CMGT/245 IS Security Concepts

CMGT/245 Entire Class    CMGT/245 ENTIRE CLASSWORK

Or you may purchase tutorials by the Week below.

CMGT/245 Lab and Review
CMGT/245 WEEK 1 Networking vulnerabilities
CMGT/245 Lab and Review
CMGT/245 WEEK 1 LABS

CMGT/245 Week 1

Individual: Lab and Review
Includes Option #1

Includes Option #2
After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment.

 

Includes Week 1 Network Vulnerabilites Part 1 Screenshots

Includes Week 2 Network Vulnerabilities Part 2 Screenshots

 

CMGT/245 Week 1 Discussion Questions

Includes Answer Response #1

Includes Answer Response #2

Research three or four areas within an organization that use Information Technology in a critical business function.
Discuss what type of technology is used, the purpose, and the consequences of security breaches related to information.

 

 

CMGT/245 WEEK 2 Scanning and Remidiating Vulnerabilities with Open VAS
CMGT/245 WEEK 2 LABS
CMGT/245 WEEK 2 Digital Forensics
CMGT/245 Scanning and Remediating Vulnerabilities,

CMGT/245 Week 2

Includes Everything listed for Week 2!

 

Individual: Scanning and Remediating Vulnerabilities with

OpenVAS & Introduction to Digital Forensics
Includes Option #1 with Screenshots

Includes Option #2 with Screenshots

Includes Option #3 with Screenshots
Complete the following labs in the Practice Labs course CompTIA Security+:
• "Scanning and Remediating Vulnerabilities with OpenVAS"
• "Introduction to Digital Forensics"
Capture screenshots during the final step of each lab and place in a Microsoft® Word document.
After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment using the Assignment Files tab. The report must be submitted with full citations and using proper APA formating for all references. I fully expect that you will reference any materials that are used in preparation of this assignment.

 

 

Discussion Question: SSAE 16 and SOC Audit Reporting

Includes 3 Full Answers to Discussion Question

Consider how a provider of technology services might use standards, such as those discussed in "SSAE No. 16" and "Service Organizations Control (SOC) Reports," to market its products, as well as manage the relationship and limit risk for the buyer of those services.
Read "SSAE 16 Overview" from the SSAE 16 website.
Read "Service Organization Control (SOC) Reports" from the SSAE 16 website.
Discuss the "Service Organization Control (SOC) Reports" and what they provide the buyer. Review the SOC Type 1 and Type 2 Audit Reports. Discuss their importance to the buyer of services.

 

Discussion Question: Risk Management Process

Includes 3 Full Answers to Discussion Question

Research different approaches to the risk management process.
Provide an example where you used a risk management process, either professionally or personally. Describe the outcome or result

 

 

CMGT/245 Backup and Recovery
CMGT/245 Backup and Recovery

CMGT/245 Week 3

 

Includes Everything listed for Week 3! A+ Work!

 

Individual: Backup and Recovery
Includes Option #1

Includes Option #2
Complete the lab "Backup and Recovery" in the Practice Labs course CompTIA Security+.
Capture screenshots during the final step of each lab and place in a Microsoft® Word document.
After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:
• Any issues you encountered while completing the lab
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab.

 

 

Individual: Security Risk Review/Contingency Plan
Includes Presentation #1 with Speaker Notes

Includes Presentation #2 with Speaker Notes

Includes Presentation #3 with Speaker Notes

Includes Presentatino #4 with Speaker Notes
Ben's business is located in an area that is prone to floods and power disruptions.
Leveraging your Week Three Learning Team collaborative discussion, "Information Security Risk Review/ Assessment and Business Continuity," create a 10- to 12-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:
• The key elements to include in a plan that will help ensure that Ben will be able to continue to service his customers following a flood
• The key items to consider when creating a contingency plan in the event the offsite data backup becomes unavailable
• The key aspects of implementing such a plan
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation.
Submit your presentation using the Assignment Files tab.

 

Discussion Question:  Disaster Recovery

Includes 3 Full Answers to Discussion Question

Research two or three current articles regarding disaster recovery for businesses.
Discuss the purpose of disaster recovery and what concepts/terms relate to it. What components should a disaster recovery plan include? 

 

Discussion Question: Proactive Planning and Organization

Includes 2 Full Answers to Discussion Question

Discuss the elements of disaster planning that are key to success in disaster recovery. What types of roles and responsibilities are needed on the escalation management teams, systems engineering teams, recovery teams, and disaster management teams? What are the advantages of being proactive in planning for a disaster?

 

 

 

 

CMGT/245 information Security Policy
CMGT/245 information Security Policy
Information Security Policy – Access Controls, Authorization, and Authentication

CMGT/245 Week 4

Everything listed for Week 4 is Included in Purchase! A+ Work!

 

Individual: Information Security Policy – Access Controls, Authorization, and Authentication
Instructions:
Based on your Week Four Learning Team collaborative discussion, "Access Control & Data Protection," create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:
• The benefits of implementing access controls for Ben's office
• The ways you can use authorization and authentication to protect the company's data
• How the use of temporary employees can make data vulnerable to social engineering attacks
• Methods to mitigate social engineering threats and damage
This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation.
Submit your assignment using the Assignment Files tab.

 

Discussion Question: Authenticate, Authorize, and Access

Includes 3 Full Answers to Discussion Question

Research identification and authorization, comparing and contrasting their strengths and weaknesses.
Describe the reasons why an IT group might create role-related access limitations related to reading data, editing content, or executing certain programs on a server.

 

Discussion Question: Facing the Threat of Social Engineering

Includes 3 Full Answers to Discussion Question

After reading a story on a popular website describing how a social engineer defrauded a business of four million dollars, an executive approaches you to discuss defending against social engineering tactics.
Explain how you would help the organization develop a strategy to defend against attacks from in-person interactions, through email, through social media, and by phone.

 

 

 

 


CMGT/245 Security Policy Presentation
CMGT/245 Security Policy Presentation: Final project

CMGT/245 Week 5

Everything listed for Week 5 is Included in Purchase! A+ Work!

 

Individual: Security Policy Presentation: Final Project
Includes PowerPoint presentation #1

Includes PowerPoint presentation #2

Includes PowerPoint presentation #3
Part 1:
Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company's productivity.
Leveraging your Week Five Learning Team collaborative discussion, "Security Control Policies," create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:
• Potential issues related to wireless security
• The advantages and disadvantages of cloud technologies
• The risks and ways to reduce them
Part 2:
Compile all sections of the Information Security Policy presentation.
This should include all parts of the policy from Weeks Two through
Five. Be sure to incorporate feedback received from the instructor, and
add one Title slide, one Agenda slide, one Conclusion slide, reference
slide(s), and include the appropriate appendices. The total presentation
should be 30 to 35 slides.
Write a 1- to 2-page executive summary that you could provide as a
handout summarizing the key findings of your presentation.
Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab.

 

CMGT/245 Week 5 Discussion Questions

Discussion Question: Security Control Policies

Includes 3 Full Answers to Discussion Question

Research the challenges related to cloud security when data crosses country borders.
Discuss any concerns and potential benefits of storage outside of a company's home country

 

Discussion Question: Application Security

Includes 3 Full Answers to Discussion Question

Research the most common methods that hackers use to get past authentication protocols and what can be done to prevent their negative impacts.
Discuss ways to detect "man in the middle" attacks and determine whether data has been altered.