cis 333 education on your terms tutorialrank com n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
CIS 333 Education on your terms / tutorialrank.com PowerPoint Presentation
Download Presentation
CIS 333 Education on your terms / tutorialrank.com

Loading in 2 Seconds...

play fullscreen
1 / 30

CIS 333 Education on your terms / tutorialrank.com - PowerPoint PPT Presentation


  • 6 Views
  • Uploaded on

\"For more course tutorials visit\nwww.tutorialrank.com\n\nCIS 333 Week 1 Discussion Providing Security Over Data\n \nCIS 333 Week 2 Discussion Risk Management and Malicious Attacks\n \n\"\n

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'CIS 333 Education on your terms / tutorialrank.com' - WillSmith28


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
cis 333 education on your terms tutorialrank com 1

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Entire Course (check details in description)
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 1 Discussion Providing Security Over Data
  • CIS 333 Week 2 Discussion Risk Management and Malicious Attacks
cis 333 education on your terms tutorialrank com 2

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Final Exam (3 Sets)
  • For more course tutorials visit
  • www.tutorialrank.com
  • Question 1 SIP is a ___________ protocol used to support real-time communications.
  • Question 2 What name is given to a U.S. federal law that requires U.S. government agencies to protect citizens’ private data and have proper security controls in place?
cis 333 education on your terms tutorialrank com 3

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 1 Discussion Providing Security Over Data
  • For more course tutorials visit
  • www.tutorialrank.com
  • • "Providing Security Over Data" Please respond to the following:
  • • • The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the primary means in which each of the three (3) tenets are addressed to
cis 333 education on your terms tutorialrank com 4

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 1-11 Discussion
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 1 Discussion Providing Security Over Data
  • CIS 333 Week 2 Discussion Risk Management and Malicious Attacks
cis 333 education on your terms tutorialrank com 5

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 2 Discussion Risk Management and Malicious Attacks
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Risk Management and Malicious Attacks" Please respond to the following:
  • • With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develo
cis 333 education on your terms tutorialrank com 6

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools
cis 333 education on your terms tutorialrank com 7

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD)
  • For more course tutorials visit
  • www.tutorialrank.com
  • Case Study 1: Bring Your Own Device (BYOD)
  • Due Week 3 and worth 60 points
  • Read the following articles located in the course shell: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes.
cis 333 education on your terms tutorialrank com 8

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 3 Discussion Security Administration and Access Control
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Security Administration and Access Control" Please respond to the following:
  • • From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability.
cis 333 education on your terms tutorialrank com 9

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 3 Lab 2
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 3 Lab 2 Performing a Vulnerability Assessment Case Study 1 Bring Your Own Device (BYOD)
cis 333 education on your terms tutorialrank com 10

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities (2 Papers)
  • For more course tutorials visit
  • www.tutorialrank.com
  • This Tutorial contains 2 Papers
  • Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
  • Due Week 4 and worth 75 points
cis 333 education on your terms tutorialrank com 11

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 4 Discussion Security Monitoring
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Security Monitoring" Please respond to the following:
  • • Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.
cis 333 education on your terms tutorialrank com 12

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls
cis 333 education on your terms tutorialrank com 13

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 5 Discussion Business Impact Analysis (BIA) and Risk Management
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 5 Discussion
  • "Business Impact Analysis (BIA) and Risk Management" Please respond to the following:
  • • According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which pe
cis 333 education on your terms tutorialrank com 14

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control
cis 333 education on your terms tutorialrank com 15

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 6 Case Study 2 Public Key Infrastructure (2 Papers)
  • For more course tutorials visit
  • www.tutorialrank.com
  • Case Study 2: Public Key Infrastructure
  • Due Week 6 and worth 60 points
  • Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active
cis 333 education on your terms tutorialrank com 16

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 6 Discussion Cryptography
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Cryptography" Please respond to the following:
  • • Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantag
cis 333 education on your terms tutorialrank com 17

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 6 Lab 5 Performing Packet Capture and Traffic Analysis
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 6 Lab 5 Performing Packet Capture and Traffic Analysis
cis 333 education on your terms tutorialrank com 18

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 7 Discussion Network Security
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Network Security" Please respond to the following:
  • • From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it
cis 333 education on your terms tutorialrank com 19

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 7 Lab 6 Using Encryption to Enhance Confidentiality and Integrity
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 7 Lab 7 Using Encryption to Enhance Confidentiality and Integrity
cis 333 education on your terms tutorialrank com 20

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 8 Assignment 2 Identifying Potential Risk, Response, and Recovery
  • For more course tutorials visit
  • www.tutorialrank.com
  • Assignment 2: Identifying Potential Risk, Response, and Recovery
  • Due Week 8 and worth 75 points
  • In Assignment 1, a videogame development co
cis 333 education on your terms tutorialrank com 21

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 8 Discussion The Impact of Malware
  • For more course tutorials visit
  • www.tutorialrank.com
  • "The Impact of Malware" Please respond to the following:
  • • From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful
cis 333 education on your terms tutorialrank com 22

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 8 Lab 7 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 8 Lab 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities
cis 333 education on your terms tutorialrank com 23

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 9 Discussion
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Security Standards" Please respond to the following:
  • • A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security. Provide a rationale for your response.
cis 333 education on your terms tutorialrank com 24

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 9 Lab 8 Eliminating Threats with a Layered Security Approach
  • For more course tutorials visit
  • www.tutorialrank.com
  • CIS 333 Week 9 Lab 9 Eliminating Threats with a Layered Security Approach
cis 333 education on your terms tutorialrank com 25

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 10 Discussion
  • For more course tutorials visit
  • www.tutorialrank.com
  • • Describe one (1) IT position that you currently hold or would like to hold in the future. Next, explain whether or not you believe obtaining certifications would help you in the position in question. If so, determine the certifications that you believe would prove to
cis 333 education on your terms tutorialrank com 26

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 10 Technical Project Paper Information Systems Security
  • For more course tutorials visit
  • www.tutorialrank.com
  • Technical Project Paper: Information Systems Security
  • Due Week 10 and worth 150 points
  • Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geare
cis 333 education on your terms tutorialrank com 27

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 11 Discussion 1 Course Takeaway
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Course Takeaway" Please respond to the following:
  • Share two new insights about networking security fundamentals you have discovered from this course. Explain how this type of course is essential for every network security professional.
cis 333 education on your terms tutorialrank com 28

CIS 333 Education on your

  • terms/ tutorialrank.com
  • CIS 333 Week 11 Discussion 2 Course Wrap up
  • For more course tutorials visit
  • www.tutorialrank.com
  • "Course Wrap-up" Please respond to the following:
  • Explain five or more key topics discussed during this course that you would like to teach a friend who has a minimal level of information systems security knowledg
cis 333 education on your terms tutorialrank com 29

CIS 333 Education on

  • your terms/ tutorialrank.com