CST 630 Education System/newtonhelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

CST 630 Education System/newtonhelp.com

Description:

For more course tutorials visit www.newtonhelp.com Project 1 Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Click – PowerPoint PPT presentation

Number of Views:7
Slides: 8
Provided by: abcdf82118

less

Transcript and Presenter's Notes

Title: CST 630 Education System/newtonhelp.com


1
CST 630 Education System/newtonhelp.com
2
CST 630 Education System/newtonhelp.com
CST 630 Project 1Risk, Threat, and Vulnerability
Management For more course tutorials
visit www.newtonhelp.com     Project 1 Step 1
Conduct a Security Analysis Baseline In the first
step of the project, you will conduct a security
analysis baseline of the IT systems, which will
include a data-flow diagram of connections and
endpoints, and all types of access points,
including wireless. The baseline report will be
part of the overall security assessment report
(SAR).
3
CST 630 Education System/newtonhelp.com
  CST 630 Project 2 Incident Response For more
course tutorials visit www.newtonhelp.com     Proj
ect 2   Step 1 Develop a Wireless and BYOD
Security Plan Since the company you work for has
instituted a bring your own device (BYOD) policy,
security attitudes have been lax and all sorts of
devices, authorized and unauthorized, have been
found connected to the company's wireless
infrastructure. In this first step, you will
develop a wireless and BYOD security plan for the
company.  
4
CST 630 Education System/newtonhelp.com
CST 630 Project 3 Enterprise Network Security
For more course tutorials visit www.newtonhelp.co
m     Project 3   Step 1 Conduct a Policy Gap
Analysis As you begin Step 1 of your system
security report on cybersecurity for mergers and
acquisitions, keep in mind that the networks of
companies going through an MA can be subject to
cyberattack. As you work through this step and
the others, keep these questions in mind
5
CST 630 Education System/newtonhelp.com
CST 630 Project 4Secure Videoconferencing
Communications For more course tutorials
visit www.newtonhelp.com     Project 4 Step 1
Develop Functional Requirements for
Videoconferencing   The first step in your
proposal for a secure videoconferencing system is
to develop a set of functional requirements for
videoconferencing that you believe the media
company will nee based on its geographic
dispersion and business needs. In developing
those requirements, research three
videoconferencing solutions such as Skype,
GotoMeeting, Polycom, and Cisco Webex and explain
their capabilities, advantages, and
disadvantages.
6
CST 630 Education System/newtonhelp.com
CST 630 Project 5 Data Loss Prevention (21 Pages
10 slides lab report) For more course
tutorials visit www.newtonhelp.com     CST 630
Project 5 Data Loss Prevention (21 Pages 10
slides lab report)
7
CST 630 Education System/newtonhelp.com
Write a Comment
User Comments (0)
About PowerShow.com