CYB 205 Entire Course

0 items
CYB 205 Entire Course
CYB 205 Entire Course
$39.00
  • Description

CYB/205

Infrastructure Administration

 

The Latest Version A+ Study Guide

 

**********************************************

CYB 205 Entire Course Link

https://hwsell.com/category/cyb-205/

**********************************************

 

CYB 205 Wk 1 – Apply: Inventory Assets on Network and Identify Vulnerabilities

At the end of the practice lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoft® Word document:

 

Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.

 

Address the following questions in your description:

  • Are the results of default scans different than the credentialed scan?
  • Why might that be?
  • What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
  • This was a simple 3-computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?

 

Submit your assignment.

 

CYB 205 Wk 2 – Apply: Signature Assignment: AntiVirus and NMAP Scans

At the end of the lab, you will be asked to respond to the following in a 2- to 2½-page response at the end of your Microsoft Word document: 

  • Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows®firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
  • This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, Internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?
  • Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.

 

Submit your assignment.

 

CYB 205 Wk 3 – Apply: Access Control and PKI

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft Word document:

 

Explain the types of information that can be stored in an Active Directory user record.

 

Address the following in your response:

  • What are some of the additional tabs that are available in the Active Directory Users and Computers “Advanced Features” mode?
  • What are some of the specific challenges and risks associated with accountmanagement in a large infrastructure?
  • How can inadequate access controls or access management leave critical information vulnerable?
  • What protections does encryption offer and how important is key management tokeeping any encryption system secured?
  • Considera cloud-hosted Infrastructure as a Service (IaaS) environment with many users accessing these systems from all over the world. What advantages or challenges might there be managing these identities and associated keys?

 

Finally, conclude this week’s assignment with a page explaining how the tools and processes demonstrated in the lab might be used by an infrastructure administrator to help secure an environment.

 

Submit your assignment.

 

CYB 205 Wk 4 – Apply: Signature Assignment: Audit Logs

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft Word document:

 

Describe what information was contained in the logs and what value they might have in a security investigation.

 

Address the following in your response:

  • Think about the challenges of getting all the Active Directory audit policy settings right. For an infrastructure administrator, how important are these types of settings?
  • What are the risks associated with logging too little data or not auditing the correct events?
  • What are the risks associated with logging too many events?
  • When the default configuration is to create audit logs, what impact can this have on security incident investigations?
  • This was just a single domain with 2 systems on a local LAN. How much more complicated would auditing and log management be for 100 computers? What about an enterprise with 10,000 computers in several domains on their LAN/WAN?
  • Considera cloud-hosted Infrastructure as a Service (IaaS) environment with many new, Internet-accessible systems regularly being built and brought online. What challenges might there be managing audit policies and logs in such an environment?

 

Finally, conclude this week’s assignment with a page explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

 

Submit your assignment.

CYB 205 Wk 5 – Apply: Signature Assignment: Business Continuity and the Cloud

The CEO of your company is concerned that a natural disaster could make your company’s information systems unavailable long enough to significantly impact business. Currently, critical systems like file servers, e-mail services, and applications – like HR, payroll, billing, and Customer Relationship Management (CRM) – are hosted in a local data center.

Your job is to educate the board on the benefits and risks associated with using cloud services for business continuity and disaster recovery in order to aid their decision on whether to move to a cloud-based service or continue working from a local data center.

 

Prepare a 4- to 5-page Microsoft Word document discussing the use of cloud services for business continuity and disaster recovery.

 

Include the following:

 

Cloud Services for Business Continuity and Disaster Recovery:

  • Define business continuity and disaster recovery in the context of the cloud services.
  • Show the importance of disaster continuity and disaster recovery to the function of the business.

 

Risk Assessment:

  • Identify which risks can be transferred to the cloud provider based on the functions of the business.
  • Explain new risks associated with using cloud services based on the functions of the business.

 

Cost/Benefit Analysis:

  • Show the costs associated with a cloud-based solution for the business.
  • Outline the benefits associated with a cloud-based solution for the business.

 

Conclusion:

Relate the risk assessment and cost/benefit analysis to the business continuity and disaster recovery for the needs the business.

 

Submit your assignment.