CYB 140 Fabulous Teaching / snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

CYB 140 Fabulous Teaching / snaptutorial.com

Description:

For more classes visit www.snaptutorial.com CYB 140 Week 1 Discussion Physical Security CYB 140 Week 2 Discussion Virtualized Server vs. Physical Server CYB 140 Week 3 Discussion A Firewall Can't Do it All CYB 140 Week 4 Discussion Intrusion Detection Systems CYB 140 Week 5 Discussion VPN vs SSL – PowerPoint PPT presentation

Number of Views:1

less

Transcript and Presenter's Notes

Title: CYB 140 Fabulous Teaching / snaptutorial.com


1
CYB 140 Fabulous Teaching/ snaptutorial.com
2
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 All DQs For more classes
visit www.snaptutorial.com   CYB 140 Week 1
Discussion Physical Security   CYB 140 Week 2
Discussion Virtualized Server vs. Physical Server
3
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Entire Course For more classes
visit www.snaptutorial.com   CYB 140 Week 1
Discussion Physical Security   CYB 140 Week 1
Assignment Security Control Evaluation    CYB 140
Week 2 Discussion Virtualized Server vs. Physical
Server  
4
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 1 Discussion Physical Security For
more classes visit www.snaptutorial.com   Respond
to the following in a minimum of 175 words  
After watching the Lynda.com video "Physical
Security Control Types," explain the various
types of security controls
5
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 2 Discussion Virtualized Server vs.
Physical Server For more classes
visit www.snaptutorial.com   Respond to the
following in a minimum of 175 words    After
watching the Lynda.com videos "Virtualization"
and "Virtualization Security," describe the
security challenges that a virtualized environment
6
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 3 Discussion A Firewall Can't Do it
All For more classes visit www.snaptutorial.com
  Respond to the following in a minimum of 175
words    You have been learning how firewalls
use Access Control Lists (ACLs) to block traffic
from specified IP addresses. Firewalls can also
block ports, however firewalls do not provide
complete security.
7
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 4 Discussion Intrusion Detection
Systems For more classes visit www.snaptutorial.
com   Respond to the following in a minimum of
175 words   After watching the Lynda.com video
"Network Intrusion Detection and Prevention,"
discuss techniques used to evade Intrusion
Detection Systems (IDS) as if you were a hacker.
8
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 5 Assignment Configuring VPNs For
more classes visit www.snaptutorial.com   Complete
the following exercise from Practice Lab
"N10-005 - Network Configuring
VPNs"   Exercise 1 - "Configure Remote
Access" Exercise 2 - "Configure Network Access
Protection"
9
CYB 140 Fabulous Teaching/ snaptutorial.com
CYB 140 Week 5 Discussion VPN vs SSL For more
classes visit www.snaptutorial.com   Respond to
the following in a minimum of 175 words   You
are an information security professional within
your organization. Your boss comes into your
office and asks you to explain the difference
between a VPN and SSL connection.
10
CYB 140 Fabulous Teaching/ snaptutorial.com
Write a Comment
User Comments (0)
About PowerShow.com