CYB 100 ENTIRE COURSE


View larger image
 

CYB 100 ENTIRE COURSE


Price: $50.00
Status: Product will be sent by Email within 1 hour after successful payment
Quantity:

Please leave this field blank.

Add to Wish List (Log in first.)

CYB 100  ENTIRE COURSE
 
 
WEEK  1


CYB 100 Week 1 Individual Assignment Protocols Lab

 

Instructions: Cyberspace and the Internet (the Web) are closely related. The term "Internet" refers to a series of protocols which represent actual methods of access and transfer of digital assets. Most Internet users are familiar with the protocol of HTTP and the multimedia part of the Web called the World Wide Web (WWW). Other protocols are included in the TCP/IP protocol suite. IT and Web specialists are aware of these other protocols and their uses. Knowledge of these protocols is important in recognizing risks in cyberspace. This lab will employ one of these additional protocols and demonstrate the "reach" and scope of cybersecurity and the cyber domain. An internet-connected browser-enabled device is required for this lab. Complete the following:   

  1. Research HTTP, TCP/IP, and FTP protocols and accurately describe each.
  2. Launch a browser and go to //ftp.swfwmd.state.fl.us/pub/out/. (When prompted, specify "anonymous" for username and your email address as the password.)
  3. Sort on "Date Modified"
  4. Sort on the "NAME"
  • What is the date of the oldest file?
  • What is the name of the first file?
  • What is the "TITLE" found on the first numbered PDF image when opened and viewed locally with Acrobat Reader?      
  • Is the map of Southwest Florida?
  • What function does the FTP protocol do?
  • How many miles/kilometers is the server from you?
  • Is there a risk involved related to the ease of access to such files?

 

 

 

 

CYB 100 Week 1 Individual Assignment Organizational Data Flow

 

Resources: The Lynda.com® video "Word 2016 Essential Training" with David Rivers You have recently been hired as a cybersecurity intern with a medium sized company that is growing very rapidly. The Chief Information Officer (CIO) is trying to understand the importance of the cyber domain that the Chief Information Security Officer (CISO) keeps talking about when they discuss expanding the business. The CISO has asked you to write an e-mail to the CIO that explains the scope of the cyber domain, common assets of the cyber domain, and important milestones in its development. Write a 350-to 700-word email using Microsoft® Word to the CIO explaining the following:   

  • Clearly define the term cyber domain.
  • Accurately describe the maritime, space, and physical domains.
  • Accurately describe three milestones in the development of communication and information technology, and security.
  • Correctly describe the impact cloud computing has had on the cyber domain.
  • List at least four high-value assets that are common to information and communication systems, networks, the cloud, and infrastructure Make sure rules of grammar and usage are followed, including spelling and punctuation.

 


WEEK  2

 CYB 100 Week 2 Learning Team Assignment Cybersecurity Laws


Instructions: Resources:   

  • The "APA Paper Template: 100-299" posted in the Tutorials & Guides section of the Center for Writing Excellence website, paying specific attention to APA guidelines
  • The readings, videos, and Learning Team discussions from this week
  • Table 3-1, "Key U.S. Laws of Interest to Information Security Professionals" of Principles of Information Security the U.S. has in place many laws related to information security, computer security, and Internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information.

Write a 1-to 2-page paper using Microsoft® Word that answers the following questions:

  • For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example, what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?
  • Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below:
  • Computer Fraud and Abuse Act
  • National Information Infrastructure Protection Act
  • Sarbanes-Oxley Act
  • Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:
  • Which of these laws seemed more frequently enforced? Which of these laws has resulted in a large financial impact on a business? Which of these has imposed a strict punitive damage (e.g., someone being convicted of fraud)?
  • According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?
  • Accurately explain if the ethical confidentiality of all private information is assured by the three laws • Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally. Use APA citation formatting in all work submitted. Follow rules of grammar and usage, including spelling and punctuation.

 


WEEK  3

CYB 100 Week 3 Individual Assignment Geopolitics in Key Nations


Instructions: Resources:   

  • The "Sample PowerPoint" posted in the Tutorials & Guides section of the Center for Writing Excellence website
  • The Lynda.com® video "Office 365: Learning PowerPoint" with Garrick Chow
  • The Lynda.com® video "Using Office Shapes and SmartArt to Enhance Business Documents"
  • "Creating New Tables from Scratch" from Lesson 8, "Working with Columns and Tables," in the Lynda.com® video "Word 2016 Essential Training" with David Rivers. Create a 1-page, 4-row by 3-column table in Microsoft® Word that depicts laws for the U.S. and two other key nations in the strategic, tactical, and operational areas of cybersecurity. Provide a brief description of the law for each category of cybersecurity provided. The table column headings could be U.S., Russia, and China, for instance (or two other key nations of your choice). The row labels are Strategical, Tactical, and Operational. Create a Microsoft® PowerPoint® presentation containing 8 slides, including introduction, conclusion, and reference slides. Include detailed speaker notes with each slide. Scenario: You are attending the company board meeting with your supervisor, the VP of Information Technology. The U.S.-based company is considering expanding into 100 countries worldwide. You will be presenting to the Board of Directors so they can understand the cyber threat each key nation poses to the company and can make a more informed decision on how best to achieve international growth. Your task is to:
  • Accurately define geopolitics.
  • Identify the geopolitics of key nations (include at a minimum: U.S., China, Russia, Israel, and Iran).
  • Accurately describe the differences of each key nation's political stance on cyberwar.
  • Describe past international cyber conflicts and the resulting impact on the economy of each nation involved.
  • Accurately define cyberattack.
  • State the impact of cyber-attacks on U.S. companies. Note: All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. Submit your assignment using the Assignment Files tab.

 

CYB 100 Week 3 Individual Assignment Conflict

Instructions: Reference: Pluralsight video "Conflict Resolution in the Workplace" by Stephen Haunts Research a current domestic or international conflict in the cyber domain. As a way of validating your understanding of the nature of conflict as described in the video, write a 1/2-page to 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following:   

  • Identify the reason for the conflict and the opposing forces.
  • Accurately identify the key political figures that impact the outcome or resolution of the conflict.
  • If you were involved with the resolution of the conflict, what style of conflict resolution would you use--the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox--and why?
  • Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug?
  • There is one simple widely-used method to resolve common conflicts that goes by the acronym DESC, standing for Describe, Express, Specify, Consequences.
  • Do you think this method could be used to resolve the conflict you identified?
  • Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not? Submit your assignment using the Assignment Files tab.

 

WEEK  4

CYB 100 Week 4 Individual Assignment Final Project Part 1: Paper and Storyboard


Instructions: In Weeks 4 and 5, you will compile a Final Project that consists of a frequently asked questions (FAQ) document, a presentation, and a storyboard that reflects the knowledge you have obtained over the course. This week, you will create an FAQ and a storyboard. In Week 5, you will complete a presentation and compile the Final Report. Resources:   

  • The Lynda.com® video "Word 2016 Essential Training" with David Rivers
  • "Sketch and Storyboard" from Lesson 2, "Story Structure," in the Lynda.com® video "Data Visualization: Storytelling" with Bill Shander Write a 175-to 350-word FAQ document using Microsoft® Word in response to the following: Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare an FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace and cloud technology. The U.S.based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following:
  • What is the definition of cyberspace, and the maritime, space, and physical domains? Provide a concise description of cyberspace, and the maritime, space, and physical domains
  • How do international laws affect citizens and companies in the U.S.? Please provide an accurate description.
  • How do political elements within the U.S. affect cybersecurity? Accurately describe how political elements within the U.S. can affect cybersecurity.
  • Why is cybersecurity so complex in cloud technology? Concisely explain the complexities of cybersecurity in cloud technology.
  • What advantages can cloud technology offer to businesses? Describe at least two advantages cloud technology can offer businesses Scenario Two: You have recently been hired as a cybersecurity intern with a medium-size company that has experienced rapid growth. The company supports outreach to the community and has set up a forum to help high school students understand important concepts in security. Your boss has asked you to set up a storyboard that will be used to help the students be able to identify the differences between espionage, intelligence gathering, and cyber warfare. He has also instructed you to help the students understand the physical assets of the cyber domain. If you are successful with the storyboard, your boss plans to turn this into an infomercial. Develop a 6- to 8-slide/panel storyboard document using Microsoft® Word or PowerPoint®. Your storyboard should:
  • Accurately depict the differences between espionage, intelligence gathering, and cyber warfare at a level in which high school students can relate.
  • Accurately describe the influence the military has had on intelligence gathering, cyber warfare, and physical assets.
  • Provide a complete timeline of a recent incident involving personal privacy, including the nature of the attack, and provide insight into the risks of conducting business in cyberspace.
  • Enumerate on at least five physical assets of the cyber domain, including an explanation of why you included the assets.
  • Examine where we are today in the areas of espionage, intelligence gathering, cyber warfare, and physical assets, and offer a prediction of the future given your current perspective. All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

 

WEEK  5

CYB 100 Week 5 Individual Assignment Using PhoenixConnect as a Private Cloud Lab

 

Instructions: Using the following instructions, set up a Private Cloud using PhoenixConnect:     1.  Open a new document in Microsoft® Word and save it as CYB100_F100. You will use this file for your answers to the questions below.    2.  Log in to ecampus.phoenix.edu using your assigned username and password.    3.  From the top navigation menu, select PhoenixConnect.    4.  Click your name in the top navigation toolbar.    5.  Click on My Profile, and add at least one piece of information to your profile.    6.  Click on "Communities."    7.  Search for Information Systems & Technology.    8.  Select the Information Systems & Technology Community. Answer the following questions in a 1/2-page Microsoft® Word document titled CYB100_F100:   

  • Explain if it is necessary to log in to PhoenixConnect. Why or why not? What form of authentication does this represent?
  • Explain what PhoenixConnect is, its intended purpose, and its restrictions.
  • Explain how your profile was created. Include in this explanation the importance of reviewing and editing the profile content. Explain how this relates to the integrity of information.
  • Explain how PhoenixConnect content can be used for a secure and private cloud. Address access control and permissions, as well as cybersecurity provisions in the context of a private cloud application. From your experience with this asset, is this cloud hardened? Why or why not?

 

CYB 100 Week 5 Individual Assignment Cloud Storage-as-a-Service Resource Lab

 

Instructions: Resources:   

  • Lynda.com® video "Learning OneDrive" with Garrick Chow
  • Pluralsight video "Office 365: Introduction to OneDrive for Business" with Alan Wright OneDrive® is a cloud-based file storage service from Microsoft® that allows you to share files between your computers and mobile devices so you can access them from anywhere you have an Internet connection. Sharing with other people is also available in OneDrive®. OneDrive® lets you send and receive documents, photos, or any other type of file, even very large files. It is similar to Dropbox and Google Drive™. This lab will help you set up your personal OneDrive® and perform procedures to share files securely with other users implementing secure archival of data on a free Cloud Storage-as-a-Service resource (OneDrive®). Complete the following:
  1. Go to your Outlook Web App inbox in eCampus.
  2. Click on the Office 365 icon on the top banner.
  3. Select OneDrive®.
  4. Using your OneDrive®, create folders named "My Private Files" and "Shared with Everyone."
  5. Upload non-sensitive documents of your choosing into both folders.
  6. Using the techniques described in the videos, control access to your "My Private Files" so only you have access to the files.
  7. Using the techniques described in the videos, share your "Shared with Everyone" folder with someone you know.
  8. Take a screenshot of your OneDrive® documents showing the folders and paste it into a Word document. Write a 1/2-page informal paper using Microsoft® Word that answers the following questions:
  • Accurately define Cloud Storage-as-a-Service.
  • Accurately describe how to get to OneDrive® from a Web browser.
  • Describe in a set-by-step manner how to sync files.
  • What is a guest link?
  • List three ways you can control access in OneDrive®
  • Describe two vulnerabilities you think OneDrive® contains.

 

CYB 100 Week 5 Individual Assignment Final Report Part 2: Cloud Storage-as-a-Service and Course Reflection

 

Instructions: Resources:   

  • The "Sample PowerPoint" posted in the Tutorials & Guides section of the Center for Writing Excellence website
  • The Lynda.com® video "Office 365: Learning PowerPoint" with Garrick Chow
  • The Lynda.com® video "Using Office Shapes and SmartArt to Enhance Business Documents" Create an 8-slide Microsoft® PowerPoint® presentation that contains an Introduction, a Conclusion, and Reference slides. Include detailed speaker notes with each slide. Scenario: You are preparing for a new company-wide project to provide each employee with a personal cloud storage account. The VP of Information Technology has asked you to research solutions for the organization and make sure the CSaaS provider encrypts data in transit and at rest. The U.S.-based company has 100,000 staff members and offices in 100 countries. You will be preparing a presentation of products to present to the company's Information Technology Committee so they can understand the technology, security features, and associated cyber risk. Your task is to:
  • Research Cloud Storage-as-a-Service (CSaaS) providers.
  • Briefly define the technology involved to implement a cloud-based technology such as CSaaS.
  • Briefly describe the registration and authentication process for one of the providers.
  • Correctly identify the encryption technology used both in transit and in storage for one provider.
  • Correctly identify the ethics and privacy policies of one CSaaS provider. All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used. Compile your work from Weeks 4 and 5 into a zipped file. Submit your assignment using the Assignment Files tab.
Write a Review of CYB 100 ENTIRE COURSE