CYB 360 Entire Course

0 items
CYB 360 Entire Course
CYB 360 Entire Course
$39.00
  • Description

CYB/360

Wireless Security

The Latest Version A+ Study Guide

 

**********************************************

CYB 360 Entire Course Link

https://hwsell.com/category/cyb-360/

**********************************************

 

CYB 360 Wk 1 – Apply: Wireless Network Needs and Requirements

You are part of the networking team for a plastics manufacturing company, International Plastics, Inc., reporting to the Director of IT Infrastructure.

 

The Director gave you an assignment to create detailed technical plans for the creation of a secure wireless network at the Corporate Offices only.

 

The wireless network must meet the following criteria:

  • Cover the entire campus with no loss of connectivity when moving from one area to the next
  • Comply with all FCC regulations
  • Be fast enough for employees to complete normal business activities while using wireless connectivity
  • Be cost effective (The organization wants costs minimized while still meeting the other requirements.)
  • Be secure (Due to client contractual terms, the wireless network must be very secure and prevent Man-in-the-Middle attacks.)

 

Write a 1- to 2-page report for the director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:

 

  • Design requirements that must be addressed
  • Justification to use different frequencies, channels, and antennae in the installation
  • Regulatory requirements to consider in implementation
  • Security requirements

 

Create a 1/2-to 1-page table summarizing possible frequency choices. Include an explanation of the strength and weakness of each.

 

Format any citations according to APA guidelines.

 

Submit your assignment.

 

CYB 360 Wk 2 – Apply: Site Survey

Site surveys are an important part of planning a secure wireless network. In this assignment, you will conduct a visual assessment of a familiar environment in order to produce a site survey.

 

Perform a basic assessment of a familiar environment (e.g., your home, work, or a local business).

 

Identify the following:

  • Your goal (e.g., provide wireless coverage for a two-story house with two desktop computers and a printer)
  • Possible sources of interference
  • Existing wireless infrastructure
  • Potential access point placement
  • Potential antenna placement
  • Potential equipment and supporting equipment

 

Note: You may provide photographs to support the site survey.

 

Based on your visual inspection of the site, create a 1- to 2-page site survey. Provide your conclusions from your assessment and detail the following:

  • Methods of gathering information
  • Information gathered
  • Possible sources of interference
  • Existing wireless infrastructure
  • Recommendations for access point and antenna placement
  • Recommendations for equipment and supporting equipment

 

Format any citations according to APA guidelines.

 

Submit your assignment.

 

CYB 360 Wk 2 Team – Apply: Determine Wireless Access Point Locations

As in Week 1, you are part of the networking team for a plastics manufacturing company, International Plastics, Inc., reporting to the Director of IT Infrastructure.

 

The Director gave you an assignment to create detailed technical plans for the creation of a secure wireless network at the Corporate Offices only.

 

In Week 1, you addressed the following capabilities the wireless network must have:

  • Cover the entire campus with no loss of connectivity when moving from one area to the next
  • Comply with all FCC regulations
  • Be fast enough for employees to complete normal business activities while using wireless connectivity
  • Be cost effective (The organization wants costs minimized while still meeting the other requirements.)
  • Be secure(Due to client contractual terms, the wireless network must be very secure and prevent Man-in-the-Middle attacks.)

 

Documents required to be submitted with the plan:

  • Building floorplan showing WAP placement
  • Logical network diagram created in Visio®showing the wireless network, as well as its connection to the main IT network
  • Technical Specifications outline

 

Your team will work together over the next 5 weeks to create the technical plan documentation week by week with the final product due at the end of the course.

 

This week your team must determine the locations of the wireless access points for the International Plastics, Inc., corporate headquarters.

 

 

CYB 360 Wk 3 – Apply: Configure a Secure Wireless Network

Your office has implemented a WLAN and needs you to configure the WLAN environment with 3 Cisco Meraki MR62 wireless access points (WAPs) in order to access the Internet and intercommunicate. Security is not overly important currently.

 

WAP Placement:

The Office Wireless Network diagram shows the placement of each WAP within the building.

 

Firewall:

The firewall is in the Data Center.

 

IP Information:

The organization has an external IP address of 23.4.178.126 and uses private IPv4 space on the 10 network. The IP space for internal routers and access points is 10.0.1.x with all IPs available above 10.0.1.10.

 

Research the wireless access point on the Cisco Meraki Documentation site.

 

Document the configuration, using the information from the Cisco Meraki site, value to implement each device in the WLAN Configuration Design Template to allow all networked computers to communicate with each other and the Internet.

 

Complete the WLAN Configuration Design Template.

 

Create 1-page diagram depicting the process you took to identify the appropriate configuration settings for each device. Your audience is your director and you must be clear and explain the vulnerabilities that exist in the implemented environment.

 

For the diagram you can use Visio®, Microsoft Word, or Microsoft PowerPoint® or other appropriate application.

 

Format any citations according to APA guidelines.

 

Submit your assignment.

 

CYB 360 Wk 4 – Apply: Configuring a Secure Wireless Network

An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit.

 

Using the configurations and topology you added to the WLAN Configuration Design Template in Week 3, add security and segregate internal traffic.

 

Secure the network to:

  • Minimize the risk of intrusions
  • Identify attempted intrusions
  • Limit visibility of HR traffic on the network

 

Modify the WLAN Configuration Design Template to include:

  • Configuration changes to the existing devices
  • Introduction of other devices required to meet security objectives

 

Create a 10- to 12-slide Microsoft PowerPoint® presentation for management to explain from a security standpoint the changes you will make and the reasons for those changes. Ensure you do the following in the presentation:

  • Describe basic security concerns as they relate to wireless networks.
  • Assess the security vulnerabilities,including active protocols, to the unsecured network.
  • Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection.
  • Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.
  • Provide a rationale for your choices.

 

Note: Other applications like Adobe Spark, Microsoft Sway, or Microsoft Office Mix can be used instead of Microsoft PowerPoint. Create a “media-rich” presentation by including voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia presentation.

 

Be sure to include supporting images and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Do not copy images unless author permission is obtained or copyright free images are used.

 

Format any citations according to APA guidelines.

 

Submit your assignment.

 

CYB 360 Wk 4 Team – Apply: Encryption and WIPS/WIDS Implementation

This week your team is presenting recommendations to your director on implementing, securing, and monitoring the network for data security assurance.

 

Create a 6- to 8-slide presentation for your director. You may use Microsoft PowerPoint, Adobe® Spark, Microsoft Sway®, or Microsoft Office Mix. The presentation must include supportive graphics, appropriate backgrounds, and styles.

 

Note: Do not copy images unless author permission is obtained or copyright free images are used.

 

Complete the following in your presentation:

  • Recommend encryption type.
  • Recommend Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion Detection System(WIDS) deployed and where.
  • Summarize key security features to deploy.
  • Include any other appropriate recommendations.

 

Format any citations according to APA guidelines.

 

Submit your assignment.

 

CYB 360 Wk 5 – Apply: Packet Capture Analysis

You are hired by an organization to analyze packet captures from a wireless network. You are looking to assess if the captures pose a threat.

 

Analyze the packet captures provided by Wireshark by doing the following:

 

Go to the Wireshark Sample Captures site and download the following:

  • wpa-Induction.pcap.gz Wi-Fi802.11 WPA traffic
  • wpa-eap-tls.pcap.gz WiFi802.11 WPA-EAP/Rekey sample
  • nb6-hotspot.pcap Someone connecting to SFR’s wireless community network
  • pcap.gz (libpcap) Cisco Wireless LAN Context Control Protocol (WLCCP) version 0x0
  • pcap contains two WSP request-response dialogs

 

Note: Only download these sample captures. Other captures may set off your computer’s system defenses.

 

Use Wireshark to view and analyze the sample captures.

 

Create a 1- to 2-page table that ranks the packet captures from the highest to lowest threat. In your table, provide the following for each packet capture:

  • Description of the traffic
  • Description of the risks, if any, the traffic poses to the wireless network
  • Countermeasures to take to secure network from any threat

 

Write a 2- to 3-page memo to management as a network security specialist, and ensure you do the following:

  • Explain how to distinguish hostile packet data from normal packet data.
  • Explain how to recognize any attack signatures in the packets you analyze.
  • Provide a rationale for ranking the packets as you did.

 

Format any citations according to APA guidelines.

 

Submit your assignment.