CMGT 245 ENTIRE COURSE


View larger image
 

CMGT 245 ENTIRE COURSE


Price: $50.00
Status: Product will be sent by Email within 1 hour after successful payment
Quantity:

Please leave this field blank.

Add to Wish List (Log in first.)

CMGT 245 ENTIRE COURSE

˙

CMGT 245 Wee 1 Lab Reflection
˙

Assignment Content

????

After completing the lab assignments this week,˙reflect˙on the issues you may have had and how you overcame them.

Write˙a 350-word reflection paper using Microsoft?˙Word that includes the following:

˙

˙

˙

Any issues you encountered while completing the labs
˙

˙

What you learned, and what you will watch out for in the future
˙

˙

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
˙

˙

A description of the screenshots from each lab and what was done
˙

˙

˙

Submit˙your assignment.

????

˙

˙

˙

CMGT 245 Wee 1 Network Vulnerabilities
˙

Complete˙the following labs in the Practice Labs course˙CompTIA Security+:

˙

˙

˙

?Network Vulnerabilities Part 1?
˙

˙

?Network Vulnerabilities Part 2?
˙

˙

˙

Capture˙screenshots during the final step of each lab and place in a Microsoft?˙Word document.

Submit˙your assignment.

˙

˙

CMGT 245 Week 2 Individual: Scanning and Remediating Vulnerabilities with OpenVAS & Introduction to Digital Forensics
˙

Complete˙the following labs in the Practice Labs course˙CompTIA Security+:

˙

˙

˙

?Scanning and Remediating Vulnerabilities with OpenVAS?
˙

˙

?Introduction to Digital Forensics?
˙

˙

˙

Capture˙screenshots during the final step of each lab and place in a Microsoft?˙Word document.

After completing the lab assignments this week,˙reflect˙on the issues you may have had and how you overcame them.

Write˙a 350-word reflection paper using Microsoft?˙Word that includes the following as applicable:

˙

˙

˙

Any issues you encountered while completing the labs
˙

˙

What you learned, and what you will watch out for in the future
˙

˙

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
˙

˙

A description of the screenshots from each lab and what was done
˙

˙

˙

Submit˙your assignment using the Assignment Files tab.˙ The report must be submitted with full citations and using proper APA formating for all references.˙ I fully expect that you will reference any materials that are used in preparation of this assignment.

˙

˙
˙

˙

˙

CMGT 245 Week 2 Risk Assessment Presentation
˙

Assignment Content

Resource:˙Center for Writing Excellence: Tutorials & Guides

Considering the Week Two Learning Team collaborative discussion, ?Data Types and Risks,? you had with your team,˙create˙a PowerPoint?˙presentation for Ben.

The 8- to 10-slide media-rich Microsoft?˙PowerPoint?˙with speaker notes should include:

˙

˙

˙

The main uses for an IT system in Ben?s business
˙

˙

The most common risks associated with this system
˙

˙

A prioritized list of the risks identified
˙

˙

Mitigations to handle the risks
˙

˙

˙

Justify˙the prioritizations, including how likely the risk is to happen and the potential for harm from that risk. This media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Note:˙This assignment contributes to your final project in Week Five, ?Security Policy Presentation: Final Project,? in which you will compile your PowerPoint?˙presentation slides from each week?s individual assignment to create your final presentation.

Submit˙your assignment.

˙

˙

˙

˙

CMGT 245 Week 3 Individual: Backup and Recovery
˙

Complete˙the lab ?Backup and Recovery? in the Practice Labs course˙CompTIA Security+.

Capture˙screenshots during the final step of each lab and place in a Microsoft?˙Word document.

After completing the lab assignments this week,˙reflect˙on the issues you may have had and how you overcame them.

Write˙a 350-word reflection paper using Microsoft?˙Word that includes the following as applicable:

˙

˙

˙

Any issues you encountered while completing the lab
˙

˙

What you learned, and what you will watch out for in the future
˙

˙

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
˙

˙

A description of the screenshots from each lab and what was done
˙

˙

˙

Note:˙All references need to adhere to APA citation guidelines.

Submit˙your assignment using the Assignment Files tab.

˙

˙
˙

˙

˙

CMGT 245 Week 3 Individual: Security Risk Review/Contingency Plan
˙

Ben?s business is located in an area that is prone to floods and power disruptions.

Leveraging your Week Three Learning Team collaborative discussion, ?Information Security Risk Review/ Assessment and Business Continuity,?˙create˙a 10- to 12-slide media-rich Microsoft?˙PowerPoint?˙presentation with speaker notes that explains the following:

˙

˙

˙

The key elements to include in a plan that will help ensure that Ben will be able to continue to service his customers following a flood
˙

˙

The key items to consider when creating a contingency plan in the event the offsite data backup becomes unavailable
˙

˙

The key aspects of implementing such a plan
˙

˙

˙

Note:˙This assignment contributes to your final project in Week Five, ?Security Policy Presentation: Final Project,? in which you will compile your PowerPoint?˙presentation slides from each week?s individual assignment to create your final presentation.

Submit˙your presentation using the Assignment Files tab.

˙

˙
˙

˙

˙

CMGT 245 Week 4 Individual: Information Security Policy ? Access Controls, Authorization, and Authentication
˙

Based on your Week Four Learning Team collaborative discussion, ?Access Control & Data Protection,?˙create˙a 4- to 5-slide media-rich Microsoft?˙PowerPoint?˙presentation with speaker notes that explains the following:

˙

˙

˙

The benefits of implementing access controls for Ben?s office
˙

˙

The ways you can use authorization and authentication to protect the company?s data
˙

˙

How the use of temporary employees can make data vulnerable to social engineering attacks
˙

˙

Methods to mitigate social engineering threats and damage
˙

˙

˙

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio.

Note:˙This assignment contributes to your final project in Week Five, ?Security Policy Presentation: Final Project,? in which you will compile your PowerPoint?˙presentation slides from each week?s individual assignment to create your final presentation.

Submit˙your assignment using the Assignment Files tab.

˙

˙

˙

CMGT 245 Week 4 Encryption and Hashing, Social Engineering Reconnaissance, Data Encryption
˙

Assignment Content

????

Complete˙the following labs in the Practice Labs course˙CompTIA Security+:

˙

˙

˙

?Encryption and Hashing?
˙

˙

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Encryption and Hashing
˙

˙

?Social Engineering Reconnaissance?
˙

˙

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Social Engineering Reconnaissance
˙

˙

?Data Encryption?
˙

˙

Note: Access this Practice Lab via: Week 4: Secure Systems/Networks and Access Controls Learning Activities Practice Labs: Data Encryption
˙

˙

˙

Capture˙screenshots during the final step of each lab and place in a Microsoft?˙Word document.

After completing the lab assignments this week,˙reflect˙on the issues you may have had and how you overcame them.

Write˙a 350-word reflection paper using Microsoft?˙Word that includes the following as applicable:

˙

˙

˙

Any issues you encountered while completing the labs
˙

˙

What you learned, and what you will watch out for in the future
˙

˙

A concise explanation of how you can apply your knowledge of network vulnerabilities in order to help protect other networks
˙

˙

A description of the screenshots from each lab and what was done
˙

˙

˙

Note:˙All references need to adhere to APA citation guidelines.

Submit˙your assignment.

????

˙

˙

˙

˙

CMGT 245 Week 5 Individual: Security Policy Presentation: Final Project
˙

Part 1:

Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company?s productivity.

Leveraging your Week Five Learning Team collaborative discussion, ?Security Control Policies,?˙create˙3- to 4-slide media-rich Microsoft?˙PowerPoint?˙presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy.Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:

˙

˙

˙

Potential issues related to wireless security
˙

˙

The advantages and disadvantages of cloud technologies
˙

˙

The risks and ways to reduce them
˙

˙

˙

Part 2:

Compile˙all sections of the Information Security Policy presentation. This should include all parts of the policy from Weeks Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices. The total presentation should be 30 to 35 slides.

Write˙a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.

Note:˙All references need to adhere to APA citation guidelines.

Submit˙your assignment using the Assignment Files tab.

CMGT 245 ENTIRE COURSE

Write a Review of CMGT 245 ENTIRE COURSE