CMGT/245 IS Security Concepts

CMGT/445 Entire Class    

Or you may purchase tutorials by the Week below.

 

CMGT/245 Lab and Review
CMGT/245 Networking Vulnerabilities
CMGT/245 Networking Vulnerabilities
CMGT/245 Week 1

CMGT/245 Week 1

Includes Everything listed below for Week 1!

 

Individual: Lab and Review
Includes Option #1

Includes Option #2
After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future

• A concise explanation of how you can apply your knowledge of network vulnerabilities

   in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment.

 

Individual: Practice Labs

Includes Screenshots for Networking Vulnerabilities - Part 1

Includes screenshots for Networking Vulnerabilities - Part 2

Complete the following labs in the Practice Labs course  CompTIA Security+:

  • "Network Vulnerabilities Part 1"
  • "Network Vulnerabilities Part 2"

Capture screenshots during the final step of each lab and place in a Microsoft Word document.

Submit your assignment.

 

 

CMGT/245 WK1 Discussion Question

Includes 2 Answers to this DQ

Research three or four areas within an organization that use Information Technology in a critical business function.

Discuss what type of technology is used, the purpose, and the consequences of security breaches related to information.

 

 

CMGT/245 Scanning and Remediating Vulnerabilities,
CMGT/245 Week 2 NEW
CMGT/245 Entire Week 2
CMGT/245 Scanning and Remediating Vulnerabilities,

CMGT/245 Week 2

Includes Everything listed below for Week 2!  

Get the Entire Week of Tutorials for One Low Price!

 

Individual: Scanning and Remediating Vulnerabilities

with OpenVAS & Introduction to Digital Forensics
Includes Option #1 Digital Forensics w/Screenshots & Summary

Includes Option #2 Digital Forensics w/Screenshots & Summary

Includes Option #3 Digital Forensics with Screenshots

Includes Option #4 Scanning and Open VAS with Screenshots & Summary

Includes Option #5 Scanning and Open VAS with Screenshots & Summary

Includes Option #6 Scanning and Open VAS with Screenshots
Complete the following labs in the Practice Labs course CompTIA Security+:
• "Scanning and Remediating Vulnerabilities with OpenVAS"
• "Introduction to Digital Forensics"
Capture screenshots during the final step of each lab and place in a Microsoft Word document. After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:
• Any issues you encountered while completing the labs
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of network vulnerabilities

    in order to help protect other networks
• A description of the screenshots from each lab and what was done
Submit your assignment using the Assignment Files tab. The report must be submitted with full citations and using proper APA formating for all references. I fully expect that you will reference any materials that are used in preparation of this assignment.

 

 

Individual: Wk 2 - Risk Assessment Presentation

Includes Presentation with Full Speaker Notes! A+ Work!

Considering the Week Two Learning Team collaborative discussion, "Data Types and Risks," you had with your team, 

Create a PowerPoint presentation for Ben. The 8- to 10-slide media-rich Microsoft PowerPoint with speaker notes should include:

  • The main uses for an IT system in Ben's business
  • The most common risks associated with this system
  • A prioritized list of the risks identified
  • Mitigations to handle the risks

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation. 
Submit your assignment.

 

 

 

Discussion Question: SSAE 16 and SOC Audit Reporting

Includes THREE (3 Answers) to each DQ!

Consider how a provider of technology services might use standards, such as those discussed in "SSAE No. 16" and "Service Organizations Control (SOC) Reports," to market its products, as well as manage the relationship and limit risk for the buyer of those services.
Read "SSAE 16 Overview" from the SSAE 16 website.
Read "Service Organization Control (SOC) Reports" from the SSAE 16 website.
Discuss the "Service Organization Control (SOC) Reports" and what they provide the buyer. Review the SOC Type 1 and Type 2 Audit Reports. Discuss their importance to the buyer of services.

 

Discussion Question: Risk Management Process

Includes THREE (3 Answers) to each DQ!

Research different approaches to the risk management process.
Provide an example where you used a risk management process, either professionally or personally. Describe the outcome or result

 

 

CMGT/245 Backup and Recovery
CMGT/245 Security Risk Review
CMGT/245 Security Risk Review
CMGT/245 Backup and Recovery

CMGT/245 Week 3

 

Includes Everything listed below for Week 3!  

Get the Entire Week of Tutorials for One Low Price!

 

Individual: Backup and Recovery
Includes Option #1 Screenshots & Summary

Includes Option #2  Screenshots & Summary
Complete the lab "Backup and Recovery" in the Practice Labs course CompTIA Security+.
Capture screenshots during the final step of each lab and place in a Microsoft® Word document.
After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.
Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:
• Any issues you encountered while completing the lab
• What you learned, and what you will watch out for in the future
• A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
• A description of the screenshots from each lab and what was done Note: All references need to adhere to APA citation guidelines.
Submit your assignment using the Assignment Files tab.

Individual: Security Risk Review/Contingency Plan
Includes Presentation #1 with Speaker Notes

Includes Presentation #2 with Speaker Notes

Includes Presentation #3 with Speaker Notes

Includes Presentatino #4 with Speaker Notes
Ben's business is located in an area that is prone to floods and power disruptions.
Leveraging your Week Three Learning Team collaborative discussion, "Information Security Risk Review/ Assessment and Business Continuity,"

Create a 10- to 12-slide media-rich Microsoft PowerPoint presentation with speaker notes that explains the following:
• The key elements to include in a plan that will help ensure that Ben will be able to

    continue to service his customers following a flood
• The key items to consider when creating a contingency plan in the event the offsite

   data backup becomes unavailable
• The key aspects of implementing such a plan
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint® presentation slides from each week's individual assignment to create your final presentation.
Submit your presentation using the Assignment Files tab.

Discussion Question: Disaster Recovery

Includes THREE (3 Answers) to each DQ!

Research two or three current articles regarding disaster recovery for businesses.
Discuss the purpose of disaster recovery and what concepts/terms relate to it. What components should a disaster recovery plan include? 

 

Discussion Question: Proactive Planning and Organization

Includes THREE (3 Answers) to each DQ!

Discuss the elements of disaster planning that are key to success in disaster recovery. What types of roles and responsibilities are needed on the escalation management teams, systems engineering teams, recovery teams, and disaster management teams? What are the advantages of being proactive in planning for a disaster?

 

 

 

 

CMGT/245 information Security Policy
CMGT/245 Week 4 NEW
CMGT/245 information Security Policy
Information Security Policy – Access Controls, Authorization, and Authentication

CMGT/245 Week 4

Includes Everything listed below for Week 4!  

Get the Entire Week of Tutorials for One Low Price!

 

Individual: Information Security Policy – Access Controls, Authorization, and Authentication
Instructions:
Based on your Week Four Learning Team collaborative discussion, "Access Control & Data Protection," create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:


• The benefits of implementing access controls for Ben's office
• The ways you can use authorization and authentication to protect the company's

    data
• How the use of temporary employees can make data vulnerable to social engineering

    attacks
• Methods to mitigate social engineering threats and damage

 

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.
Note: This assignment contributes to your final project in Week Five, "Security Policy Presentation: Final Project," in which you will compile your PowerPoint presentation slides from each week's individual assignment to create your final presentation.
Submit your assignment using the Assignment Files tab.

 

 

Practice Labs: Encryption and Hashing
Complete the following lab in the Practice Labs course CompTIA Security+:
• "Encryption and Hashing"

Practice Labs:
Data Encryption
Complete the following lab in the Practice Labs course CompTIA Security+:
• "Data Encryption"

 

 

Discussion Question: Authenticate, Authorize, and Access

Includes THREE (3 Answers) to each DQ!

Research identification and authorization, comparing and contrasting their strengths and weaknesses.
Describe the reasons why an IT group might create role-related access limitations related to reading data, editing content, or executing certain programs on a server.

 

Discussion Question: Facing the Threat of Social Engineering

Includes THREE (3 Answers) to each DQ!

After reading a story on a popular website describing how a social engineer defrauded a business of four million dollars, an executive approaches you to discuss defending against social engineering tactics.
Explain how you would help the organization develop a strategy to defend against attacks from in-person interactions, through email, through social media, and by phone.

 

 

 

 


CMGT/245 Security Policy Presentation
CMGT/245 Week 5 NEW
CMGT/245 Week 5 2020
CMGT/245 WEEK 5 FINAL

CMGT/245 Week 5

Includes Everything listed below for Week 5!  

Get the Entire Week of Tutorials for One Low Price!

 


CMGT/245 Wk 5 - Security Policy Presentation: Final Project
Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company's productivity.
Leveraging your Week Five Learning Team collaborative discussion, "Security Control Policies,"  create 3- to 4-slide media-rich Microsoft PowerPoint presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:
Potential issues related to wireless security
The advantages and disadvantages of cloud technologies
The risks and ways to reduce them
Part 2:
Compile all sections of the Information Security Policy presentation.

NOTE: Only the week 5 section is included in this set with the week 5 tutorials. You may get the other sections (Week 2, Week 3, and Week 4) in their individual weeks.

Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.
Note: All references need to adhere to APA citation guidelines.

 

 

Discussion Question: Data in the Cloud

Includes THREE (3 Answers) to each DQ!

Research the challenges related to cloud security when data crosses country borders.
Discuss any concerns and potential benefits of storage outside of a company's home country

 

Discussion Question: Application Security

Includes THREE (3 Answers) to each DQ!

Research the most common methods that hackers use to get past authentication protocols and what can be done to prevent their negative impacts.
Discuss ways to detect "man in the middle" attacks and determine whether data has been altered.