Title: CST 630 Success Is a Tradition/newtonhelp.com
1CST 630 Success Is a Tradition/newtonhelp.com
2CST 630 Success Is a Tradition/newtonhelp.com
CST 630 Project 1Risk, Threat, and Vulnerability
Management For more course tutorials
visit www.newtonhelp.com Project 1 Step 1
Conduct a Security Analysis Baseline In the first
step of the project, you will conduct a security
analysis baseline of the IT systems, which will
include a data-flow diagram of connections and
endpoints, and all types of access points,
including wireless. The baseline report will be
part of the overall security assessment report
(SAR).
3CST 630 Success Is a Tradition/newtonhelp.com
CST 630 Project 2 Incident Response For more
course tutorials visit www.newtonhelp.com Proj
ect 2 Step 1 Develop a Wireless and BYOD
Security Plan Since the company you work for has
instituted a bring your own device (BYOD) policy,
security attitudes have been lax and all sorts of
devices, authorized and unauthorized, have been
found connected to the company's wireless
infrastructure. In this first step, you will
develop a wireless and BYOD security plan for the
company.
4CST 630 Success Is a Tradition/newtonhelp.com
CST 630 Project 3 Enterprise Network Security
For more course tutorials visit www.newtonhelp.co
m Project 3 Step 1 Conduct a Policy Gap
Analysis As you begin Step 1 of your system
security report on cybersecurity for mergers and
acquisitions, keep in mind that the networks of
companies going through an MA can be subject to
cyberattack. As you work through this step and
the others, keep these questions in mind
5CST 630 Success Is a Tradition/newtonhelp.com
CST 630 Project 4Secure Videoconferencing
Communications For more course tutorials
visit www.newtonhelp.com Project 4 Step 1
Develop Functional Requirements for
Videoconferencing The first step in your
proposal for a secure videoconferencing system is
to develop a set of functional requirements for
videoconferencing that you believe the media
company will nee based on its geographic
dispersion and business needs. In developing
those requirements, research three
videoconferencing solutions such as Skype,
GotoMeeting, Polycom, and Cisco Webex and explain
their capabilities, advantages, and
disadvantages.
6CST 630 Success Is a Tradition/newtonhelp.com
CST 630 Project 5 Data Loss Prevention (21 Pages
10 slides lab report) For more course
tutorials visit www.newtonhelp.com CST 630
Project 5 Data Loss Prevention (21 Pages 10
slides lab report)
7CST 630 Success Is a Tradition/newtonhelp.com