CMGT 245 Entire Course

0 items
CMGT 245 Entire Course
CMGT 245 Entire Course
$39.99
  • Description

CMGT/245

IS SECURITY CONCEPTS

 

The Latest Version A+ Study Guide

 

**********************************************

CMGT 245 Entire Course Link

https://hwsell.com/category/cmgt-245/

**********************************************

 

CMGT 245 Wee 1 Lab Reflection

Assignment Content

窗体顶端

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following:

  • Any issues you encountered while completing the labs
  • What you learned, and what you will watch out for in the future
  • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
  • A description of the screenshots from each lab and what was done

Submit your assignment.

窗体底端

 

 

CMGT 245 Wee 1 Network Vulnerabilities

Complete the following labs in the Practice Labs course CompTIA Security+:

  • “Network Vulnerabilities Part 1”
  • “Network Vulnerabilities Part 2”

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

Submit your assignment.

 

CMGT 245 Week 2 Individual: Scanning and Remediating Vulnerabilities with OpenVAS & Introduction to Digital Forensics

Complete the following labs in the Practice Labs course CompTIA Security+:

  • “Scanning and Remediating Vulnerabilities with OpenVAS”
  • “Introduction to Digital Forensics”

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

  • Any issues you encountered while completing the labs
  • What you learned, and what you will watch out for in the future
  • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
  • A description of the screenshots from each lab and what was done

Submit your assignment using the Assignment Files tab.  The report must be submitted with full citations and using proper APA formating for all references.  I fully expect that you will reference any materials that are used in preparation of this assignment.

 

CMGT 245 Week 2 Risk Assessment Presentation

Assignment Content

Resource: Center for Writing Excellence: Tutorials & Guides

Considering the Week Two Learning Team collaborative discussion, “Data Types and Risks,” you had with your team, create a PowerPoint® presentation for Ben.

The 8- to 10-slide media-rich Microsoft® PowerPoint® with speaker notes should include:

  • The main uses for an IT system in Ben’s business
  • The most common risks associated with this system
  • A prioritized list of the risks identified
  • Mitigations to handle the risks

Justify the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your assignment.

 

 

 

CMGT 245 Week 3 Individual: Backup and Recovery

Complete the lab “Backup and Recovery” in the Practice Labs course CompTIA Security+.

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

  • Any issues you encountered while completing the lab
  • What you learned, and what you will watch out for in the future
  • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
  • A description of the screenshots from each lab and what was done

Note: All references need to adhere to APA citation guidelines.

Submit your assignment using the Assignment Files tab.

 

CMGT 245 Week 3 Individual: Security Risk Review/Contingency Plan

Ben’s business is located in an area that is prone to floods and power disruptions.

Leveraging your Week Three Learning Team collaborative discussion, “Information Security Risk Review/ Assessment and Business Continuity,” create a 10- to 12-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:

  • The key elements to include in a plan that will help ensure that Ben will be able to continue to service his customers following a flood
  • The key items to consider when creating a contingency plan in the event the offsite data backup becomes unavailable
  • The key aspects of implementing such a plan

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your presentation using the Assignment Files tab.

 

CMGT 245 Week 4 Individual: Information Security Policy – Access Controls, Authorization, and Authentication

Based on your Week Four Learning Team collaborative discussion, “Access Control & Data Protection,” create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following:

  • The benefits of implementing access controls for Ben’s office
  • The ways you can use authorization and authentication to protect the company’s data
  • How the use of temporary employees can make data vulnerable to social engineering attacks
  • Methods to mitigate social engineering threats and damage

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.

Note: This assignment contributes to your final project in Week Five, “Security Policy Presentation: Final Project,” in which you will compile your PowerPoint® presentation slides from each week’s individual assignment to create your final presentation.

Submit your assignment using the Assignment Files tab.

 

 

CMGT 245 Week 4 Encryption and Hashing, Social Engineering Reconnaissance, Data Encryption

Assignment Content

窗体顶端

Complete the following labs in the Practice Labs course CompTIA Security+:

  • “Encryption and Hashing”
  • Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls > Learning Activities > Practice Labs: Encryption and Hashing
  • “Social Engineering Reconnaissance”
  • Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls > Learning Activities > Practice Labs: Social Engineering Reconnaissance
  • “Data Encryption”
  • Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls > Learning Activities > Practice Labs: Data Encryption

Capture screenshots during the final step of each lab and place in a Microsoft® Word document.

After completing the lab assignments this week, reflect on the issues you may have had and how you overcame them.

Write a 350-word reflection paper using Microsoft® Word that includes the following as applicable:

  • Any issues you encountered while completing the labs
  • What you learned, and what you will watch out for in the future
  • A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
  • A description of the screenshots from each lab and what was done

Note: All references need to adhere to APA citation guidelines.

Submit your assignment.

窗体底端

 

 

 

CMGT 245 Week 5 Individual: Security Policy Presentation: Final Project

Part 1:

Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company’s productivity.

Leveraging your Week Five Learning Team collaborative discussion, “Security Control Policies,” create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:

  • Potential issues related to wireless security
  • The advantages and disadvantages of cloud technologies
  • The risks and ways to reduce them

Part 2:

Compile all sections of the Information Security Policy presentation. This should include all parts of the policy from Weeks Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices. The total presentation should be 30 to 35 slides.

Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.

Note: All references need to adhere to APA citation guidelines.

Submit your assignment using the Assignment Files tab.