the Assignment Files tab.




CIS 297 Week 5 Individual: SOHO Network Security Requirements

Your organization is opening a new office. The new office has the following hardware and network specifications:




A hybrid network


Ten workstations


Three tablets


One shared printer


One personal printer for the office manager


A Server


An external hard drive for backups (network attached)



Define the security requirements this organization will need, along with the network, hardware, and software components, for both a public- and private-facing network.

Present your recommendations in one of the following ways:




A 1- to 2-page paper using Microsoft® Word


A 10- to 12-slide Microsoft® PowerPoint® presentation with detailed speaker notes and appropriate animations



Submit your assignment to the Assignment Files tab.

You will get a ZIP (24MB) file

$ 49.00

$ 49.00

Buy Now

Discount has been applied.

Added to cart
Add to Cart
Adding ...