- Description
CYB 135 Wk 1 Discussion – Securing Passwords
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
Securing passwords on your network is an important task. Research different methodologies for securing employee passwords when they create them.
- Discuss the steps you would take to secure your company’s passwords.
- When would you implement two-step authentication as part of your process?
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.
CYB 135 Wk 2 Discussion – Penetration Testing
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
Penetration testing, also called pen testing or ethical hacking, is the practice of securing your computer network to find network vulnerabilities.
- Discuss pen testing and how it can add to a network security plan.
- When would an external assessment be necessary?
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.
CYB 135 Wk 3 Discussion – Network Analysis
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
- Explore different network analysis tools, such as Wireshark, as network protocol analyzers.
- Discuss how at least 3 of these tools are useful in managing network operations.
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.
CYB 135 Wk 4 Discussion – Python in Cybersecurity
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
- Discuss how Python is used in cybersecurity.
- Why is it important for students in the field of networking to learn how to program in Python?
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.
CYB 135 Wk 5 Discussion – Data Breaches
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day 3
Respond to the following in a minimum of 175 words:
Criminals target companies in order to obtain sensitive data.
- Discuss why we should care about our privacy.
- How do data breaches happen?
- What should the company network administrators do if there is a data breach?
Due Day 7
Post 2 replies to classmates or your faculty member. Be constructive and professional.