CYB 135 All Discussions

0 items
CYB 135 All Discussions
CYB 135 All Discussions
$12.00
  • Description

CYB 135 Wk 1 Discussion – Securing Passwords

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Securing passwords on your network is an important task. Research different methodologies for securing employee passwords when they create them.

  • Discuss the steps you would take to secure your company’s passwords.
  • When would you implement two-step authentication as part of your process?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CYB 135 Wk 2 Discussion – Penetration Testing

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Penetration testing, also called pen testing or ethical hacking, is the practice of securing your computer network to find network vulnerabilities.

  • Discuss pen testing and how it can add to a network security plan.
  • When would an external assessment be necessary?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CYB 135 Wk 3 Discussion – Network Analysis

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

  • Explore different network analysis tools, such as Wireshark, as network protocol analyzers.
  • Discuss how at least 3 of these tools are useful in managing network operations.

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CYB 135 Wk 4 Discussion – Python in Cybersecurity

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

 

Due Day 3

Respond to the following in a minimum of 175 words:

  • Discuss how Python is used in cybersecurity.
  • Why is it important for students in the field of networking to learn how to program in Python?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.

 

CYB 135 Wk 5 Discussion – Data Breaches

Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.

Due Day 3

Respond to the following in a minimum of 175 words:

Criminals target companies in order to obtain sensitive data.

  • Discuss why we should care about our privacy.
  • How do data breaches happen?
  • What should the company network administrators do if there is a data breach?

Due Day 7

Post 2 replies to classmates or your faculty member. Be constructive and professional.