CYB 110 Entire Course

0 items
CYB 110 Entire Course
CYB 110 Entire Course
$39.00
  • Description

CYB/110

Foundations of Security

 

The Latest Version A+ Study Guide

 

**********************************************

CYB 110 Entire Course Link

https://hwsell.com/category/cyb-110/

**********************************************

 

CYB 110 Wk 1 – Practice: PracticeLabs: CompTIA Security

Use the Wk 1 –PracticeLabs: CompTIA Security+ Access to enter PracticeLabs.

 

Complete the module “Understand Common Ports and Protocols” in the PracticeLabs course “CompTIA Security +.”

 

Take a screenshot of the completion screen and submit for points.

 

CYB 110 Wk 1 – Practice: PracticeLabs: Microsoft Security Fundamentals

Use the Wk 1 – Practice: PracticeLabs: Microsoft Security Fundamentals Access to enter PracticeLabs.

 

Complete the following modules in the PracticeLabs course “Microsoft Security Fundamentals”:

  • “Understand Encryption”
  • “Understand Network Isolation”
  • “Understand Protocol Security”
  • “Understand Secure Sockets Layer and Transport Layer Security”

 

Take a screenshot of the completion screen and submit your screenshot for points.

 

CYB 110 Wk 1 – Apply: Threats to Confidentiality, Integrity, and Availability

There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks.

 

Create a 1-to 2 -page table, in Microsoft® Word, listing a minimum of 6 threats using the column headers and details below:

  • Threat – List the threat.
  • Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type.
  • Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA.
  • Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences.

 

Example:

Threat: Password Compromise

Threat to Type of Data: Data-At-Rest

Confidentiality/Integrity/Availability: C & I

Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.

 

Include a short paragraph that highlights two access control techniques or policies that enforce security.

 

Cite at least two resources within the assignment in APA format.

 

Submit your assignment.

 

CYB 110 Wk 2 – Practice: PracticeLabs: Threats and Compliance

Use the Wk 2 – Practice: PracticeLabs: Threats and Compliance Access to enter PracticeLabs.

 

Complete the following modules in the Practice Labs course “CompTIA Security+”:

  • “Threats – Vulnerability Scanning”
  • “Compliance – Patching”

 

Take a screenshot of the completion screen and submit your screenshot for points.

 

 

CYB 110 Wk 2 – Practice: PracticeLabs: Microsoft Security Fundamentals

 

Use the Wk 2 –PracticeLabs: Microsoft Security Fundamentals Access to enter PracticeLabs.

 

Complete the “Understand Malware” module in the Practice Labs course “Microsoft Security Fundamentals”.

 

Take a screenshot of the completion screen and submit for points.

 

 

CYB 110 Wk 2 – Practice: PracticeLabs: Understanding IDS Firewall Evasion and Honeypots

Use the Wk 2 –PracticeLabs: Understanding IDS Firewall Evasion and Honeypots Access to enter PracticeLabs.

 

Complete the module “Understanding IDS Firewall Evasion and Honeypots” in the Practice Labs course “CompTIA Security+.”

 

Take a screenshot of the completion screen and submit for points.

 

Note: Points are awarded for completion of module.

 

 

 

CYB 110 Wk 2 – Apply: Malware Attacks

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams; all of which make it easy to follow troubleshooting instructions.

 

Throughout the next four weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.

 

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.

 

Include the following information:

  • Details of the malware
  • The exploited vulnerability and its attack vector
  • Two risks of this malware
  • Step-by-step instructions on how to resolve the malware attack

 

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

 

Cite at least two resources within the assignment in APA format.

 

Submit your assignment.

 

CYB 110 Wk 3 – Practice: PracticeLabs: Microsoft Security Fundamentals

Use the Wk 3 – Practice: PracticeLabs: Microsoft Security Fundamentals Access to enter PracticeLabs.

 

Complete the following modules in the Practice Labs course “Microsoft Security Fundamentals”:

  • “Understand Internet Security”
  • “Understand Email Protection”

 

Take a screenshot of the completion screen and submit your screenshot for points.

 

 

 

CYB 110 Wk 3 – Apply: Online Interactions

Online interactions pose a threat to all servers. There are risks that occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.

 

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.

 

Include the following information in this section:

  • Descriptions of two threats this interaction poses on the company
  • Step-by-step instructions on how to mitigate each interaction

 

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

 

Cite at least two resources within the assignment in APA format.

 

Submit your assignment.

 

CYB 110 Wk 4 – Apply: Mobile Security

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.

 

Create a visual poster or infographic to display in the company’s break room.

 

Include the following information:

  • At least two mobile device threats
  • List of ideal mobile security settings to defend against threats
  • Brief instructions for setting up at least two security settings
  • An explanation on what happens mobile devices are not secured from these threats
  • Appropriate images and graphics
  • Two resources for more information on mobile security, with appropriate citations

 

Submit your assignment.

 

 

CYB 110 Wk 5 – Practice: PracticeLabs: Compliance – Backup Execution and Frequency

Use the Wk 5 – PracticeLabs: Compliance – Backup Execution and Frequency Access to enter PracticeLabs.

 

Complete the module “Compliance – Backup Execution and Frequency” in the PracticeLabs course “CompTIA Security+.”

 

Take a screenshot of the completion screen and submit for points.

 

 

CYB 110 Wk 5 – Apply: Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.

 

In the final section of your playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.

 

Include the following in your outline:

  • A list of tools used for backup purposes
  • An explanation of the following:
  • Where employees should work from that day
  • How employees can get to their data
  • The communication methods about updates
  • A step-by-step guide to recover your databases and telecommunications
  • A step-by-step guide to recover and provide any additional company assets
  • A description of policies for backup media storage
  • A description of policies for encryption of backup data

 

Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.

 

Cite at least two resources within the assignment in APA format.

 

Submit your assignment.